default search action
Qindong Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Kun Jiang, Ting Cao, Lei Zhu, Qindong Sun:
Adaptive and flexible ℓ 1-norm graph embedding for unsupervised feature selection. Appl. Intell. 54(22): 11732-11751 (2024) - [j46]Yan Wang, Qindong Sun, Dongzhu Rong, Rong Geng:
Multi-domain awareness for compressed deepfake videos detection over social networks guided by common mechanisms between artifacts. Comput. Vis. Image Underst. 247: 104072 (2024) - [j45]Kun Jiang, Zhaoli Liu, Qindong Sun:
Robust auto-weighted and dual-structural representation learning for image clustering. J. Electronic Imaging 33(4) (2024) - [j44]Kun Jiang, Lei Zhu, Zheng Liu, Qindong Sun:
Subspace clustering via adaptive-loss regularized representation learning with latent affinities. Pattern Anal. Appl. 27(1): 15 (2024) - [j43]Zhang Chen, Zhiqiang Tian, Jihua Zhu, Shaoyi Du, Qindong Sun:
Cin-Seg: Causal Invariance for Tag-Supervised Segmentation on Medical Images. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - [j42]Han Cao, Qindong Sun, Yaqi Li, Rong Geng, Xiaoxiong Wang:
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain. ACM Trans. Priv. Secur. 27(1): 4:1-4:25 (2024) - [c15]Kun Jiang, Lei Zhu, Qindong Sun:
Unsupervised Feature Selection via Fuzzy K-Means and Sparse Projection. APWeb/WAIM (5) 2024: 224-239 - 2023
- [j41]Kun Jiang, Lei Zhu, Qindong Sun:
Joint Dual-Structural Constrained and Non-negative Analysis Representation Learning for Pattern Classification. Appl. Artif. Intell. 37(1) (2023) - [j40]Kun Jiang, Congyao Zhao, Lei Zhu, Qindong Sun:
Class-oriented and label embedding analysis dictionary learning for pattern classification. Multim. Tools Appl. 82(16): 24919-24942 (2023) - 2022
- [j39]Han Cao, Chengxiang Si, Qindong Sun, Yanxiao Liu, Shancang Li, Prosanta Gope:
ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers. Entropy 24(3): 412 (2022) - [j38]Yimin Qiao, Qindong Sun, Han Cao, Jiamin Wang, Tingting Hao:
Privacy-preserving dish-recommendation for food nutrition through edging computing. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j37]Zhihai Yang, Qindong Sun, Zhaoli Liu, Jinpei Yan, Yaling Zhang:
Rating behavior evaluation and abnormality forensics analysis for injection attack detection. J. Intell. Inf. Syst. 59(1): 93-119 (2022) - [j36]Zhaoli Liu, Tao Qin, Qindong Sun, Shancang Li, Houbing Herbert Song, Zhouguo Chen:
SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control. IEEE Trans. Comput. Soc. Syst. 9(6): 1703-1714 (2022) - [j35]Zhihai Yang, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. IEEE Trans. Dependable Secur. Comput. 19(2): 879-896 (2022) - [j34]Zhihai Yang, Qindong Sun, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. IEEE Trans. Inf. Forensics Secur. 17: 531-546 (2022) - [j33]Qindong Sun, Kai Lin, Chengxiang Si, Yanyue Xu, Shancang Li, Prosanta Gope:
A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Trans. Sens. Networks 18(3): 40:1-40:21 (2022) - 2021
- [j32]Jing Liu, Jianhui Ge, Yuxin Xue, Wenjuan He, Qindong Sun, Shancang Li:
Multi-scale skip-connection network for image super-resolution. Multim. Syst. 27(4): 821-836 (2021) - [j31]Qindong Sun, Xingyu Feng, Shanshan Zhao, Han Cao, Shancang Li, Yufeng Yao:
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment. Mob. Networks Appl. 26(6): 2329-2340 (2021) - [j30]Dongzhu Rong, Yan Wang, Qindong Sun:
Video Source Forensics for IoT Devices Based on Convolutional Neural Networks. Open J. Internet Things 7(1): 23-31 (2021) - [j29]Zhihai Yang, Qindong Sun, Yaling Zhang, Wei Wang:
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors. IEEE Trans. Inf. Forensics Secur. 16: 537-552 (2021) - [j28]Yanxiao Liu, Ching-Nung Yang, Qindong Sun:
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management. IEEE Trans. Intell. Transp. Syst. 22(7): 3952-3960 (2021) - [j27]Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu:
Image Source Identification Using Convolutional Neural Networks in IoT Environment. Wirel. Commun. Mob. Comput. 2021: 5804665:1-5804665:12 (2021) - [c14]Kun Jiang, Zhaoli Liu, Qindong Sun:
Low-Rank Orthonormal Analysis Dictionary Learning for Image Classification. PRICAI (3) 2021: 391-402 - [i1]Kun Jiang, Zhaoli Liu, Zheng Liu, Qindong Sun:
Locality Constrained Analysis Dictionary Learning via K-SVD Algorithm. CoRR abs/2104.14130 (2021) - 2020
- [j26]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Yi-Cheng Chen:
(k, n) scalable secret image sharing with multiple decoding options. J. Intell. Fuzzy Syst. 38(1): 219-228 (2020) - [j25]Zhihai Yang, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. IEEE Trans. Inf. Forensics Secur. 15: 2766-2781 (2020) - [c13]Kun Jiang, Lei Zhu, Qindong Sun:
Optimizing Scoring and Sorting Operations for Faster WAND Processing. ADMA 2020: 499-514 - [c12]Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan:
Fined-grained Aspect Extraction from Online Reviews for Decision Support. TrustCom 2020: 1536-1541
2010 – 2019
- 2019
- [j24]Yanxiao Liu, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(Supplement): 8605-8611 (2019) - [j23]Shancang Li, Shanshan Zhao, Po Yang, Panagiotis Andriotis, Lida Xu, Qindong Sun:
Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems. IEEE Internet Things J. 6(2): 2299-2308 (2019) - [j22]Shancang Li, Kim-Kwang Raymond Choo, Qindong Sun, William J. Buchanan, Jiuxin Cao:
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet Things J. 6(4): 6487-6497 (2019) - [j21]Yan-Xiao Liu, Ching-Nung Yang, Chi-Ming Wu, Qin-Dong Sun, Wei Bi:
Threshold changeable secret image sharing scheme based on interpolation polynomial. Multim. Tools Appl. 78(13): 18653-18667 (2019) - [j20]Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Song-Yu Wu, Shin-Shang Lin, Yung-Shun Chou:
Enhanced embedding capacity for the SMSD-based data-hiding method. Signal Process. Image Commun. 78: 216-222 (2019) - [c11]Huali Cui, Qindong Sun, Beibei Zhang, Xingjun Zhang, Weiguo Wu:
Video-Aware Multipath Network Coding over Multi-Hop Wireless Networks. ICOIN 2019: 171-175 - 2018
- [j19]Yanxiao Liu, Ching-Nung Yang, Qin-Dong Sun:
Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding. IEEE Access 6: 5374-5378 (2018) - [j18]Zhihai Yang, Qindong Sun, Beibei Zhang:
Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems. IEEE Access 6: 50014-50029 (2018) - [j17]Qindong Sun, Yimin Qiao, Hongyi Zhou, Jiamin Wang, Nan Wang:
A loss prevention methodology for catering industry based on operation data analysis. Clust. Comput. 21(1): 923-931 (2018) - [j16]Yan-Xiao Liu, Qin-Dong Sun, Ching-Nung Yang:
(k, n) secret image sharing scheme capable of cheating detection. EURASIP J. Wirel. Commun. Netw. 2018: 72 (2018) - [j15]Qindong Sun, Han Cao, Wenjing Qi, Jingpeng Zhang:
Improving the security and quality of real-time multimedia transmission in cyber-physical-social systems. Int. J. Distributed Sens. Networks 14(11) (2018) - [j14]Zhihai Yang, Qindong Sun, Yaling Zhang, Beibei Zhang:
Uncovering anomalous rating behaviors for rating systems. Neurocomputing 308: 205-226 (2018) - [j13]Qindong Sun, Nan Wang, Shancang Li, Hongyi Zhou:
Local spatial obesity analysis and estimation using online social network sensors. J. Biomed. Informatics 83: 54-62 (2018) - [j12]Yanxiao Liu, Ching-Nung Yang, Yung-Shun Chou, Song-Yu Wu, Qin-Dong Sun:
Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 55: 766-777 (2018) - [j11]Shancang Li, Shanshan Zhao, Yong Yuan, Qindong Sun, Kewang Zhang:
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. IEEE Trans. Comput. Soc. Syst. 5(4): 1133-1141 (2018) - [c10]Shancang Li, Qindong Sun, Xiaolong Xu:
Forensic Analysis of Digital Images over Smart Devices and Online Social Networks. HPCC/SmartCity/DSS 2018: 1015-1021 - [c9]Qindong Sun, Wenjing Qi, Jingpeng Zhang:
Quality Improvement of Real-Time Video in Mobile Network. HPCC/SmartCity/DSS 2018: 1039-1042 - [c8]Zhurong Wang, Mingfang Du, Qindong Sun, Haining Meng:
The Crowding Mechanism Genetic Algorithm for Solving Job Scheduling Problem. ICSAI 2018: 338-343 - 2017
- [j10]Qi Dang, Yadong Zhou, Feng Gao, Qindong Sun:
Detecting cooperative and organized spammer groups in micro-blogging community. Data Min. Knowl. Discov. 31(3): 573-605 (2017) - [j9]Qindong Sun, Shancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallanathan:
Industrial wireless sensor networks 2016. Int. J. Distributed Sens. Networks 13(6) (2017) - 2016
- [j8]Qindong Sun, Yimin Qiao, Jiamin Wang, Si Shen:
Node importance evaluation method in wireless sensor network based on energy field model. EURASIP J. Wirel. Commun. Netw. 2016: 199 (2016) - [j7]Qindong Sun, Nan Wang, Yadong Zhou, Zuomin Luo:
Identification of Influential Online Social Network Users Based on Multi-Features. Int. J. Pattern Recognit. Artif. Intell. 30(6): 1659015:1-1659015:15 (2016) - [j6]Qindong Sun, Yimin Qiao, Hua Wu, Jiamin Wang:
An Edge Detection Method Based on Adjacent Dispersion. Int. J. Pattern Recognit. Artif. Intell. 30(10): 1655026:1-1655026:17 (2016) - 2015
- [j5]Qindong Sun, Jianfen Xiong, Yan Wang:
A method of image segmentation based on the JPEG file stream. J. Comput. Methods Sci. Eng. 15(3): 467-475 (2015) - 2014
- [j4]Shancang Li, Hongjian Sun, Arumugam Nallanathan, Li Xu, Shanshan Zhao, Qindong Sun:
Industrial Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j3]Qindong Sun, Xiuwen Sun, Nan Wang, Qian Wang:
A Large-scale Trojans Control Model Based on Layered and P2P Structure. J. Softw. 9(6): 1423-1427 (2014) - [c7]Ya-Ling Zhang, Kai Liu, Shang-Ping Wang, Qin-Dong Sun:
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. CIS 2014: 563-567 - [c6]Qindong Sun, Nan Wang, Yadong Zhou, Hanqin Wang, Liansheng Sui:
Modeling for user interaction by influence transfer effect in online social networks. LCN 2014: 486-489 - 2013
- [c5]Zhipeng Jia, Ya-Ling Zhang, Shang-Ping Wang, Qin-Dong Sun:
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data. CIS 2013: 697-701 - 2010
- [j2]Qindong Sun, Qian Wang, Jie Ren:
Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network. J. Convergence Inf. Technol. 5(5): 111-117 (2010) - [j1]Yadong Zhou, Xiaohong Guan, Qinghua Zheng, Qindong Sun, Junzhou Zhao:
Group dynamics in discussing incidental topics over online social networks. IEEE Netw. 24(6): 42-47 (2010)
2000 – 2009
- 2009
- [c4]Qindong Sun, Hongli Qiao, Nan Wang:
Analysis and Computing of Association Degree of SMS Feature Words. ICNS 2009: 338-341 - 2008
- [c3]Xinbo Huang, Qindong Sun:
Accuracy of an Icing On-line Monitoring System. SNPD 2008: 600-604 - 2007
- [c2]Qindong Sun, Qian Wang, Xinbo Huang:
A Multi-Pattern Matching Algorithm on Multi-Language Mixed Texts for Content-Based Network Information Audit. CIS 2007: 310-314 - 2006
- [c1]Qindong Sun, Xinbo Huang, Xiaohong Guan, Peng Gao:
An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification. ISNN (2) 2006: 346-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint