● 2026
[83]
Unsupervised Deepfake Detection via Camera Source Clustering and Temporal-Spatial Features
Z. Li, C. Lu, Zahid Akhtar, T. Qiao
IEEE Transactions on Multimedia
Z. Li, C. Lu, Zahid Akhtar, T. Qiao
IEEE Transactions on Multimedia
● 2025
[82]
多模态大模型安全研究进展
郭园方 ,余梓彤 ,刘艾杉 ,周文柏 , 乔通 ,李斌,张卫明, 康显桂,周琳娜,俞能海,黄继武
中国图象图形学报, 2025, 30(6): 674-704
郭园方 ,余梓彤 ,刘艾杉 ,周文柏 , 乔通 ,李斌,张卫明, 康显桂,周琳娜,俞能海,黄继武
中国图象图形学报, 2025, 30(6): 674-704
[81]
Zero-Shot Interpretable Image Steganalysis for Invertible Image Hiding
H. Wang, Y. Yao, Y. Xie, T. Qiao,Z. Zhao
IEEE Signal Processing Letters
H. Wang, Y. Yao, Y. Xie, T. Qiao,Z. Zhao
IEEE Signal Processing Letters
[80]
DeepFake detection in the AIGC era: A survey, benchmarks, and future perspectives
S. Xie, S. Li, X. Zhang, J. Zhou, G. Feng T. Qiao
Information Fusion
S. Xie, S. Li, X. Zhang, J. Zhou, G. Feng T. Qiao
Information Fusion
[79]
Deepfake Video Traceability and Authentication via Source Attribution
C. Shi, M. Qiao, Z. Li, Z. Akhtar, B. Wang, M. Han, T. Qiao*
IET Biometrics
C. Shi, M. Qiao, Z. Li, Z. Akhtar, B. Wang, M. Han, T. Qiao*
IET Biometrics
[78]
A Data Ownership Authentication Method for Graph Neural Networks via Clean-Label Backdoor
X. Xing, M. Xu, Y. Bai, R. Zheng, T. Qiao
IEEE Internet of Things Journal
X. Xing, M. Xu, Y. Bai, R. Zheng, T. Qiao
IEEE Internet of Things Journal
● 2024
[77]
S2FB IoU: Improving Boundary-based Object-Centric Image
Segmentation Quality Evaluation (Best Student Paper)
R. E. Filali, S. Jdaba, R. Xie, R. Shi, T. Qiao*, Q. Pan, T. Wu
Proceedings of the 6th ACM International Conference on Multimedia in Asia
R. E. Filali, S. Jdaba, R. Xie, R. Shi, T. Qiao*, Q. Pan, T. Wu
Proceedings of the 6th ACM International Conference on Multimedia in Asia
[76]
Scalable Universal Adversarial Watermark Defending against Facial
Forgery
T. Qiao, B. Zhao, R. Shi, M. Han, M. Hassaballah, F. Retraint, X. Luo
IEEE Transactions on Information Forensics and Security
T. Qiao, B. Zhao, R. Shi, M. Han, M. Hassaballah, F. Retraint, X. Luo
IEEE Transactions on Information Forensics and Security
[75]
IS-DGM: an improved steganography method based on a deep
generative model and hyper logistic map encryption via social
media networks
M.A. Hameed, M. Hassaballah, T. Qiao
Multimedia Systems
M.A. Hameed, M. Hassaballah, T. Qiao
Multimedia Systems
[74]
Privacy-preserving face recognition method based on extensible
feature extraction
W. Hu, D. Zhou, Z. Zhu, T. Qiao, Y. Yao, M. Hassaballah
Journal of Visual Communication and Image Representation
W. Hu, D. Zhou, Z. Zhu, T. Qiao, Y. Yao, M. Hassaballah
Journal of Visual Communication and Image Representation
[73]
Deepfake Detection Fighting against Noisy Label Attack
T.Qiao, S.Xie, Y.Chen, F.Retraint, R.Shi, X.Luo
IEEE Transactions on Multimedia
T.Qiao, S.Xie, Y.Chen, F.Retraint, R.Shi, X.Luo
IEEE Transactions on Multimedia
[72]
Unsupervised Generative Fake Image Detector
T.Qiao, H.Shao, S.Xie, R.Shi
IEEE Transactions on Circuits and Systems for Video Technology
T.Qiao, H.Shao, S.Xie, R.Shi
IEEE Transactions on Circuits and Systems for Video Technology
[70]
Fully Unsupervised Deepfake Video Detection via Enhanced
Contrastive Learning
T. Qiao, S. Xie, Y. Chen, F. Retraint, X. Luo
IEEE Transactions on Pattern Analysis and Machine Intelligence
T. Qiao, S. Xie, Y. Chen, F. Retraint, X. Luo
IEEE Transactions on Pattern Analysis and Machine Intelligence