Robust multi-classifier for camera model identification based on convolution neural network H Yao, T Qiao, M Xu, N Zheng IEEE Access 6, 24973-24982, 2018 | 70 | 2018 |
Statistical model-based detector via texture weight map: Application in re-sampling authentication T Qiao, R Shi, X Luo, M Xu, N Zheng, Y Wu IEEE Transactions on Multimedia 21 (5), 1077-1092, 2018 | 51 | 2018 |
Steganalysis of JSteg algorithm using hypothesis testing theory T Qiao, F Retraint, R Cogranne, C Zitzmann EURASIP Journal on Information Security 2015, 1-16, 2015 | 39 | 2015 |
Detecting copy-move forgery using non-negative matrix factorization H Yao, T Qiao, Z Tang, Y Zhao, H Mao 2011 Third International Conference on Multimedia Information Networking and …, 2011 | 35 | 2011 |
Individual camera device identification from JPEG images T Qiao, F Retraint, R Cogranne, TH Thai Signal Processing: Image Communication 52, 74-86, 2017 | 34 | 2017 |
Robust steganography resisting JPEG compression by improving selection of cover element T Qiao, S Wang, X Luo, Z Zhu Signal Processing 183, 108048, 2021 | 33 | 2021 |
Robust steganography by modifying sign of DCT coefficients Z Zhu, N Zheng, T Qiao, M Xu IEEE Access 7, 168613-168628, 2019 | 33 | 2019 |
Deep android malware classification with API-based feature graph N Huang, M Xu, N Zheng, T Qiao, KKR Choo 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 33 | 2019 |
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic F Yan, M Xu, T Qiao, T Wu, X Yang, N Zheng, KKR Choo 2018 17th IEEE International Conference on Trust, Security and Privacy in …, 2018 | 30 | 2018 |
Exposing image resampling forgery by using linear parametric model T Qiao, A Zhu, F Retraint Multimedia Tools and Applications 77, 1501-1523, 2018 | 30 | 2018 |
Unsupervised learning-based framework for deepfake video detection L Zhang, T Qiao, M Xu, N Zheng, S Xie IEEE Transactions on Multimedia 25, 4785-4799, 2022 | 29 | 2022 |
Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling X Wu, T Qiao, M Xu, N Zheng Signal Processing 188, 108200, 2021 | 29 | 2021 |
An edge detection method in DCT domain Z Qian, W Wang, T Qiao Procedia Engineering 29, 344-348, 2012 | 29 | 2012 |
Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images T Qiao, X Luo, T Wu, M Xu, Z Qian IEEE Transactions on Dependable and Secure Computing 18 (6), 2736-2751, 2019 | 27 | 2019 |
Towards deepfake video forensics based on facial textural disparities in multi-color channels Z Xia, T Qiao, M Xu, N Zheng, S Xie Information Sciences 607, 654-669, 2022 | 26 | 2022 |
Source camera device identification based on raw images T Qiao, F Retraint, R Cogranne, TH Thai 2015 IEEE international conference on image processing (ICIP), 3812-3816, 2015 | 25 | 2015 |
A novel model watermarking for protecting generative adversarial network T Qiao, Y Ma, N Zheng, H Wu, Y Chen, M Xu, X Luo Computers & Security 127, 103102, 2023 | 24 | 2023 |
Image forgery detection and localization via a reliability fusion map H Yao, M Xu, T Qiao, Y Wu, N Zheng Sensors 20 (22), 6668, 2020 | 22 | 2020 |
Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app Y Wang, N Zheng, M Xu, T Qiao, Q Zhang, F Yan, J Xu Sensors 19 (14), 3052, 2019 | 22 | 2019 |
Deepfake video detection based on MesoNet with preprocessing module Z Xia, T Qiao, M Xu, X Wu, L Han, Y Chen Symmetry 14 (5), 939, 2022 | 21 | 2022 |