当前位置: X-MOL首页全球导师 国内导师 › 李晟

个人简介

I received the Ph.D. degree from the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, in 2013, under the supervision of Prof. Alex Kot. From 2013 to 2016, I was a Research Fellow at the Rapid Rich Object Search Lab, Nanyang Technological University. I am currently an Associate Professor with the School of Computer Science, Fudan University, China. I am a recipient of the IEEE WIFS Best Student Paper Silver Award. AWARDS Toward Construction Based Data Hiding: From Secrets to Fingerprint Images World Artificial Intelligence Conference, Best paper nomination 2022 Shanghai Young Oriental Scholar 2015 Attack Using Reconstructed Fingerprint IEEE WIFS Best Student Paper Silver Award 2011 Steganograph based on Tolerable Error Range NCIG Best Student Paper Award 2006

研究领域

Biometrics Privacy Protection Presentation Attack Detection Multimedia Forensics and Security Image Forensics Data Hiding Steganalysis Image Recognition, Deep Learning, AI security

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Journal (selected) Z. Wang, S. Li, X. Zhang and G. Feng, Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 7, no. 1, pp. 250-260, Feb. 2023. W. Peng, S. Li, Z. Qian and X. Zhang, Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 31, pp. 3513-3526, 2023. Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Transactions on Multimedia, doi: 10.1109/TMM.2023.3281087. Q. Ying, H. Zhou, Z. Qian, S. Li and X. Zhang, Learning to Immunize Images for Tamper Localization and Self-Recovery, IEEE Transactions on Pattern Analysis and Machine Intelligence, doi: 10.1109/TPAMI.2023.3301958. S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3253691. Z. Zhu, P. Wei, Z. Qian, S. Li*, X. Zhang, Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding, IEEE Transactions on Circuits and Systems for Video Technology, to apprear. Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li*, Z. Qian*, High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2022.3163905. Q. Wang, S. Li, X. Zhang and G. Feng, Multi-granularity Brushstrokes Network for Universal Style Transfer, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 18, issue. 4, no. 107, pp. 1-17, 2022. W. Huan, S. Li*, Z. Qian* and X. Zhang, Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1955-1965, April 2022. X. Zhu, S. Li*, X. Zhang, H. Li, and A. C. Kot, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 2039-2045, 2021. G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li*, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 2, pp. 376-386, 2020. (ESI highly cited) S. Li*, X. Zhang, Z. Qian, G. Feng and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, pp. 828-840, 1 July-Aug. 2020. S. Li* and X. Zhang, Toward Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Transactions on Image Processing, vol. 28, no. 3, pp. 1482-1497, March 2019. (ESI highly cited) [Reported by IEEE Spectrum] J. Tao, S. Li*, X. Zhang and Z. Wang, Towards Robust Image Steganography, IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594-600, Feb. 2019. (ESI highly cited) Y. Wang, S. Li, and A. C. Kot, On Branded Handbag Recognition, IEEE Transactions on Multimedia, 18 (9), pp. 1869-1881, 2016. Y. Wang, S. Li, and A. C. Kot, Deepbag: Recognizing Handbag Models, IEEE Transactions on Multimedia, 17 (11), pp. 2072-2083, 2015. S. Li and A. C. Kot, Fingerprint Combination for Privacy Protection, IEEE Transactions on Information Forensics and Security, 8 (2), pp. 350-360, 2013. S. Li and A. C. Kot, An Improved Scheme for Full Fingerprint Reconstruction, IEEE Transactions on Information Forensics and Security, 7 (6), pp. 1906 – 1912, 2012. S. Li and A. C. Kot, Privacy Protection of Fingerprint Database, IEEE Signal Processing Letters, 18 (2), pp. 115-118, 2011. Conference (selected) Q. Ying, J. Liu, S. Li*, H. Xu, Z. Qian* and X. Zhang,RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection, ACM International Conference on Multimedia (MM), 2023. Z. Luo, S. Li*, G. Li, Z. Qian and X. Zhang, Securing Fixed Neural Network Steganography, ACM International Conference on Multimedia (MM),2023. H. Wang, S. Li*, S. Cao, R. Yang, J. Zeng, Z. Qian and X. Zhang, On Physically Occluded Fake Identity Document Detection, ACM International Conference on Multimedia (MM), 2023. Q. Wang, S. Li*, X. Zhang and G. Feng*, Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images, ACM International Conference on Multimedia (MM), 2023. M. Zhang, G. Luo, Y. Ma, S. Li, Z. Qian and X. Zhang, VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts, ACM International Conference on Multimedia (MM), 2023. G. Liu, Y. Si, Z. Qian, X. Zhang, S. Li and Wanli Peng “WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs,” ACM International Conference on Multimedia (MM), 2023. J. Tan, N. Zhong, Z. Qian, X. Zhang and S. Li, Deep Neural Network Watermarking against Model Extraction Attack, ACM International Conference on Multimedia (MM), 2023. X. Hu, Q. Ying, Z. Qian, S. Li and X. Zhang, DRAW: Defending Camera-shooted RAW against Image Manipulation, IEEE/CVF International Conference on Computer Vision (ICCV), 2023. G. Luo, M. Zhang, Y. Ma, S. Li, Z. Qian and X. Zhang, Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Context, ACM International Conference on Information & Knowledge Management (CIKM), 2023. G. Li, S. Li*, M. Li, X. Zhang*, Z. Qian, Steganography of Steganographic Networks, AAAI, 2023. Z. Yuan, Z. You, S. Li*, Z. Qian*, X. Zhang, and A. C. Kot, On Generating Identifiable Virtual Faces, ACM International Conference on Multimedia (MM), 2022 (oral). Z. You, Q. Ying, S. Li*, Z. Qian*, and X. Zhang, Image Generation Network for Covert Transmission in Online Social Network, ACM International Conference on Multimedia (MM), 2022. P. Wei, S. Li, X. Zhang, Z. Qian, G. Luo, and Q. Zhou, Generative Steganography Network, ACM International Conference on Multimedia (MM), 2022. B. Zhang, S. Li*, G. Feng, X. Zhang, and Z. Qian, Patch Diffusion: A General Module for Face Manipulation Detection, AAAI, 2022. L. Feng, S. Li, Z. Qian, and X. Zhang, Unlabeled Backdoor Poisoning in Semi-Supervised Learning, IEEE International Conference on Multimedia(ICME), 2022. P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, Generative Steganographic Flow, IEEE International Conference on Multimedia (ICME), 2022. K. Chen, X. Zeng, Q. Ying, S. Li, Z. Qian, and X. Zhang, Invertible Image Dataset Protection, IEEE International Conference on Multimedia (ICME), 2022. G. Li, S. Li*, Z. Qian, and X. Zhang, Encryption Resistant Deep Neural Network Watermarking, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. S. Qi, S. Li, P. Wei, L. Ge, X. Zhang, Z. Qian, Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. L. Feng, S. Li, Z. Qian and X. Zhang, Stealthy Backdoor Attack with Adversarial Training, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian and S. Li, Image Steganalysis with Convolutional Vision Transformer, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. M. Li, N. Zhong, X. Zhang, Z. Qian and S. Li, Object-Oriented Backdoor Attack Against Image Captioning, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022. S. Li, X. Zhu, G. Feng, X. Zhang and Z. Qian, Diffusing the Liveness Cues for Face Anti-spoofing, ACM International Conference on Multimedia (MM), 2021. Z. You, S. Li, Z. Qian* and X. Zhang, Reversible Privacy-Preserving Recognition, IEEE International Conference on Multimedia and Expo (ICME), 2021. M. Shi, S. Li, Z. Yin, X. Zhang* and Z. Qian, On Generating JPEG Adversarial Images, IEEE International Conference on Multimedia and Expo (ICME), 2021. H. Zhan, S. Li and A. C. Kot, Tagging the Shoe Images by Semantic Attributes, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 892-895. Y. Wang, S. Li and A. C. Kot, Quality Guided Handbag Segmentation, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 896-900. Y. Wang, S. Li and A. C. Kot, Joint Learning for Image-based Handbag Recommendation, IEEE International Conference on Multimedia and Expo (ICME), Turin, 2015, pp. 1-6. Y. Wang, S. Li and A. C. Kot, Complementary Feature Extraction for Branded Handbag Recognition, IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5896-5900. S. Li* and A. C. Kot, Attack Using Reconstructed Fingerprint, IEEE International Workshop on Information Forensics and Security (WIFS), Iguacu Falls, 2011, pp. 1-6. [Best Student Paper Silver Award] S. Li* and A. C. Kot, Privacy Protection of Fingerprint Database Using Lossless Data Hiding, IEEE International Conference on Multimedia and Expo (ICME), Suntec City, 2010, pp. 1293-1298.

推荐链接
down
wechat
bug