default search action
Qingzhong Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j27]Qingzhong Liu:
An Improved Approach to Exposing JPEG Seam Carving Under Recompression. IEEE Trans. Circuits Syst. Video Technol. 29(7): 1907-1918 (2019) - 2017
- [j26]Qingzhong Liu:
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recognit. 65: 35-46 (2017) - 2015
- [j25]Jing Zhang, Meili Zhi, Yuting Su, Qingzhong Liu:
Mobile Watermarking against Geometrical Distortions. EAI Endorsed Trans. Security Safety 2(5): e2 (2015) - [j24]Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang:
A Method to Detect AAC Audio Forgery. EAI Endorsed Trans. Security Safety 2(6): e1 (2015) - 2014
- [j23]Zhongxue Chen, Hanwen Huang, Qingzhong Liu:
Detecting differentially methylated loci for multiple treatments based on high-throughput methylation data. BMC Bioinform. 15: 142 (2014) - [j22]Zhongxue Chen, William Yang, Qingzhong Liu, Jack Y. Yang, Jing Li, Mary Yang:
A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study. BMC Bioinform. 15(S-17): S3 (2014) - [j21]Qingzhong Liu, Zhongxue Chen:
Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images. ACM Trans. Intell. Syst. Technol. 5(4): 63:1-63:30 (2014) - 2013
- [j20]Qingzhong Liu, Peter A. Cooper, Lei Chen, Hyuk Cho, Zhongxue Chen, Mengyu Qiao, Yuting Su, Mingzhen Wei, Andrew H. Sung:
Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation. Appl. Intell. 39(4): 705-726 (2013) - [j19]Junyu Xu, Yuting Su, Qingzhong Liu:
Detection of Double MPEG-2 Compression Based on Distributions of DCT coefficients. Int. J. Pattern Recognit. Artif. Intell. 27(1) (2013) - [j18]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
MP3 audio steganalysis. Inf. Sci. 231: 123-134 (2013) - 2012
- [j17]Zhongxue Chen, Qingzhong Liu, Saralees Nadarajah:
A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data. Bioinform. 28(8): 1109-1113 (2012) - [j16]Chao-Yang Pang, Gang Jiang, Shipeng Wang, Ben-Qiong Hu, Qingzhong Liu, Youping Deng, Xudong Huang:
Gene order computation using Alzheimer's DNA microarray gene expression data and the ant colony optimisation algorithm. Int. J. Data Min. Bioinform. 6(6): 617-632 (2012) - 2011
- [j15]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Neighboring joint density-based JPEG steganalysis. ACM Trans. Intell. Syst. Technol. 2(2): 16:1-16:16 (2011) - [j14]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Derivative-based audio steganalysis. ACM Trans. Multim. Comput. Commun. Appl. 7(3): 18:1-18:19 (2011) - 2010
- [j13]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Detection of Double MP3 Compression. Cogn. Comput. 2(4): 291-296 (2010) - [j12]Zhongxue Chen, Monnie McGee, Qingzhong Liu, Y. Megan Kong, Xudong Huang, Jack Y. Yang, Richard H. Scheuermann:
Identifying Differentially Expressed Genes based on probe level data for GeneChip arrays. Int. J. Comput. Biol. Drug Des. 3(3): 237-257 (2010) - [j11]Yuting Su, Jing Zhang, Yu Han, Jing Chen, Qingzhong Liu:
Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur. Int. J. Pattern Recognit. Artif. Intell. 24(7): 1027-1046 (2010) - [j10]Yuting Su, Junyu Xu, Bo Dong, Jing Zhang, Qingzhong Liu:
A Novel Source MPEG-2 Video Identification Algorithm. Int. J. Pattern Recognit. Artif. Intell. 24(8): 1311-1328 (2010) - [j9]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen, Bernardete Ribeiro:
An improved approach to steganalysis of JPEG images. Inf. Sci. 180(9): 1643-1655 (2010) - 2009
- [j8]Qingzhong Liu, Mengyu Qiao, Andrew H. Sung:
Distance metric learning and support vector machines for classification of mass spectrometry proteomics data. Int. J. Knowl. Eng. Soft Data Paradigms 1(3): 216-226 (2009) - [j7]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE Trans. Inf. Forensics Secur. 4(3): 359-368 (2009) - 2008
- [j6]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, Jianyun Xu:
Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178(1): 21-36 (2008) - [j5]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Jianyun Xu:
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images. Pattern Recognit. 41(1): 56-66 (2008) - 2007
- [j4]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Behaviour Mining for Fraud Detection. J. Res. Pract. Inf. Technol. 39(1): 3-18 (2007) - [j3]Jianyun Xu, Andrew H. Sung, Srinivas Mukkamala, Qingzhong Liu:
Obfuscated Malicious Executable Scanner. J. Res. Pract. Inf. Technol. 39(3): 181-198 (2007) - [j2]Zhongxue Chen, Monnie McGee, Qingzhong Liu, Richard H. Scheuermann:
A distribution free summarization method for Affymetrix GeneChip® arrays. Bioinform. 23(3): 321-327 (2007) - [j1]Mingzhen Wei, Baojun Bai, Andrew H. Sung, Qingzhong Liu, Jiachun Wang, Martha E. Cather:
Predicting injection profiles using ANFIS. Inf. Sci. 177(20): 4445-4461 (2007)
Conference and Workshop Papers
- 2023
- [c63]Biodoumoye George Bokolo, Ebikela Ogegbene-Ise, Lei Chen, Qingzhong Liu:
Crime-Intent Sentiment Detection on Twitter Data Using Machine Learning. CACRE 2023: 79-83 - [c62]Jayanthi Ramamoorthy, Damilola Oladimeji, Laura Garland, Qingzhong Liu:
Detection and Classification of Web Application Attacks. IEA/AIE (2) 2023: 301-312 - [c61]Razaq Jinad, Khushi Gupta, Chukwuemeka Ihekweazu, Qingzhong Liu, Bing Zhou:
Detecting Web-Based Attacks: A Comparative Analysis of Machine Learning and BERT Transformer Approaches. IEA/AIE (2) 2023: 325-332 - [c60]Biodoumoye George Bokolo, Qingzhong Liu:
Cyberbullying Detection on Social Media Using Machine Learning. INFOCOM Workshops 2023: 1-6 - [c59]Biodoumoye George Bokolo, Lei Chen, Qingzhong Liu:
Detection of Web-Attack using DistilBERT, RNN, and LSTM. ISDFS 2023: 1-6 - 2022
- [c58]Yu Zhang, Qingzhong Liu, Yuanquan Shi:
MANAGE: A Novel Malware Evolution Model based on Digital Genes. DSC 2022: 64-70 - [c57]Valentin Gazeau, William Glisson, Cihan Varol, Qingzhong Liu:
Walk This Way: Footwear Recognition Using Images & Neural Networks. HICSS 2022: 1-13 - [c56]Qingzhong Liu, Zhongxue Chen, Henry C. Liu:
A Comparison Study to Detect COVID-19 Chest X-Ray Images with SOTA Deep Learning Models. Healthcare AI and COVID-19 Workshop 2022: 146-153 - [c55]Biodoumoye George Bokolo, GaganDeep Sur, Qingzhong Liu, Fang Yuan, Fan Liang:
Hybrid Analysis Based Cross Inspection Framework for Android Malware Detection. SERA 2022: 99-105 - 2021
- [c54]Qingzhong Liu, Naciye Celebi:
Large Feature Mining and Deep Learning in Multimedia Forensics. IWSPA@CODASPY 2021: 3-4 - 2019
- [c53]Burak Ilikci, Lei Chen, Hyuk Cho, Qingzhong Liu:
Heat-Map Based Emotion and Face Recognition from Thermal Images. ComComAP 2019: 449-453 - [c52]Buddhi Ashan, Hyuk Cho, Qingzhong Liu:
Performance Evaluation of Transfer Learning for Pornographic Detection. ICNC-FSKD 2019: 403-414 - [c51]Zhaohe Zhang, Qingzhong Liu:
Detect Video Forgery by Performing Transfer Learning on Deep Neural Network. ICNC-FSKD 2019: 415-422 - 2018
- [c50]Hao Zhang, Lei Chen, Qingzhong Liu:
Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones. ICNC 2018: 647-651 - [c49]Mitchell Singleton, Benjamin Taylor, Jacob Taylor, Qingzhong Liu:
Gun Identification Using Tensorflow. MLICOM 2018: 3-12 - [c48]Shinelle Hutchinson, Zhaohe Zhang, Qingzhong Liu:
Detecting Phishing Websites with Random Forest. MLICOM 2018: 470-479 - [c47]Mitchell B. Singleton, Qingzhong Liu:
Detecting Digital Photo Tampering with Deep Learning. MLICOM 2018: 480-489 - 2016
- [c46]Qingzhong Liu, Andrew H. Sung, Bing Zhou, Mengyu Qiao:
Exposing Inpainting Forgery in JPEG Images under Recompression Attacks. ICMLA 2016: 164-169 - [c45]Qingzhong Liu:
Exposing seam carving forgery under recompression attacks by hybrid large feature mining. ICPR 2016: 1041-1046 - [c44]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Merging Permission and API Features for Android Malware Detection. IIAI-AAI 2016: 566-571 - [c43]Andrew H. Sung, Bernardete Ribeiro, Qingzhong Liu:
Sampling and Evaluating the Big Data for Knowledge Discovery. IoTBD 2016: 378-382 - [c42]Bing Zhou, Yiyu Yao, Qingzhong Liu:
Utilizing DTRS for Imbalanced Text Classification. IJCRS 2016: 219-228 - 2015
- [c41]Mengyu Qiao, Suiyuan Zhang, Andrew H. Sung, Qingzhong Liu:
A Novel Touchscreen-Based Authentication Scheme Using Static and Dynamic Hand Biometrics. COMPSAC 2015: 494-503 - 2014
- [c40]Qingzhong Liu, Bernardete Ribeiro, Andrew H. Sung, Divya Suryakumar:
Mining the Big Data: The Critical Feature Dimension Problem. IIAI-AAI 2014: 499-504 - 2013
- [c39]Qingzhong Liu, Peter A. Cooper, Bing Zhou:
An improved approach to detecting content-aware scaling-based tampering in JPEG images. ChinaSIP 2013: 432-436 - 2012
- [c38]Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu:
Scalable Secure MJPEG Video Streaming. AINA Workshops 2012: 111-115 - [c37]Bing Zhou, Qingzhong Liu:
A Comparison Study of Cost-Sensitive Classifier Evaluations. Brain Informatics 2012: 360-371 - [c36]Ram B. Basnet, Andrew H. Sung, Qingzhong Liu:
Feature Selection for Improved Phishing Detection. IEA/AIE 2012: 252-261 - [c35]Qingzhong Liu, Xiaodong Li, Lei Chen, Hyuk Cho, Peter A. Cooper, Zhongxue Chen, Mengyu Qiao, Andrew H. Sung:
Identification of Smartphone-Image Source and Manipulation. IEA/AIE 2012: 262-271 - [c34]Hyuk Cho, Deepthi Mandava, Qingzhong Liu, Lei Chen, Sangoh Jeong, Doreen Cheng:
Situation-Aware on Mobile Phone Using Co-clustering: Algorithms and Extensions. IEA/AIE 2012: 272-282 - [c33]Divya Suryakumar, Andrew H. Sung, Qingzhong Liu:
Dependance of critical dimension on learning machines and ranking methods. IRI 2012: 738-739 - [c32]Divya Suryakumar, Andrew H. Sung, Subhasish Mazumdar, Qingzhong Liu:
Model evaluation of datasets using critical dimension model invariants. ISDA 2012: 740-745 - 2011
- [c31]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, Bernardete Ribeiro:
Locating Information-hiding in MP3 Audio. ICAART (1) 2011: 504-507 - [c30]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Xudong Huang:
A JPEG-based statistically invisible steganography. ICIMCS 2011: 78-81 - [c29]Divya Suryakumar, Andrew H. Sung, Qingzhong Liu:
Determine the Critical dimension in data mining (experiments with bioinformatics datasets). ISDA 2011: 481-486 - [c28]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
A Method to Detect JPEG-Based Double Compression. ISNN (2) 2011: 466-476 - [c27]Qingzhong Liu:
Steganalysis of DCT-embedding based adaptive steganography and YASS. MM&Sec 2011: 77-86 - 2010
- [c26]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Predicting embedding strength in audio steganography. IEEE ICCI 2010: 925-930 - [c25]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Revealing real quality of double compressed MP3 audio. ACM Multimedia 2010: 1011-1014 - 2009
- [c24]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Mengyu Qiao:
Classification of Mass Spectrometry Data - Using Manifold and Supervised Distance Metric Learning. BIOSIGNALS 2009: 396-401 - [c23]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Bernardete Ribeiro:
Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis. ICAART 2009: 226-231 - [c22]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Feature Mining and Intelligent Computing for MP3 Steganalysis. IJCBS 2009: 627-630 - [c21]Mengyu Qiao, Andrew H. Sung, Qingzhong Liu:
Steganalysis of MP3Stego. IJCNN 2009: 2566-2571 - [c20]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Spectrum Steganalysis of WAV Audio Streams. MLDM 2009: 582-593 - [c19]Qingzhong Liu, Andrew H. Sung:
A new approach for JPEG resize and image splicing detection. MiFor@MM 2009: 43-48 - [c18]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Novel stream mining for audio steganalysis. ACM Multimedia 2009: 95-104 - [c17]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Improved detection and evaluation for JPEG steganalysis. ACM Multimedia 2009: 873-876 - 2008
- [c16]Qingzhong Liu, Mengyu Qiao, Andrew H. Sung:
Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data. ICMLA 2008: 631-636 - [c15]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo. ICMLA 2008: 671-674 - [c14]Bernardete Ribeiro, Armando Vieira, João M. M. Duarte, Catarina Silva, João Carvalho das Neves, Qingzhong Liu, Andrew H. Sung:
Learning Manifolds for Bankruptcy Analysis. ICONIP (1) 2008: 723-730 - [c13]Qingzhong Liu, Andrew H. Sung, Mengyu Qiao:
Detecting information-hiding in WAV audios. ICPR 2008: 1-4 - [c12]Rita Ferreira, Bernardete Ribeiro, Catarina Silva, Qingzhong Liu, Andrew H. Sung:
Building resilient classifiers for LSB matching steganography. IJCNN 2008: 1562-1567 - [c11]Qingzhong Liu, Andrew H. Sung, Bernardete Ribeiro, Rita Ferreira:
Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting. IJCNN 2008: 3352-3357 - 2007
- [c10]Qingzhong Liu, Andrew H. Sung:
Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images. IJCAI 2007: 2808-2813 - 2006
- [c9]Srinivas Mukkamala, Qingzhong Liu, Rajeev Veeraghattam, Andrew H. Sung:
Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. ICAISC 2006: 951-961 - [c8]Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro:
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. ICPR (2) 2006: 267-270 - [c7]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Tree Based Behavior Monitoring for Adaptive Fraud Detection. ICPR (1) 2006: 1208-1211 - [c6]Qingzhong Liu, Andrew H. Sung:
Recursive Feature Addition for Gene Selection. IJCNN 2006: 1360-1367 - [c5]Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Jianzhong Liu, Zhongxue Chen:
Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures. SMC 2006: 5094-5099 - 2005
- [c4]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Online Fraud Detection System Based on Non-Stationery Anomaly Detection. Security and Management 2005: 364-370 - [c3]Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala:
Fraud Detection System Based on Behavior Mining and Anomaly Detection. IICAI 2005: 3487-3501 - 2004
- [c2]Jianyun Xu, Andrew H. Sung, Qingzhong Liu:
Detecting Hidden Information in the Wavelet Domain. CISST 2004: 571-577 - [c1]Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu:
JPEG Compression Immune Steganography Using Wavelet Transform. ITCC (2) 2004: 704-708
Parts in Books or Collections
- 2015
- [p1]Qingzhong Liu, Andrew H. Sung, Zhongxue Chen, Lei Chen:
Exposing Image Tampering with the Same Quantization Matrix. Multimedia Data Mining and Analytics 2015: 327-343
Informal and Other Publications
- 2022
- [i1]Naciye Celebi, Qingzhong Liu, Muhammed Karatoprak:
A Survey of Deep Fake Detection for Trial Courts. CoRR abs/2205.15792 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint