default search action
Qi Han 0002
Person information
- affiliation: Harbin Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Qi Han — disambiguation page
- Qi Han 0001 — Colorado School of Mines, Golden, CO, USA
- Qi Han 0003 — Eindhoven University of Technology, The Netherlands
- Qi Han 0004 — Chongqing University of Science and Technology, Chongqing, China
- Qi Han 0005 — Air Force Engineering University, Xi'an, China
- Qi Han 0006 — Stuttgart University, Germany
- Qi Han 0007 — Nankai University, College of Computer Science, Tianjin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j46]Lin Ge, Qi Han, Xiaojun Tong, Qi Xue, Zhi Qiao:
High-Resolution Detection, Localization, and Classification of Multiple Magnetic Dipole Sources. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j45]Amr Megahed, Qi Han, Sondos M. Fadl:
Exposing deepfake using fusion of deep-learned and hand-crafted features. Multim. Tools Appl. 83(9): 26797-26817 (2024) - 2023
- [j44]Hao Chen, Qi Han, Qiong Li, Xiaojun Tong:
Image steganalysis with multi-scale residual network. Multim. Tools Appl. 82(14): 22009-22031 (2023) - [j43]Lin Ge, Qi Han, Xiaojun Tong, Yizhen Wang:
Detection, Location, and Classification of Multiple Dipole-like Magnetic Sources Based on L2 Norm of the Vertical Magnetic Gradient Tensor Data. Sensors 23(9): 4440 (2023) - [j42]Hao Chen, Qi Han, Qiong Li, Xiaojun Tong:
A novel general blind detection model for image forensics based on DNN. Vis. Comput. 39(1): 27-42 (2023) - 2022
- [j41]You Li, Qi Han, Qiong Li, Xiaojun Tong:
On the Correction of the Positional Error Caused by the Coordinate Origin in Tolley-Lawson Model. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j40]Amr Megahed, Qi Han:
Identify videos with facial manipulations based on convolution neural network and dynamic texture. Multim. Tools Appl. 81(30): 43441-43466 (2022) - [j39]You Li, Qi Han, Xiang Peng, Qiong Li, Xiaojun Tong:
A Magnetic Interference Compensation Method for Airborne Electronic Equipment without Current Sensors. Remote. Sens. 14(17): 4151 (2022) - [j38]Chao Zhang, Changping Du, Xiang Peng, Qi Han, Hong Guo:
An Aeromagnetic Compensation Method for Suppressing the Magnetic Interference Generated by Electric Current with Vector Magnetometer. Sensors 22(16): 6151 (2022) - [j37]Yizhen Wang, Qi Han, Dechen Zhan, Qiong Li:
A Data-Driven OBE Magnetic Interference Compensation Method. Sensors 22(20): 7732 (2022) - [j36]Hao Chen, Qi Han, Qiong Li, Xiaojun Tong:
Digital image manipulation detection with weak feature stream. Vis. Comput. 38(8): 2675-2689 (2022) - 2021
- [j35]Qi Han, Hao Chen, Liyang Yu, Qiong Li:
Robust Frame Duplication Detection for Degraded Videos. Secur. Commun. Networks 2021: 6616239:1-6616239:13 (2021) - [j34]Sondos M. Fadl, Qi Han, Qiong Li:
CNN spatiotemporal features and fusion for surveillance video forgery detection. Signal Process. Image Commun. 90: 116066 (2021) - 2020
- [j33]Sondos M. Fadl, Qi Han, Li Qiong:
Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image. Multidimens. Syst. Signal Process. 31(4): 1365-1384 (2020) - [j32]Sondos M. Fadl, Amr Megahed, Qi Han, Qiong Li:
Frame duplication and shuffling forgery detection technique in surveillance videos based on temporal average and gray level co-occurrence matrix. Multim. Tools Appl. 79(25-26): 17619-17643 (2020) - [j31]Qiang Zhao, Qiong Li, Haokun Mao, Xuan Wen, Qi Han, Minghui Li:
Fault-tolerant quantum error correction code preparation in UBQC. Quantum Inf. Process. 19(8): 236 (2020) - 2019
- [j30]Qiong Li, Bing-Ze Yan, Haokun Mao, Xiao-Feng Xue, Qi Han, Hong Guo:
High-Speed and Adaptive FPGA-Based Privacy Amplification in Quantum Key Distribution. IEEE Access 7: 21482-21490 (2019) - [j29]Sondos M. Fadl, Qi Han, Qiong Li:
Inter-frame forgery detection based on differential energy of residue. IET Image Process. 13(3): 522-528 (2019) - [j28]Haokun Mao, Qiong Li, Qi Han, Hong Guo:
High-throughput and low-cost LDPC reconciliation for quantum key distribution. Quantum Inf. Process. 18(7): 232 (2019) - [j27]Yaxing Wang, Qiong Li, Qi Han, Yumeng Wang:
Modeling and simulation of practical quantum secure communication network. Quantum Inf. Process. 18(9): 278 (2019) - [j26]Guanyi Zhao, Qi Han, Xiang Peng, Pengyi Zou, Haidong Wang, Changping Du, He Wang, Xiaojun Tong, Qiong Li, Hong Guo:
An Aeromagnetic Compensation Method Based on a Multimodel for Mitigating Multicollinearity. Sensors 19(13): 2931 (2019) - 2018
- [j25]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - 2017
- [j24]Qi Han, Zhenjia Dou, Xiaojun Tong, Xiang Peng, Hong Guo:
A Modified Tolles-Lawson Model Robust to the Errors of the Three-Axis Strapdown Magnetometer. IEEE Geosci. Remote. Sens. Lett. 14(3): 334-338 (2017) - 2016
- [j23]Yanbin Tang, Junbin Fang, Kam-Pui Chow, Siu-Ming Yiu, Jun Xu, Bo Feng, Qiong Li, Qi Han:
Recovery of heavily fragmented JPEG files. Digit. Investig. 18 Supplement: S108-S117 (2016) - [j22]Mahmoud Emam, Qi Han, Liyang Yu, Hongli Zhang:
A Keypoint-Based Region Duplication Forgery Detection Algorithm. IEICE Trans. Inf. Syst. 99-D(9): 2413-2416 (2016) - [j21]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j20]Xianyan Wu, Qi Han, Xiamu Niu:
Reassembling fragmented BMP files based on padding bytes. J. Electronic Imaging 25(3): 033002 (2016) - [j19]Zhenjia Dou, Qi Han, Xiamu Niu, Xiang Peng, Hong Guo:
An Aeromagnetic Compensation Coefficient-Estimating Method Robust to Geomagnetic Gradient. IEEE Geosci. Remote. Sens. Lett. 13(5): 611-615 (2016) - [j18]Zhenjia Dou, Qi Han, Xiamu Niu, Xiang Peng, Hong Guo:
An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis. IEEE Geosci. Remote. Sens. Lett. 13(8): 1069-1073 (2016) - [j17]Liyang Yu, Qi Han, Xiamu Niu:
Feature point-based copy-move forgery detection: covering the non-textured areas. Multim. Tools Appl. 75(2): 1159-1176 (2016) - [j16]Mahmoud Emam, Qi Han, Xiamu Niu:
PCET based copy-move forgery detection in images under geometric transforms. Multim. Tools Appl. 75(18): 11513-11527 (2016) - [j15]Xianyan Wu, Qi Han, Xiamu Niu:
Quality Assessment for Reassembled Image Files. IEEE Signal Process. Lett. 23(2): 232-236 (2016) - 2015
- [j14]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence. IEICE Trans. Inf. Syst. 98-D(4): 985-988 (2015) - [j13]Liyang Yu, Qi Han, Xiamu Niu:
Qualified matching feature collection for feature point-based copy-move forgery detection. J. Electronic Imaging 24(2): 023035 (2015) - 2014
- [j12]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Background contrast based salient region detection. Neurocomputing 124: 57-62 (2014) - [j11]Huiyun Jing, Xin He, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
Saliency detection based on integrated features. Neurocomputing 129: 114-121 (2014) - [j10]Qi Han, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu:
A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching. J. Inf. Hiding Multim. Signal Process. 5(1): 13-19 (2014) - [j9]Liyang Yu, Qi Han, Xiamu Niu:
An improved contraction-based method for mesh skeleton extraction. Multim. Tools Appl. 73(3): 1709-1722 (2014) - 2013
- [j8]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Region Diversity Based Saliency Density Maximization for Salient Object Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 394-397 (2013) - [j7]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
CBRISK: Colored Binary Robust Invariant Scalable Keypoints. IEICE Trans. Inf. Syst. 96-D(2): 392-395 (2013) - [j6]Huiyun Jing, Qi Han, Xin He, Xiamu Niu:
Saliency Density and Edge Response Based Salient Object Detection. IEICE Trans. Inf. Syst. 96-D(5): 1243-1246 (2013) - [j5]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu:
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11): 2986-3000 (2013) - 2011
- [j4]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Bayes' Theorem-Based Saliency Detection Model. IEICE Trans. Inf. Syst. 94-D(12): 2545-2548 (2011) - 2009
- [j3]Zhifang Wang, Qi Han, Xiamu Niu:
Complex kernel PCA for multimodal biometric recognition. IEICE Electron. Express 6(16): 1131-1136 (2009) - [j2]Zhifang Wang, Qi Han, Christoph Busch:
A Novel Iris Location Algorithm. Int. J. Pattern Recognit. Artif. Intell. 23(1): 59-70 (2009) - 2008
- [j1]Qi Han, Zhifang Wang, Xiamu Niu:
An Improved Biometric Template Protection Method based on Non-Uniform Quantization. J. Digit. Inf. Manag. 6(2): 168-173 (2008)
Conference and Workshop Papers
- 2021
- [c35]Wenhan Li, Wenqing Xie, Zhifang Wang, Qi Han:
Complex-valued Channel-weighted Aggregated Residual Networks for Image Recognition. EITCE 2021: 402-407 - 2020
- [c34]Amr Megahed, Qi Han:
Face2Face Manipulation Detection Based on Histogram of Oriented Gradients. TrustCom 2020: 1260-1267 - 2019
- [c33]Zhiyuan Hang, Futong He, Zhifang Wang, Qi Han:
A Simulation Method of Generating the Output of Magnetometer for Aeromagnetic Compensation. IGARSS 2019: 2875-2878 - [c32]Yizhen Wang, Qi Han, Kai Hu, Dechen Zhan:
An Automatic Method to Estimate the Calibration Quality of the Aeromagnetic Compensation. IGARSS 2019: 3554-3557 - 2018
- [c31]Sondos M. Fadl, Qi Han, Qiong Li:
Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average. IWDW 2018: 337-350 - 2017
- [c30]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - 2016
- [c29]Mahmoud Emam, Qi Han, Hongli Zhang:
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH. ICYCSEE (1) 2016: 326-334 - 2015
- [c28]Qiong Li, Shuming Wang, Haokun Mao, Qi Han, Xiamu Niu:
An Adaptive Improved Winnow Algorithm. COMPSAC Workshops 2015: 303-306 - [c27]Mahmoud Emam, Qi Han, Liyang Yu, Ye Zhang, Xiamu Niu:
A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform. ICDIP 2015: 963104 - [c26]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c25]Liyang Yu, Qi Han, Xiamu Niu:
Detecting Duplicated Frames by Mapping Frames to 3D Skeletons. IIH-MSP 2015: 168-171 - [c24]Xianyan Wu, Qi Han, Xiamu Niu:
Improving Weights for Graph-Based Image Fragment Reassembly. IIH-MSP 2015: 219-222 - [c23]Qi Han, Huanran Wang, Xiamu Niu, Zhifang Wang:
Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters. RVSP 2015: 31-34 - 2014
- [c22]Liyang Yu, Qi Han, Xiamu Niu:
Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor. IC2E 2014: 510-513 - [c21]Xianyan Wu, Qi Han, Xiamu Niu:
An adaptive transfer scheme based on sparse representation for figure-ground segmentation. ICIP 2014: 3327-3331 - [c20]Zhenjia Dou, Kexin Ren, Qi Han, Xiamu Niu:
A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQ. IIH-MSP 2014: 243-246 - 2013
- [c19]Jialiang Peng, Qiong Li, Qi Han, Xiamu Niu:
Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis. CCBR 2013: 216-224 - [c18]Tiejun Zhang, Qi Han, Handan Hou, Xiamu Niu:
Local Invariant Shape Feature for Cartoon Image Retrieval. RVSP 2013: 107-110 - 2012
- [c17]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Nonparametric Approach for Saliency Detection Using Multiple Features. ACIIDS (2) 2012: 83-90 - [c16]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis. ACIIDS (2) 2012: 91-98 - [c15]Xin He, Huiyun Jing, Xuefeng Bai, Li Li, Qi Han, Xiamu Niu:
Saliency based SIFT keypoints filtration. ICDIP 2012: 833415 - [c14]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Saliency-Based Region Log Covariance Feature for Image Copy Detection. IWDW 2012: 327-335 - 2011
- [c13]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
A Saliency Detection Model Based on Local and Global Kernel Density Estimation. ICONIP (1) 2011: 164-171 - [c12]Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. IIH-MSP 2011: 101-104 - [c11]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Saliency Detection Approach to Combine LSK and Color for Color Image. IIH-MSP 2011: 129-132 - 2010
- [c10]Li Li, Qi Han, Xiamu Niu:
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. IIH-MSP 2010: 478-481 - 2009
- [c9]Qi Han, Qiong Li, Xiamu Niu:
Perceptual Content Authentication and Tamper Detection of Facial Image. IIH-MSP 2009: 811-814 - [c8]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
Template Protection for Multimodal Biometric System. IIH-MSP 2009: 1101-1104 - [c7]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
Feature-Level Fusion of Iris and Face for Personal Identification. ISNN (3) 2009: 356-364 - 2008
- [c6]Qi Han, Chen Song, Meihui Zhang, Xiamu Niu:
A Novel Facial Image Retrieval Algorithm Based on PLT-PCA. IIH-MSP 2008: 87-90 - [c5]Qi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu:
A Face Image Database for Evaluating Out-of-Focus Blur. ISDA (2) 2008: 277-282 - [c4]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
A Novel Template Protection Algorithm for Iris Recognition. ISDA (2) 2008: 340-345 - 2007
- [c3]Qi Han, Qiong Li, Xiongdong Huang, Tong Zhou, Xiamu Niu:
Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color. IIH-MSP 2007: 608-611 - 2006
- [c2]Yong Zhang, Xiamu Niu, Abid Khan, Qiong Li, Qi Han:
A Novel Method of Watermarking Relational Databases using Character String. Artificial Intelligence and Applications 2006: 120-124 - [c1]Qi Han, Zhifang Wang, Xiamu Niu:
A Non-uniform Quantizing Approach to Protect Biometric Templates. IIH-MSP 2006: 693-698
Informal and Other Publications
- 2020
- [i4]Yaxing Wang, Qiong Li, Haokun Mao, Qi Han:
Topological optimization of hybrid quantum key distribution networks. CoRR abs/2003.14100 (2020) - 2019
- [i3]Yaxing Wang, Qiong Li, Qi Han, Yumeng Wang:
Modeling and Simulation of Practical Quantum Secure Communication Network. CoRR abs/1904.10710 (2019) - [i2]Qiong Li, Yaxing Wang, Haokun Mao, Jiameng Yao, Qi Han:
Analytical Model and Topology Evaluation of Quantum Secure Communication Network. CoRR abs/1909.02463 (2019) - 2014
- [i1]Xianyan Wu, Qi Han, Dan Le, Xiamu Niu:
A New Method for Estimating the Widths of JPEG Images. CoRR abs/1410.2100 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint