Tong Qiao
Tong Qiao
Associate Professor, School of Cyberspace, Hangzhou Dianzi University
Email verificata su
Citata da
Citata da
Steganalysis of JSteg algorithm using hypothesis testing theory
T Qiao, F Retraint, R Cogranne, C Zitzmann
EURASIP Journal on Information Security 2015 (1), 1-16, 2015
Detecting copy-move forgery using non-negative matrix factorization
H Yao, T Qiao, Z Tang, Y Zhao, H Mao
2011 Third International Conference on Multimedia Information Networking and …, 2011
Robust multi-classifier for camera model identification based on convolution neural network
H Yao, T Qiao, M Xu, N Zheng
IEEE Access 6, 24973-24982, 2018
Individual camera device identification from JPEG images
T Qiao, F Retraint, R Cogranne, TH Thai
Signal Processing: Image Communication 52, 74-86, 2017
An edge detection method in DCT domain
Z Qian, W Wang, T Qiao
Procedia Engineering 29, 344-348, 2012
Source camera device identification based on raw images
T Qiao, F Retraint, R Cogranne, TH Thai
2015 IEEE international conference on image processing (ICIP), 3812-3816, 2015
Statistical model-based detector via texture weight map: Application in re-sampling authentication
T Qiao, R Shi, X Luo, M Xu, N Zheng, Y Wu
IEEE Transactions on Multimedia 21 (5), 1077-1092, 2018
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
H Yao, F Cao, Z Tang, J Wang, T Qiao
Multimedia Tools and Applications 77 (14), 18139-18161, 2018
Exposing image resampling forgery by using linear parametric model
T Qiao, A Zhu, F Retraint
Multimedia Tools and Applications 77 (2), 1501-1523, 2018
Detection of jsteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters
T Qiao, C Ziitmann, R Cogranne, F Retraint
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F Yan, M Xu, T Qiao, T Wu, X Yang, N Zheng, KKR Choo
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Statistical detection of jsteg steganography using hypothesis testing theory
T Qiao, C Zitzmann, F Retraint, R Cogranne
2014 IEEE International Conference on Image Processing (ICIP), 5517-5521, 2014
Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images
T Qiao, X Luo, T Wu, M Xu, Z Qian
IEEE Transactions on Dependable and Secure Computing, 2019
Deep Android malware classification with API-based feature graph
N Huang, M Xu, N Zheng, T Qiao, KKR Choo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app
Y Wang, N Zheng, M Xu, T Qiao, Q Zhang, F Yan, J Xu
Sensors 19 (14), 3052, 2019
Source camera identification via low dimensional PRNU features
Y Zhao, N Zheng, T Qiao, M Xu
Multimedia Tools and Applications 78 (7), 8247-8269, 2019
Identifying individual camera device from raw images
T Qiao, F Retraint
IEEE Access 6, 78038-78054, 2018
Using machine learning for determining network robustness of multi-agent systems under attacks
G Wang, M Xu, Y Wu, N Zheng, J Xu, T Qiao
Pacific Rim International Conference on Artificial Intelligence, 491-498, 2018
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics
K Shi, M Xu, H Jin, T Qiao, X Yang, N Zheng, J Xu, KKR Choo
Digital Investigation 23, 11-21, 2017
JPEG quantization step estimation with coefficient histogram and spectrum analyses
H Yao, H Wei, T Qiao, C Qin
Journal of Visual Communication and Image Representation 69, 102795, 2020
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20