|
Sheng LI (李晟) Associate Professor, School of Computer Science, Fudan University Email: lisheng [at] fudan.edu.cn |
I received the Ph.D. degree from the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, in 2013, under the supervision of Prof. Alex Kot. From 2013 to 2016, I was a Research Fellow at the Rapid Rich Object Search Lab, Nanyang Technological University. I am currently an Associate Professor with the School of Computer Science, Fudan University, China. I am a recipient of the IEEE WIFS Best Student Paper Silver Award.
RESEARCH
- Biometrics
- Privacy Protection
- Presentation Attack Detection
- Multimedia Forensics and Security
- Image Forensics
- Data Hiding
- Steganalysis
- Image Recognition, Deep Learning, AI security
PUBLICATIONS
corresponding author*, equal contribution#
Journal (selected)
- X. Hu, S. Li, Q. Ying, W. Peng, X. Zhang and Z. Qian, Establishing Robust Generative Image Steganography via Popular Stable Diffusion, IEEE Transactions on Information Forensics and Security, too appear.
- Z. Wang, S. Li, X. Zhang and G. Feng, Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 7, no. 1, pp. 250-260, Feb. 2023.
- W. Peng, S. Li, Z. Qian and X. Zhang, Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 31, pp. 3513-3526, 2023.
- Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Transactions on Multimedia, doi: 10.1109/TMM.2023.3281087.
- Q. Ying, H. Zhou, Z. Qian, S. Li and X. Zhang, Learning to Immunize Images for Tamper Localization and Self-Recovery, IEEE Transactions on Pattern Analysis and Machine Intelligence, doi: 10.1109/TPAMI.2023.3301958.
- S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3253691.
- Z. Zhu, P. Wei, Z. Qian, S. Li*, X. Zhang, Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding, IEEE Transactions on Circuits and Systems for Video Technology, to apprear.
- Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li*, Z. Qian*, High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2022.3163905.
- Q. Wang, S. Li, X. Zhang and G. Feng, Multi-granularity Brushstrokes Network for Universal Style Transfer, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 18, issue. 4, no. 107, pp. 1-17, 2022.
- W. Huan, S. Li*, Z. Qian* and X. Zhang, Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1955-1965, April 2022.
- X. Zhu, S. Li*, X. Zhang, H. Li, and A. C. Kot, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 2039-2045, 2021.
- G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li*, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 2, pp. 376-386, 2020. (ESI highly cited)
- S. Li*, X. Zhang, Z. Qian, G. Feng and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, pp. 828-840, 1 July-Aug. 2020.
- S. Li* and X. Zhang, Toward Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Transactions on Image Processing, vol. 28, no. 3, pp. 1482-1497, March 2019. (ESI highly cited) [Reported by IEEE Spectrum]
- J. Tao, S. Li*, X. Zhang and Z. Wang, Towards Robust Image Steganography, IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594-600, Feb. 2019. (ESI highly cited)
- Y. Wang, S. Li, and A. C. Kot, On Branded Handbag Recognition, IEEE Transactions on Multimedia, 18 (9), pp. 1869-1881, 2016.
- Y. Wang, S. Li, and A. C. Kot, Deepbag: Recognizing Handbag Models, IEEE Transactions on Multimedia, 17 (11), pp. 2072-2083, 2015.
- S. Li and A. C. Kot, Fingerprint Combination for Privacy Protection, IEEE Transactions on Information Forensics and Security, 8 (2), pp. 350-360, 2013.
- S. Li and A. C. Kot, An Improved Scheme for Full Fingerprint Reconstruction, IEEE Transactions on Information Forensics and Security, 7 (6), pp. 1906 – 1912, 2012.
- S. Li and A. C. Kot, Privacy Protection of Fingerprint Database, IEEE Signal Processing Letters, 18 (2), pp. 115-118, 2011.
Conference (selected)
- J. Huang, Z. Guo, G. Luo, Z. Qian, S. Li, and X. Zhang, Disentangled Style Domain for Implicit z-Watermark Towards Copyright Protection, The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS), 2024.
- M. Wang, G. Hua, S. Li*, and G. Feng, A Key-Driven Framework for Identity-Preserving Face Anonymization, Network and Distributed System Security Symposium (NDSS), 2025.
- G. Luo, Y. Ma, M. Zhang, J. Huang, S. Li, Z. Qian, X. Zhang, Engaging Live Video Comments Generation, ACM International Conference on Multimedia (MM),2024.
- X. Mao, X. Hu, W. Peng, Z. Gan, Z. Qian, X. Zhang, S. Li, From Covert Hiding To Visual Editing: Robust Generative Video Steganography, ACM International Conference on Multimedia (MM),2024.
- G. Li, S. Li*, Z. Qian, X. Zhang, Cover-separable Fixed Neural Network Steganography via Deep Generative Models, ACM International Conference on Multimedia (MM),2024.
- X. Liu, Y. Yang, H. Wang, Q. Ying, Z. Qian, X. Zhang, S. Li, Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization, ACM International Conference on Multimedia (MM),2024.
- J. Li, H. Wang, S. Li*, Z. Qian, X. Zhang, A. Vasilakos, Are handcrafted filters helpful for attributing AI-generated images?, ACM International Conference on Multimedia (MM),2024.
- G. Li#, S. Li#, Z. Luo, Z. Qian and X. Zhang. Purified and Unified Steganographic Network, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
- Q. Ying, J. Liu, S. Li*, H. Xu, Z. Qian* and X. Zhang,RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection, ACM International Conference on Multimedia (MM), 2023.
- Z. Luo, S. Li*, G. Li, Z. Qian and X. Zhang, Securing Fixed Neural Network Steganography, ACM International Conference on Multimedia (MM),2023.
- H. Wang, S. Li*, S. Cao, R. Yang, J. Zeng, Z. Qian and X. Zhang, On Physically Occluded Fake Identity Document Detection, ACM International Conference on Multimedia (MM), 2023.
- Q. Wang, S. Li*, X. Zhang and G. Feng*, Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images, ACM International Conference on Multimedia (MM), 2023.
- M. Zhang, G. Luo, Y. Ma, S. Li, Z. Qian and X. Zhang, VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts, ACM International Conference on Multimedia (MM), 2023.
- G. Liu, Y. Si, Z. Qian, X. Zhang, S. Li and Wanli Peng “WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs,” ACM International Conference on Multimedia (MM), 2023.
- J. Tan, N. Zhong, Z. Qian, X. Zhang and S. Li, Deep Neural Network Watermarking against Model Extraction Attack, ACM International Conference on Multimedia (MM), 2023.
- X. Hu, Q. Ying, Z. Qian, S. Li and X. Zhang, DRAW: Defending Camera-shooted RAW against Image Manipulation, IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
- G. Luo, M. Zhang, Y. Ma, S. Li, Z. Qian and X. Zhang, Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Context, ACM International Conference on Information & Knowledge Management (CIKM), 2023.
- G. Li, S. Li*, M. Li, X. Zhang*, Z. Qian, Steganography of Steganographic Networks, AAAI, 2023.
- Z. Yuan, Z. You, S. Li*, Z. Qian*, X. Zhang, and A. C. Kot, On Generating Identifiable Virtual Faces, ACM International Conference on Multimedia (MM), 2022 (oral).
- Z. You, Q. Ying, S. Li*, Z. Qian*, and X. Zhang, Image Generation Network for Covert Transmission in Online Social Network, ACM International Conference on Multimedia (MM), 2022.
- P. Wei, S. Li, X. Zhang, Z. Qian, G. Luo, and Q. Zhou, Generative Steganography Network, ACM International Conference on Multimedia (MM), 2022.
- B. Zhang, S. Li*, G. Feng, X. Zhang, and Z. Qian, Patch Diffusion: A General Module for Face Manipulation Detection, AAAI, 2022.
- L. Feng, S. Li, Z. Qian, and X. Zhang, Unlabeled Backdoor Poisoning in Semi-Supervised Learning, IEEE International Conference on Multimedia(ICME), 2022.
- P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, Generative Steganographic Flow, IEEE International Conference on Multimedia (ICME), 2022.
- K. Chen, X. Zeng, Q. Ying, S. Li, Z. Qian, and X. Zhang, Invertible Image Dataset Protection, IEEE International Conference on Multimedia (ICME), 2022.
- G. Li, S. Li*, Z. Qian, and X. Zhang, Encryption Resistant Deep Neural Network Watermarking, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- S. Qi, S. Li, P. Wei, L. Ge, X. Zhang, Z. Qian, Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- L. Feng, S. Li, Z. Qian and X. Zhang, Stealthy Backdoor Attack with Adversarial Training, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian and S. Li, Image Steganalysis with Convolutional Vision Transformer, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- M. Li, N. Zhong, X. Zhang, Z. Qian and S. Li, Object-Oriented Backdoor Attack Against Image Captioning, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- S. Li, X. Zhu, G. Feng, X. Zhang and Z. Qian, Diffusing the Liveness Cues for Face Anti-spoofing, ACM International Conference on Multimedia (MM), 2021.
- Z. You, S. Li, Z. Qian* and X. Zhang, Reversible Privacy-Preserving Recognition, IEEE International Conference on Multimedia and Expo (ICME), 2021.
- M. Shi, S. Li, Z. Yin, X. Zhang* and Z. Qian, On Generating JPEG Adversarial Images, IEEE International Conference on Multimedia and Expo (ICME), 2021.
- H. Zhan, S. Li and A. C. Kot, Tagging the Shoe Images by Semantic Attributes, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 892-895.
- Y. Wang, S. Li and A. C. Kot, Quality Guided Handbag Segmentation, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 896-900.
- Y. Wang, S. Li and A. C. Kot, Joint Learning for Image-based Handbag Recommendation, IEEE International Conference on Multimedia and Expo (ICME), Turin, 2015, pp. 1-6.
- Y. Wang, S. Li and A. C. Kot, Complementary Feature Extraction for Branded Handbag Recognition, IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5896-5900.
- S. Li* and A. C. Kot, Attack Using Reconstructed Fingerprint, IEEE International Workshop on Information Forensics and Security (WIFS), Iguacu Falls, 2011, pp. 1-6. [Best Student Paper Silver Award]
- S. Li* and A. C. Kot, Privacy Protection of Fingerprint Database Using Lossless Data Hiding, IEEE International Conference on Multimedia and Expo (ICME), Suntec City, 2010, pp. 1293-1298.
Back
FUNDINGS
xxxxFake Certificate Detection |
Alibaba Innovative Research (AIR) Program Supported by Alibaba Group |
PI |
2022.3-2023.3 |
Package Watermarking |
SIIA Tech Research Project |
PI |
2022.1-2022.7 |
Artificial Intelligence Security Model and Testing Methods |
National Natural Science Foundation of China, Key Project |
co-PI |
2021.1-2023.12 |
Robust Image Steganography for Social Networks |
National Natural Science Foundation of China |
PI |
2021.1-2023.12 |
xxxProtection Methods |
The National Key Research and Development Program of China |
co-PI |
2019.7-2022.6 |
Biometrics Data Protection based on Data Hiding |
Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security, Key Project |
PI |
2019.1-2021.12 |
Fingerprint Data Hiding and Disguising |
National Natural Science Foundation of China |
PI |
2017.1-2019.12 |
Biometrics Disguising |
Shanghai Sailing Program |
PI |
2016.6-2019.5 |
Biometrics Security |
Shanghai Young Oriental Scholar |
PI |
2015-2018 |
Back
SERVICES
International Journal Guest Editor:
- Mathematical Methods Applied in Explainable Fake Multimedia Detection, Mathematics, 2022 (Lead Guest Editor)
- Low complexity methods for multimedia security, Multimedia Systems, 2019
- Recent Advances in Deep Learning Model Security, Pattern Recognition Letters, 2021
Reviewer:
- IEEE Transactions on Pattern Analysis and Machine Intelligence
- IEEE Transactions on Image Processing
- IEEE Transactions on Information Forensics and Security
- IEEE Transactions on Multimedia
- IEEE Transactions on Neural Networks and Learning Systems
- IEEE Signal Processing Letters
- EURASIP Journal on Advances in Signal Processing
- IEEE International Conference on Image Processing
- IEEE International Conference on Multimedia and Expo
Back
AWARDS
Toward Construction Based Data Hiding: From Secrets to Fingerprint Images |
World Artificial Intelligence Conference, Best paper nomination |
2022 |
Shanghai Young Oriental Scholar |
2015 |
|
Attack Using Reconstructed Fingerprint |
IEEE WIFS Best Student Paper Silver Award |
2011 |
Steganograph based on Tolerable Error Range |
NCIG Best Student Paper Award |
2006 |
Back