Follow
Tong Qiao
Tong Qiao
Associate Professor, School of Cyberspace, Hangzhou Dianzi University
Verified email at hdu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Robust multi-classifier for camera model identification based on convolution neural network
H Yao, T Qiao, M Xu, N Zheng
IEEE Access 6, 24973-24982, 2018
722018
Statistical model-based detector via texture weight map: Application in re-sampling authentication
T Qiao, R Shi, X Luo, M Xu, N Zheng, Y Wu
IEEE Transactions on Multimedia 21 (5), 1077-1092, 2018
512018
Steganalysis of JSteg algorithm using hypothesis testing theory
T Qiao, F Retraint, R Cogranne, C Zitzmann
EURASIP Journal on Information Security 2015, 1-16, 2015
412015
Robust steganography by modifying sign of DCT coefficients
Z Zhu, N Zheng, T Qiao, M Xu
IEEE Access 7, 168613-168628, 2019
352019
Deep android malware classification with API-based feature graph
N Huang, M Xu, N Zheng, T Qiao, KKR Choo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
352019
Individual camera device identification from JPEG images
T Qiao, F Retraint, R Cogranne, TH Thai
Signal Processing: Image Communication 52, 74-86, 2017
352017
Detecting copy-move forgery using non-negative matrix factorization
H Yao, T Qiao, Z Tang, Y Zhao, H Mao
2011 Third International Conference on Multimedia Information Networking and …, 2011
352011
Unsupervised learning-based framework for deepfake video detection
L Zhang, T Qiao, M Xu, N Zheng, S Xie
IEEE Transactions on Multimedia 25, 4785-4799, 2022
342022
Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images
T Qiao, X Luo, T Wu, M Xu, Z Qian
IEEE Transactions on Dependable and Secure Computing 18 (6), 2736-2751, 2019
342019
Robust steganography resisting JPEG compression by improving selection of cover element
T Qiao, S Wang, X Luo, Z Zhu
Signal Processing 183, 108048, 2021
332021
Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling
X Wu, T Qiao, M Xu, N Zheng
Signal Processing 188, 108200, 2021
322021
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F Yan, M Xu, T Qiao, T Wu, X Yang, N Zheng, KKR Choo
2018 17th IEEE International Conference on Trust, Security and Privacy in …, 2018
322018
Exposing image resampling forgery by using linear parametric model
T Qiao, A Zhu, F Retraint
Multimedia Tools and Applications 77, 1501-1523, 2018
312018
An edge detection method in DCT domain
Z Qian, W Wang, T Qiao
Procedia Engineering 29, 344-348, 2012
292012
Towards deepfake video forensics based on facial textural disparities in multi-color channels
Z Xia, T Qiao, M Xu, N Zheng, S Xie
Information Sciences 607, 654-669, 2022
282022
Source camera device identification based on raw images
T Qiao, F Retraint, R Cogranne, TH Thai
2015 IEEE international conference on image processing (ICIP), 3812-3816, 2015
272015
A novel model watermarking for protecting generative adversarial network
T Qiao, Y Ma, N Zheng, H Wu, Y Chen, M Xu, X Luo
Computers & Security 127, 103102, 2023
262023
Deepfake video detection based on MesoNet with preprocessing module
Z Xia, T Qiao, M Xu, X Wu, L Han, Y Chen
Symmetry 14 (5), 939, 2022
232022
Image forgery detection and localization via a reliability fusion map
H Yao, M Xu, T Qiao, Y Wu, N Zheng
Sensors 20 (22), 6668, 2020
232020
Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app
Y Wang, N Zheng, M Xu, T Qiao, Q Zhang, F Yan, J Xu
Sensors 19 (14), 3052, 2019
222019
The system can't perform the operation now. Try again later.
Articles 1–20