Publications

 |  2024  |  2023  |  2022  |  2021  |  2020  |  2019  |  2018  |  2017  |  2014-2016  |  2010-2013  | 

*Corresponding author(通讯作者)

● 2024

[76] Scalable Universal Adversarial Watermark Defending against Facial Forgery
T. Qiao, B. Zhao, R. Shi, M. Han, M. Hassaballah, F. Retraint, X. Luo
IEEE Transactions on Information Forensics and Security
CITE CODE DOI
[75] IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks
M.A. Hameed, M. Hassaballah, T. Qiao
Multimedia Systems
CITE CODE DOI
[74] Privacy-preserving face recognition method based on extensible feature extraction
W. Hu, D. Zhou, Z. Zhu, T. Qiao, Y. Yao, M. Hassaballah
Journal of Visual Communication and Image Representation
CITE CODE DOI
[73] Deepfake Detection Fighting against Noisy Label Attack
T. Qiao, S. Xie, Y. Chen, F. Retraint, R. Shi, X. Luo
IEEE Transactions on Multimedia
CITE CODE DOI
[72] Unsupervised Generative Fake Image Detector
T. Qiao, H. Shao, S. Xie, R. Shi
IEEE Transactions on Circuits and Systems for Video Technology
CITE CODE DOI
[71] 多色彩通道特征融合的GAN合成图像检测方法
乔通, 陈彧星, 谢世闯, 姚恒, 罗向阳
电子学报, 2024: 1-13
CITE CODE DOI
[70] Fully Unsupervised Deepfake Video Detection via Enhanced Contrastive Learning
T. Qiao, S. Xie, Y. Chen, F. Retraint, X. Luo
IEEE Transactions on Pattern Analysis and Machine Intelligence
CITE CODE DOI
[69] Robust Adversarial Watermark Defending against GAN Synthesization Attack
S. Xu, T. Qiao*, M. Xu, W. Wang, N. Zheng
IEEE Signal Processing Letters
CITE CODE DOI

● 2023

[68] Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion
S. Xie, J. Wu, Y. Chen, M. Han, T. Wu, T. Qiao*
2023 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
CITE CODE DOI
[67] Robust steganography in practical communication: a comparative study
T. Qiao, S. Xu, S. Wang, X. Wu, B. Liu, N. Zheng, M. Xu, B. Pan
EURASIP Journal on Image and Video Processing, 2023.
CITE CODE DOI
[66] CSC-Net: Cross-color Spatial Co-occurrence Matrix Network for Detecting Synthesized Fake Images
T. Qiao, Y. Chen, X. Zhou, R. Shi, H. Shao, K. Shen, X. Luo
IEEE Transactions on Cognitive and Developmental Systems, 2023.
CITE CODE DOI
[65] A Novel Model Watermarking for Protecting Generative Adversarial Network
T. Qiao, Y. Ma, N. Zheng, H. Wu, Y. Chen, M. Xu, X. Luo
Computers & Security, 2023: 103102.
CITE CODE DOI

● 2022

[64] Transmission Removal from a Single Glass Scene and Its Application in Photographer Identification
Z. Li, H. Yao, R. Shi, T. Qiao, C. Qin
Applied Sciences, 2022, 12(23): 12484
CITE CODE DOI
[63] FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing
T. Qiao, J. Wu, N. Zheng, M. Xu, X. Luo
IEEE Transactions on Multimedia, 2022.
CITE CODE DOI
[62] Efficient Privacy-Preserving Forensic Method for Camera Model Identification
Y. Chen, T. Qiao*, F. Retraint, G. Hu
IEEE Transactions on Information Forensics and Security, 2022, 17: 2378-2393.
CITE CODE DOI
[61] Image splicing forgery detection using simplified generalized noise model
Y. Chen, F. Retraint, T. Qiao*
Signal Processing: Image Communication, 2022, 107: 116785.
CITE CODE DOI
[60] Unsupervised Learning-Based Framework for Deepfake Video Detection
L. Zhang, T. Qiao*, M. Xu, N. Zheng, S. Xie
IEEE Transactions on Multimedia, 2022.
CITE CODE DOI
[59] Towards DeepFake Video Forensics based on Facial Textural Disparities in Multi-color Channels
Z. Xia, T. Qiao*, M. Xu, N. Zheng, S. Xie
Information Sciences, 2022, 607: 654-669.
CITE CODE DOI
[58] 图像空域可逆信息隐藏研究进展
武晓帅, 徐明, 乔通*, 潘彬民, 廖鑫
中国图象图形学报,2022, 27(1):25。
CITE CODE DOI
[57] Objective Object Segmentation Visual Quality Evaluation: Quality Measure and Pooling Method
R. Shi,J. Ma, K. N. Ngan, J. Xiong, T. Qiao*
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2022, 18(3): 1-19.
CITE CODE DOI
[56] Encrypted Image Visual Security Index via Non-Local Recognizable Degree Evaluation
R Shi, J Xiong, T. Qiao
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022: 2994-2998.
CITE CODE DOI
[55] Novel Hidden Bit Location Method towards JPEG Steganography
B Pan, T. Qiao*, J Li, Y Chen, C Yang
Security and Communication Networks 2022: 8230263.
CITE CODE DOI
[54] Deepfake Video Detection Based on MesoNet with Preprocessing Module
Z Xia, T. Qiao*, M Xu, X Wu, L Han, Y Chen
Symmetry 14 (5), 939.
CITE CODE DOI
[53] Sign steganography revisited with robust domain selection
X. Wu, T. Qiao*, Y. Chen, M. Xu, N. Zheng, X. Luo
Signal Processing, 2022: 108522.
CITE CODE DOI
[52] Toward Steganographic Payload Location via Neighboring Weight Algorithm
T. Qiao, X. Luo, B. Pan, Y. Chen, X. Wu
Security and Communication Networks,2022: 1400708.
CITE CODE DOI
[51] Classifying between computer generated and natural images: An empirical study from RAW to JPEG format
T. Qiao, X. Luo, H. Yao, R. Shi
Journal of Visual Communication and Image Representation, 2022, 85: 103506.
CITE CODE DOI
[50] Detecting Spliced Image Based on Simplified Statistical Model
Y. Chen, F. Retraint, T. Qiao
2022 14th International Conference on Computer Research and Development (ICCRD), 2022: 220-224.
CITE CODE DOI

● 2021

[49] Robust Steganography Resisting JPEG Compression By Improving Selection of Cover Element
T. Qiao, S. Wang, X. Luo, Z. Zhu
Signal Processing , 2021, 183: 108048.
CITE CODE DOI
[48] Towards Face Presentation Attack Detection Based on Residual Color Texture Representation
Y. Du, T. Qiao(共同一作), M. Xu, N. Zheng
Security and Communication Networks, 2021, 1-16.
CITE CODE DOI
[47] Distinguishing between natural and recolored images via lateral chromatic aberration
Y. Yu, N. Zheng, T. Qiao*, M. Xu, J. Wu
Journal of Visual Communication and Image Representation 80, 103295.
CITE CODE DOI
[46] First step towards parameters estimation of image operator chain
X. Liao, Z. Huang, L. Peng, T. Qiao
Information Sciences 575, 231-247.
CITE CODE DOI
[45] A novel file carving algorithm for docker container logs recorded by json-file logging driver
S. Ge, M. Xu, T. Qiao, N. Zheng
Forensic Science International: Digital Investigation 39, 301272.
CITE CODE DOI
[44] Geographical position spoofing detection based on camera sensor fingerprint
T. Qiao*, Q. Zhao, N. Zheng, M. Xu, L. Zhang
Journal of Visual Communication and Image Representation 81, 103320.
CITE CODE DOI
[43] Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling
X. Wu, T. Qiao(共同一作), M. Xu, N. Zheng
Signal Processing, 108200.
CITE CODE DOI
[42] Objective object segmentation visual quality evaluation based on pixel-level and region-level characteristics
R. Shi, J. Xiong, T. Qiao
Proceedings of the 2nd ACM International Conference on Multimedia in Asia, 1-7.
CITE CODE DOI
[41] Individualism or Collectivism: A Reinforcement Learning Mechanism for Vaccination Decisions
C. Wu, T. Qiao, H. Qiu, B. Shi, Q. Bao
Information 12 (2), 66.
CITE CODE DOI
[40] 基于深度学习的数字图像取证技术研究进展
2021年《网络与信息安全学报》论文下载量Top10(中国知网数据统计)
乔通, 姚宏伟, 潘彬民, 徐明, 陈艳利
网络与信息安全学报 7 (5), 13-28
https://mp.weixin.qq.com/s/PRaprFsiebNHfa0bI_pRKw
CITE CODE DOI

● 2020

[39] JPEG quantization step estimation with coefficient histogram and spectrum analyses
H. Yao, H. Wei, T. Qiao, C. Qin
Journal of Visual Communication and Image Representation, 2020.
CITE CODE DOI
[38] Adaptive and separable multiary reversible data hiding in encryption domain
M. Yu, Y. Liu, H. Sun, H. Yao, T. Qiao
EURASIP Journal on Image and Video Processing , 2020.
CITE CODE DOI
[37] Image Forgery Detection and Localization via a Reliability Fusion Map
H. Yao, M. Xu, T. Qiao*, Y. Wu, N. Zheng
Sensors 20 (22), 6668.
CITE CODE DOI
[36] Identifying WeChat message types without using traditional traffic
Q. Zhang, M. Xu, N. Zheng, T. Qiao, Y. Wang
Information 11 (1), 18.
CITE CODE DOI

● 2019

[35] Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images
T. Qiao, X. Luo, T. Wu, M. Xu, Z. Qian
IEEE Transactions on Dependable and Secure Computing, 2019, 1-16.
CITE CODE DOI
[34] Source camera identification via low dimensional PRNU features
Y. Zhao, N. Zheng, T. Qiao*, M. Xu
Multimedia Tools and Applications, 2019, 78 (7), 8247-8269.
CITE CODE DOI
[33] Robust Steganography by Modifying Sign of DCT Coefficients
Z. Zhu, N. Zheng, T. Qiao*, M. Xu
IEEE Access, 2019, 7, 168613-168628.
CITE CODE DOI
[32] Fuzzy localization of steganographic flipped bits via modification map
Q. Liu, T. Qiao, M. Xu, N. Zheng
IEEE Access, 2019, 7, 74157-74167.
CITE CODE DOI
[31] Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
M. Huang, M. Xu, T. Qiao*, T. Wu
JUCS-Journal of Universal Computer Science 25, 1151.
CITE CODE DOI
[30] Deep android malware classification with api-based feature graph
N. Huang, M. Xu, N. Zheng, T. Qiao, K.K.R. Choo
2019 18th IEEE International Conference On Trust, Security And Privacy Icomputer systems.
CITE CODE DOI
[29] Multiple human upper bodies detection via candidate-region convolutional neural network
A. Zhu, T. Wang, T. Qiao
Multimedia Tools and Applications 78 (12), 16077-16096.
CITE CODE DOI
[28] Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app
Y. Wang, N. Zheng, M. Xu, T. Qiao*, Q. Zhang, F. Yan, J. Xu
Sensors 19 (14), 3052.
CITE CODE DOI

● 2018

[27] Statistical model-based detector via texture weight map: application in re-sampling authentication
T. Qiao, R. Shi, X. Luo, M. Xu, N. Zheng, Y. Wu
IEEE Transactions on Multimedia, 2018, 21 (5): 1077-1092.
CITE CODE DOI
[26] Identifying individual camera device from raw images
T. Qiao*, F. Retraint
IEEE Access 6, 78038-78054.
CITE CODE DOI
[25] Robust multi-classifier for camera model identification based on convolution neural network
H. Yao, T. Qiao, M. Xu, N. Zheng
IEEE Access, 2018, 6, 24973-24982.
CITE CODE DOI
[24] Using machine learning for determining network robustness of multi-agent systems under attacks
G. Wang, M. Xu, Y. Wu, N. Zheng, J. Xu, T. Qiao
Pacific Rim International Conference on Artificial Intelligence, 491-498.
CITE CODE DOI
[23] A location spoofing detection method for social networks (short paper)
C. Ding, T. Wu, T. Qiao, N. Zheng, M. Xu, Y. Wu, W. Xia
International Conference on Collaborative Computing: Networking, Applications and Worksharing.
CITE CODE DOI
[22] Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F. Yan, M. Xu, T. Qiao*, T. Wu, X. Yang, N. Zheng, K.K.R. Choo
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications.
CITE CODE DOI
[21] Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
H. Yao, F. Cao, Z. Tang, J. Wang, T. Qiao
Multimedia Tools and Applications 77 (14), 18139-18161 14 2018.
CITE CODE DOI
[20] A novel framework of robust video watermarking based on statistical model
L. Li, X. Li, T. Qiao*, X. Xu, S. Zhang, C. Chang
International Conference on Cloud Computing and Security, 160-172.
CITE CODE DOI
[19] Exposing image resampling forgery by using linear parametric model
T. Qiao*, A. Zhu, F. Retraint
Multimedia Tools and Applications 77 (2), 1501-1523.
CITE CODE DOI

● 2017

[18] Android App Classification and Permission Usage Risk Assessment
Y. Shen, M. Xu, N. Zheng, J. Xu, W. Xia, Y. Wu, T. Qiao, T. Yang
International Conference on Collaborative Computing: Networking, Applications and Worksharing.
CITE CODE DOI
[17] A Privacy Settings Prediction Model for Textual Posts on Social Networks
L. Chen, M. Xu, X. Yang, N. Zheng, Y. Wu, J. Xu, T. Qiao, H. Liu
International Conference on Collaborative Computing: Networking, Applications and Worksharing.
CITE CODE DOI
[16] Adaptive carving method for live flv streaming
H. Ge, N. Zheng, L. Cai, M. Xu, T. Qiao, T. Yang, J. Sun, S. Hu
International Conference on Collaborative Computing: Networking, Applications and Worksharing.
CITE CODE DOI
[15] A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics
K. Shi, M. Xu, H. Jin, T. Qiao, X. Yang, N. Zheng, J. Xu, K.K.R. Choo
Digital Investigation 23, 11-21.
CITE CODE DOI
[14] A Novel File Carving Algorithm for EVTX Logs
M. Xu, J. Sun, N. Zheng, T. Qiao, Y. Wu, K. Shi, H. Ge, T. Yang
International Conference on Digital Forensics and Cyber Crime, 97-105.
CITE CODE DOI
[13] Individual camera device identification from JPEG images
T. Qiao*, F. Retraint, R. Cogranne, T.H. Thai
Signal Processing: Image Communication 52, 74-86.
CITE CODE DOI

● 2014-2016

[12] Statistical detection for digital image forensics
T. Qiao
Doctoral Dissertation, Supervised by Prof. Florent Retraint and Dr. Remi Cogranne, University of Technology of Troyes.
CITE CODE DOI
[11] Steganalysis of JSteg algorithm using hypothesis testing theory
T. Qiao*, F. Retraint, R. Cogranne, C. Zitzmann
EURASIP Journal on Information Security 2015 (1), 1-16.
CITE CODE DOI
[10] Source camera device identification based on raw images
T. Qiao*, F. Retraint, R. Cogranne, T.H. Thai
2015 IEEE international conference on image processing (ICIP), 3812-3816.
CITE CODE DOI
[9] Statistical detection of jsteg steganography using hypothesis testing theory
T. Qiao, C. Zitzmann, F. Retraint, R. Cogranne
2014 IEEE International Conference on Image Processing (ICIP), 5517-5521.
CITE CODE DOI
[8] Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters
T. Qiao, C. Ziitmann, R. Cogranne, F. Retraint
Proceedings of the 2nd ACM workshop on Information hiding and multimedia security.
CITE CODE DOI

● 2010-2013

[7] Simplified Anti-Forensics of JPEG Compression.
Z. Qian, T. Qiao
J. Comput. 8 (10), 2483-2488.
CITE CODE DOI
[6] Image authentication by statistical analysis
T. Qiao, F. Retraint, R. Cogranne
21st European Signal Processing Conference (EUSIPCO 2013), 1-5.
CITE CODE DOI
[5] Digital image forensics based on local energy variance properties
T. Qiao, Z. Qian, X. Zhang, W. Wang
Pattern Recognition and Artificial Intelligence 25 (2), 280-284.
CITE CODE DOI
[4] Image Passive Authentication and Robust Detection of Copy-move Forgeries
H. Yao, Y. Chen, Y. Zhao, Y. Chen, T. Qiao
Dianshi Jishu(Video Engineering) 36 (9), 14-18.
CITE CODE DOI
[3] An edge detection method in DCT domain
Z. Qian, W. Wang, T. Qiao
Procedia Engineering 29, 344-348.
CITE CODE DOI
[2] Detecting copy-move forgery using non-negative matrix factorization
H. Yao, T. Qiao, Z. Tang, Y. Zhao, H. Mao
2011 Third International Conference on Multimedia Information Networking and Security.
CITE CODE DOI
[1] Image self-embedding with large-area restoration capability
Z. Qian, T. Qiao
2010 International Conference on Multimedia Information Networking and Security.
CITE CODE DOI
最后修改时间:2024-01-23 14:00:10