Chenqi Kong

614 total citations
17 papers, 356 citations indexed

About

Chenqi Kong is a scholar working on Computer Vision and Pattern Recognition, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Chenqi Kong has authored 17 papers receiving a total of 356 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Computer Vision and Pattern Recognition, 5 papers in Signal Processing and 3 papers in Artificial Intelligence. Recurrent topics in Chenqi Kong's work include Face recognition and analysis (8 papers), Biometric Identification and Security (5 papers) and Digital Media Forensic Detection (4 papers). Chenqi Kong is often cited by papers focused on Face recognition and analysis (8 papers), Biometric Identification and Security (5 papers) and Digital Media Forensic Detection (4 papers). Chenqi Kong collaborates with scholars based in Hong Kong, China and Singapore. Chenqi Kong's co-authors include Shiqi Wang, Haoliang Li, Hon‐Yeung Cheung, Anderson Rocha, Baoliang Chen, Sam Kwong, Alex C. Kot, Yongjian Hu, Xiangui Kang and Jiwu Huang and has published in prestigious journals such as IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Transactions on Image Processing and Journal of Chromatography A.

In The Last Decade

Chenqi Kong

15 papers receiving 351 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chenqi Kong Hong Kong 11 238 83 70 51 37 17 356
Weili Yang China 10 109 0.5× 182 2.2× 9 0.1× 42 0.8× 25 0.7× 24 299
Toan Tran Vietnam 8 90 0.4× 12 0.1× 5 0.1× 102 2.0× 14 0.4× 11 276
Yaoyao Zhong China 10 341 1.4× 143 1.7× 2 0.0× 144 2.8× 28 0.8× 23 453
Ayesha Siddiqa Pakistan 7 238 1.0× 30 0.4× 3 0.0× 59 1.2× 8 0.2× 22 306
Pedro H. Bugatti Brazil 12 137 0.6× 15 0.2× 4 0.1× 81 1.6× 84 2.3× 36 335
Vuong M. Ngo Vietnam 8 56 0.2× 8 0.1× 6 0.1× 73 1.4× 6 0.2× 30 273
Ko-Chin Chang Taiwan 8 331 1.4× 101 1.2× 3 0.0× 18 0.4× 3 0.1× 17 412
Nidhal K. El Abbadi Iraq 9 118 0.5× 12 0.1× 2 0.0× 36 0.7× 14 0.4× 52 260
R. Cristin India 9 79 0.3× 24 0.3× 2 0.0× 88 1.7× 18 0.5× 31 279
Abid Sarwar India 11 67 0.3× 5 0.1× 12 0.2× 184 3.6× 17 0.5× 26 331

Countries citing papers authored by Chenqi Kong

Since Specialization
Citations

This map shows the geographic impact of Chenqi Kong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chenqi Kong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chenqi Kong more than expected).

Fields of papers citing papers by Chenqi Kong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chenqi Kong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chenqi Kong. The network helps show where Chenqi Kong may publish in the future.

Co-authorship network of co-authors of Chenqi Kong

This figure shows the co-authorship network connecting the top 25 collaborators of Chenqi Kong. A scholar is included among the top collaborators of Chenqi Kong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chenqi Kong. Chenqi Kong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Kong, Chenqi, et al.. (2026). Open-Set Deepfake Detection: A Parameter-Efficient Adaptation Method with Forgery Style Mixture. IEEE Transactions on Circuits and Systems for Video Technology. 1–1.
2.
Kong, Chenqi, et al.. (2025). Pixel-Inconsistency Modeling for Image Manipulation Localization. IEEE Transactions on Pattern Analysis and Machine Intelligence. 47(6). 4455–4472. 11 indexed citations
3.
Kong, Chenqi, Anwei Luo, Haoliang Li, et al.. (2025). MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection. IEEE Transactions on Dependable and Secure Computing. 23(1). 82–96.
4.
Xia, Song, Xun Lin, Chenqi Kong, et al.. (2025). Toward Model Resistant to Transferable Adversarial Examples via Trigger Activation. IEEE Transactions on Information Forensics and Security. 20. 3745–3757. 2 indexed citations
5.
Cai, Rizhao, Zitong Yu, Chenqi Kong, et al.. (2024). S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. IEEE Transactions on Information Forensics and Security. 19. 8385–8397. 13 indexed citations
6.
Kong, Chenqi, et al.. (2024). M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System. IEEE Transactions on Dependable and Secure Computing. 21(6). 5650–5666. 14 indexed citations
7.
Cai, Rizhao, Chenqi Kong, Yakun Ju, et al.. (2024). Forgery-Aware Adaptive Learning With Vision Transformer for Generalized Face Forgery Detection. IEEE Transactions on Circuits and Systems for Video Technology. 35(5). 4116–4129. 8 indexed citations
8.
Kong, Chenqi, Shiqi Wang, & Haoliang Li. (2023). Digital and Physical Face Attacks: Reviewing and One Step Further. APSIPA Transactions on Signal and Information Processing. 12(1). 1–51. 24 indexed citations
9.
Kong, Chenqi, Haoliang Li, & Shiqi Wang. (2023). Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation. 102–107. 15 indexed citations
10.
Li, Jiaxing, Chenqi Kong, Shiqi Wang, & Haoliang Li. (2023). Two-Branch Multi-Scale Deep Neural Network for Generalized Document Recapture Attack Detection. 1–5. 6 indexed citations
11.
Kong, Chenqi, et al.. (2023). Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. IEEE Transactions on Information Forensics and Security. 19. 1168–1182. 36 indexed citations
12.
Kong, Chenqi, et al.. (2022). Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones. IEEE Transactions on Information Forensics and Security. 17. 3238–3253. 28 indexed citations
13.
Chen, Baoliang, et al.. (2022). No-Reference Image Quality Assessment by Hallucinating Pristine Features. IEEE Transactions on Image Processing. 31. 6139–6151. 20 indexed citations
14.
Kong, Chenqi, Baoliang Chen, Haoliang Li, et al.. (2022). Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-Level Telltales. IEEE Transactions on Information Forensics and Security. 17. 1741–1756. 70 indexed citations
15.
Kong, Chenqi, et al.. (2021). Appearance Matters, So Does Audio: Revealing the Hidden Face via Cross-Modality Transfer. IEEE Transactions on Circuits and Systems for Video Technology. 32(1). 423–436. 27 indexed citations
16.
Liu, Jian, Weisong Zhao, Chenguang Liu, et al.. (2019). Accurate aberration correction in confocal microscopy based on modal sensorless method. Review of Scientific Instruments. 90(5). 53703–53703. 2 indexed citations
17.
Cheung, Hon‐Yeung, et al.. (2001). Determination of bioactive diterpenoids from Andrographis paniculata by micellar electrokinetic chromatography. Journal of Chromatography A. 930(1-2). 171–176. 80 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026