Sheng Li

Orcid: 0000-0002-7932-9831

Affiliations:
  • Fudan University, School of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, China
  • Shanghai University, School of Communication and Information Engineering, China (former)
  • Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore (PhD 2013)


According to our database1, Sheng Li authored at least 85 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Source Style Transfer via Style Disentanglement Network.
IEEE Trans. Multim., 2024

Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput., 2024

Purified and Unified Steganographic Network.
CoRR, 2024

From Covert Hiding to Visual Editing: Robust Generative Video Steganography.
CoRR, 2024

2023
Learning to Immunize Images for Tamper Localization and Self-Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning.
Inf. Sci., November, 2023

Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding.
IEEE Trans. Circuits Syst. Video Technol., June, 2023

Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack.
IEEE Signal Process. Lett., 2023

Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models.
CoRR, 2023

Securing Fixed Neural Network Steganography.
CoRR, 2023

DRAW: Defending Camera-shooted RAW against Image Manipulation.
CoRR, 2023

Towards Deep Network Steganography: From Networks to Networks.
CoRR, 2023

Generative Steganography Diffusion.
CoRR, 2023

Trojaning semi-supervised learning model via poisoning wild images on the web.
CoRR, 2023

VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

On Physically Occluded Fake Identity Document Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Deep Neural Network Watermarking against Model Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Securing Fixed Neural Network Steganography.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Image Protection for Robust Cropping Localization and Recovery.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Identifying the Style of Chatting.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Steganography of Steganographic Networks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Multi-granularity Brushstrokes Network for Universal Style Transfer.
ACM Trans. Multim. Comput. Commun. Appl., 2022

High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2022

Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain.
IEEE Trans. Circuits Syst. Video Technol., 2022

Perceptual Hash of Neural Networks.
Symmetry, 2022

ACDB-EA: Adaptive convergence-diversity balanced evolutionary algorithm for many-objective optimization.
Swarm Evol. Comput., 2022

An SVD-based screen-shooting resilient watermarking scheme.
Multim. Tools Appl., 2022

Robust backdoor injection with the capability of resisting network transfer.
Inf. Sci., 2022

A novel hashing scheme via image feature map and 2D PCA.
IET Image Process., 2022

Exploring Depth Information for Face Manipulation Detection.
CoRR, 2022

Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
CoRR, 2022

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion.
CoRR, 2022

Multimodal Fake News Detection via CLIP-Guided Learning.
CoRR, 2022

HF-Defend: Defending Against Adversarial Examples Based on Halftoning.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

On Generating Identifiable Virtual Faces.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Image Generation Network for Covert Transmission in Online Social Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Generative Steganography Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Generative Steganographic Flow.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Unlabeled Backdoor Poisoning in Semi-Supervised Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Invertible Image Dataset Protection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

RWN: Robust Watermarking Network for Image Cropping Localization.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation.
Proceedings of the IEEE International Conference on Acoustics, 2022

Image Steganalysis with Convolutional Vision Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Object-Oriented Backdoor Attack Against Image Captioning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Encryption Resistant Deep Neural Network Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2022

Stealthy Backdoor Attack with Adversarial Training.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Diffusion: A General Module for Face Manipulation Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Detection of Spoofing Medium Contours for Face Anti-Spoofing.
IEEE Trans. Circuits Syst. Video Technol., 2021

Special issue on low complexity methods for multimedia security.
Multim. Syst., 2021

Destroying robust steganography in online social networks.
Inf. Sci., 2021

On Generating Identifiable Virtual Faces.
CoRR, 2021

Diffusing the Liveness Cues for Face Anti-spoofing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Fragile Neural Network Watermarking with Trigger Image Set.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Reversible Privacy-Preserving Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

On Generating JPEG Adversarial Images.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

2020
Key Based Artificial Fingerprint Generation for Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Diversity-Based Cascade Filters for JPEG Steganalysis.
IEEE Trans. Circuits Syst. Video Technol., 2020

2019
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images.
IEEE Trans. Image Process., 2019

Towards Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2019

Privacy protection based on binary fingerprint compression.
J. Real Time Image Process., 2019

An Improved Steganalysis Method Using Feature Combinations.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
A novel auxiliary data construction scheme for reversible data hiding in JPEG images.
Multim. Tools Appl., 2018

Lossless data hiding in JPEG bitstream using alternative embedding.
J. Vis. Commun. Image Represent., 2018

Steganography by Constructing Marbling Texture.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Data hiding in Fingerprint Minutiae Template for Privacy Protection.
CoRR, 2017

2016
On Branded Handbag Recognition.
IEEE Trans. Multim., 2016

2015
DeepBag: Recognizing Handbag Models.
IEEE Trans. Multim., 2015

Joint learning for image-based handbag recommendation.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Tagging the shoe images by semantic attributes.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Quality guided handbag segmentation.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

2014
Category-Separating Strategy for branded handbag recognition.
Proceedings of the 6th International Symposium on Communications, 2014

Complementary feature extraction for branded handbag recognition.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Fingerprint Combination for Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2013

2012
An Improved Scheme for Full Fingerprint Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2012

Quality assessment of finger-vein image.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Privacy Protection of Fingerprint Database.
IEEE Signal Process. Lett., 2011

Attack using reconstructed fingerprint.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

A novel system for fingerprint privacy protection<sup>1</sup>.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Privacy protection of fingerprint database using lossless data hiding.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010


  Loading...