Tong Qiao

1.4k total citations
60 papers, 917 citations indexed

About

Tong Qiao is a scholar working on Computer Vision and Pattern Recognition, Media Technology and Artificial Intelligence. According to data from OpenAlex, Tong Qiao has authored 60 papers receiving a total of 917 indexed citations (citations by other indexed papers that have themselves been cited), including 52 papers in Computer Vision and Pattern Recognition, 15 papers in Media Technology and 10 papers in Artificial Intelligence. Recurrent topics in Tong Qiao's work include Digital Media Forensic Detection (43 papers), Advanced Steganography and Watermarking Techniques (33 papers) and Chaos-based Image/Signal Encryption (12 papers). Tong Qiao is often cited by papers focused on Digital Media Forensic Detection (43 papers), Advanced Steganography and Watermarking Techniques (33 papers) and Chaos-based Image/Signal Encryption (12 papers). Tong Qiao collaborates with scholars based in China, France and United Kingdom. Tong Qiao's co-authors include Ming Xu, Ning Zheng, Florent Retraint, Stephen Marshall, Jinchang Ren, Xiangyang Luo, Xiangyang Luo, Rémi Cogranne, Jón Atli Benediktsson and Huimin Zhao and has published in prestigious journals such as IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Transactions on Geoscience and Remote Sensing and IEEE Access.

In The Last Decade

Tong Qiao

58 papers receiving 877 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tong Qiao China 18 718 208 173 104 56 60 917
Giovanni Chierchia France 12 389 0.5× 189 0.9× 65 0.4× 37 0.4× 14 0.3× 32 554
Hiuk Jae Shim South Korea 12 373 0.5× 230 1.1× 45 0.3× 82 0.8× 87 1.6× 31 511
M. Wilscy India 14 315 0.4× 97 0.5× 124 0.7× 50 0.5× 7 0.1× 54 430
Jiwu Huang China 19 1.4k 1.9× 207 1.0× 92 0.5× 165 1.6× 3 0.1× 41 1.5k
Hanqing Zhao China 10 803 1.1× 45 0.2× 217 1.3× 94 0.9× 4 0.1× 19 892
Alessia De Rosa Italy 17 1.3k 1.8× 318 1.5× 146 0.8× 117 1.1× 2 0.0× 51 1.4k
S. Ravi Kumar United States 5 1.1k 1.5× 252 1.2× 107 0.6× 67 0.6× 21 0.4× 9 1.2k
Sanjiv Kumar United States 7 317 0.4× 85 0.4× 267 1.5× 34 0.3× 37 0.7× 22 595
Damianos Karakos United States 18 411 0.6× 196 0.9× 659 3.8× 258 2.5× 16 0.3× 57 1.1k
Minghua Wang China 12 260 0.4× 352 1.7× 66 0.4× 46 0.4× 75 1.3× 32 538

Countries citing papers authored by Tong Qiao

Since Specialization
Citations

This map shows the geographic impact of Tong Qiao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tong Qiao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tong Qiao more than expected).

Fields of papers citing papers by Tong Qiao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tong Qiao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tong Qiao. The network helps show where Tong Qiao may publish in the future.

Co-authorship network of co-authors of Tong Qiao

This figure shows the co-authorship network connecting the top 25 collaborators of Tong Qiao. A scholar is included among the top collaborators of Tong Qiao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tong Qiao. Tong Qiao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Qiao, Tong, et al.. (2024). Deepfake Detection Fighting Against Noisy Label Attack. IEEE Transactions on Multimedia. 26. 9047–9059. 4 indexed citations
2.
Hu, Weitong, et al.. (2024). Privacy-preserving face recognition method based on extensible feature extraction. Journal of Visual Communication and Image Representation. 100. 104140–104140. 3 indexed citations
3.
Hameed, Mohamed Abdel, M. Hassaballah, & Tong Qiao. (2024). IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks. Multimedia Systems. 30(3). 5 indexed citations
4.
Qiao, Tong, et al.. (2024). Fully Unsupervised Deepfake Video Detection Via Enhanced Contrastive Learning. IEEE Transactions on Pattern Analysis and Machine Intelligence. 46(7). 4654–4668. 13 indexed citations
5.
Qiao, Tong, Ran Shi, Meng Han, et al.. (2024). Scalable Universal Adversarial Watermark Defending Against Facial Forgery. IEEE Transactions on Information Forensics and Security. 19. 8998–9011. 8 indexed citations
6.
Qiao, Tong, et al.. (2023). CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images. IEEE Transactions on Cognitive and Developmental Systems. 16(1). 369–379. 15 indexed citations
7.
Qiao, Tong, et al.. (2022). Novel Hidden Bit Location Method towards JPEG Steganography. Security and Communication Networks. 2022. 1–13. 6 indexed citations
8.
Shi, Ran, Jing Ma, King Ngi Ngan, Jian Xiong, & Tong Qiao. (2022). Objective Object Segmentation Visual Quality Evaluation: Quality Measure and Pooling Method. ACM Transactions on Multimedia Computing Communications and Applications. 18(3). 1–19. 3 indexed citations
9.
Qiao, Tong, et al.. (2022). Deepfake Video Detection Based on MesoNet with Preprocessing Module. Symmetry. 14(5). 939–939. 22 indexed citations
10.
Retraint, Florent, et al.. (2022). Image splicing forgery detection using simplified generalized noise model. Signal Processing Image Communication. 107. 116785–116785. 11 indexed citations
11.
Qiao, Tong, et al.. (2022). Sign steganography revisited with robust domain selection. Signal Processing. 196. 108522–108522. 13 indexed citations
12.
Xu, Ming, et al.. (2021). A novel file carving algorithm for docker container logs recorded by json-file logging driver. Forensic Science International Digital Investigation. 39. 301272–301272. 3 indexed citations
13.
Qiao, Tong, et al.. (2021). Geographical position spoofing detection based on camera sensor fingerprint. Journal of Visual Communication and Image Representation. 81. 103320–103320. 1 indexed citations
14.
Xu, Ming, et al.. (2020). Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images. JUCS - Journal of Universal Computer Science. 25. 1151. 3 indexed citations
15.
Liu, Yuchen, et al.. (2020). Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP Journal on Image and Video Processing. 2020(1). 12 indexed citations
16.
Zhu, Aichun, et al.. (2018). Multiple human upper bodies detection via candidate-region convolutional neural network. Multimedia Tools and Applications. 78(12). 16077–16096. 4 indexed citations
17.
Qiao, Tong, Aichun Zhu, & Florent Retraint. (2017). Exposing image resampling forgery by using linear parametric model. Multimedia Tools and Applications. 77(2). 1501–1523. 23 indexed citations
18.
Qiao, Tong, et al.. (2014). Statistical detection of Jsteg steganography using hypothesis testing theory. HAL (Le Centre pour la Communication Scientifique Directe). 5517–5521. 13 indexed citations
19.
Qiao, Tong, Jinchang Ren, C. Craigie, Stephen Marshall, & Charlotte A. Maltin. (2013). Effective compression of hyperspectral imagery using improved three dimensional discrete cosine transform. 14. 1–2.
20.
Qian, Zhenxing & Tong Qiao. (2013). Simplified Anti-Forensics of JPEG Compression. Journal of Computers. 8(10). 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026