


default search action
Qing Qian 0001
Person information
- affiliation: Guizhou University of Finance and Economics, School of Information, Guiyang, China
- affiliation (PhD 2018): Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
Other persons with the same name
- Qing Qian — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j17]Kaixi Wang, Yunhe Cui, Guowei Shen, Chun Guo, Yi Chen, Qing Qian:
PRAETOR:Packet flow graph and dynamic spatio-temporal graph neural network-based flow table overflow attack detection method. J. Netw. Comput. Appl. 243: 104333 (2025)
[j16]Dongyu Wang, Xiaojie Li, Canghong Shi, Xianhua Niu, Ling Xiong, Hanzhou Wu, Qing Qian, Chao Qi:
Robust copy-move detection and localization of digital audio based CFCC feature. Multim. Tools Appl. 84(11): 9573-9589 (2025)
[j15]Jiasong Li
, Yunhe Cui
, Yi Chen
, Guowei Shen, Chun Guo, Qing Qian:
The DUDFTO Attack: Towards Down-to-UP Timeout Probing and Dynamically Flow Table Overflowing in SDN. IEEE Trans. Netw. Serv. Manag. 22(5): 4898-4916 (2025)- 2024
[j14]Qing Qian
, Meixin Song, Shuyun Zhou, Qingrong Chen:
A music watermarking method based on the multi-band power distribution of copyright owner's speech. Multim. Tools Appl. 83(26): 67627-67642 (2024)
[c13]Qing Qian, Yi Yue, Yilin Kuang, Huan Wang, Yunhe Cui, Bingxiang Wu, Longwen Ran, Hong Wang:
MT-EPTNet: Multi-task Acoustic Scene Classification with Efficient Parameter Tuning. ICONIP (9) 2024: 244-258- 2023
[j13]Kaixi Wang, Yunhe Cui
, Qing Qian, Yi Chen, Chun Guo, Guowei Shen:
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method. J. Netw. Comput. Appl. 219: 103722 (2023)
[c12]Yong Long
, Qing Qian
, Yunhe Cui
:
VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning. ISCAI 2023: 67-71- 2022
[j12]Longyan Ran
, Yunhe Cui
, Chun Guo, Qing Qian, Guowei Shen, Huanlai Xing
:
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm. Comput. Networks 213: 109098 (2022)
[j11]Huan Wang
, Zhongyuan Jiang, Qing Qian, Hong Wang:
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms. Int. J. Distributed Sens. Networks 18(4): 155013292210842 (2022)
[j10]Man Xiao
, Yunhe Cui
, Qing Qian, Guowei Shen:
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT. IEEE Internet Things J. 9(23): 23750-23771 (2022)
[c11]Qing Qian, Shuyun Zhou, Meixin Song, Yunhe Cui, Huan Wang:
VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 1649-1654- 2021
[j9]Jin-cheng Peng, Yunhe Cui
, Qing Qian, Chun Guo, Chaohui Jiang, Saifei Li:
ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN. J. Inf. Secur. Appl. 63: 103017 (2021)
[j8]Yunhe Cui
, Qing Qian, Chun Guo, Guowei Shen, Youliang Tian, Huanlai Xing
, Lianshan Yan:
Towards DDoS detection mechanisms in Software-Defined Networking. J. Netw. Comput. Appl. 190: 103156 (2021)
[c10]Cong Wang, Yunhe Cui
, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li:
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN. EUC 2021: 79-86- 2020
[j7]Qing Qian
, Yunhe Cui
, Hongxia Wang, Mingsen Deng
:
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability. Telecommun. Syst. 75(3): 273-289 (2020)
[c9]Yunhe Cui, Qing Qian:
MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking. ICCCS 2020: 486-490
[c8]Qing Qian, Yunhe Cui:
A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits. ICCCS 2020: 680-684
[c7]Yunhe Cui, Qing Qian, Huanlai Xing
, Saifei Li:
LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking. HPCC/DSS/SmartCity 2020: 855-860
2010 – 2019
- 2019
[j6]Canghong Shi
, Hongxia Wang, Yi Hu, Qing Qian, Hong Zhao:
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(5): 2588-2609 (2019)- 2018
[j5]Jin-Feng Li, Hong-Xia Wang, Tao Wu, Xingming Sun, Qing Qian:
Norm ratio-based audio watermarking scheme in DWT domain. Multim. Tools Appl. 77(12): 14481-14497 (2018)
[j4]Jing Sang
, Hongxia Wang, Qing Qian, Hanzhou Wu
, Yi Chen
:
An efficient fingerprint identification algorithm based on minutiae and invariant moment. Pers. Ubiquitous Comput. 22(1): 71-80 (2018)
[j3]Qing Qian
, Hongxia Wang, Xingming Sun, Yunhe Cui
, Huan Wang, Canghong Shi
:
Speech authentication and content recovery scheme for security communication and storage. Telecommun. Syst. 67(4): 635-649 (2018)- 2017
[j2]Huan Wang, Hong-Xia Wang, Xingming Sun, Qing Qian:
A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multim. Tools Appl. 76(10): 12627-12644 (2017)- 2016
[j1]Qing Qian
, Hong-Xia Wang, Yi Hu, Lin-Na Zhou, Jin-Feng Li:
A dual fragile watermarking scheme for speech authentication. Multim. Tools Appl. 75(21): 13431-13450 (2016)
[c6]Qing Qian, Hongxia Wang, Canghong Shi
, Huan Wang:
An efficient content authentication scheme in encrypted speech based on integer wavelet transform. APSIPA 2016: 1-8
[c5]Canghong Shi
, Hongxia Wang, Qing Qian, Huan Wang:
Privacy Protection of Digital Speech Based on Homomorphic Encryption. ICCCS (1) 2016: 365-376
[c4]Qing Qian, Hongxia Wang, Sani M. Abdullahi
, Huan Wang, Canghong Shi
:
Speech Authentication and Recovery Scheme in Encrypted Domain. IWDW 2016: 46-60
[c3]Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi
:
Identification of Electronic Disguised Voices in the Noisy Environment. IWDW 2016: 75-87
[c2]Sani M. Abdullahi
, Hongxia Wang, Qing Qian, Wencheng Cao:
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication. IWDW 2016: 129-144- 2011
[c1]Hongxia Wang, Mingquan Fan, Qing Qian:
Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack. CSE 2011: 335-338
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-23 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







