 |
李晟 副教授 复旦大学计算机科学技术学院 邮箱: lisheng [at] fudan.edu.cn [English] |
个人简介:复旦大学计算机学院副教授、博导。主要研究方向为多媒体内容安全、人工智能安全,在知名国际期刊和会议如IEEE TPAMI、IEEE TIP、IEEE TIFS、IEEE TDSC、NDSS、NeurIPS、CVPR、ICCV等发表论文 100 余篇。获得了上海市科技进步二等奖、中国科技产业化促进会科技创新二等奖,以及IEEE WIFS、IEEE MMSP、世界人工智能大会等多个会议的最佳论文奖或提名奖。主持了国家自然科学基金面上/青年项目、国家重点研发计划子课题、国家自然科学基金重点项目子课题等国家级项目,以及上海市青年科技英才扬帆计划、阿里巴巴创新研究计划、CCF-蚂蚁专项基金等省部级和企业合作项目,研究成果被IEEE Spectrum等国际知名科技媒体专题报道。
研究方向
论文成果
corresponding author*, equal contribution#
期刊 (部分)
- X. Hu, S. Li, Q. Ying, W. Peng, X. Zhang and Z. Qian, Establishing Robust Generative Image Steganography via Popular Stable Diffusion, IEEE Transactions on Information Forensics and Security, too appear.
- Z. Wang, S. Li, X. Zhang and G. Feng, Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 7, no. 1, pp. 250-260, Feb. 2023.
- W. Peng, S. Li, Z. Qian and X. Zhang, Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 31, pp. 3513-3526, 2023.
- Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Transactions on Multimedia, doi: 10.1109/TMM.2023.3281087.
- Q. Ying, H. Zhou, Z. Qian, S. Li and X. Zhang, Learning to Immunize Images for Tamper Localization and Self-Recovery, IEEE Transactions on Pattern Analysis and Machine Intelligence, doi: 10.1109/TPAMI.2023.3301958.
- S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3253691.
- Z. Zhu, P. Wei, Z. Qian, S. Li*, X. Zhang, Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding, IEEE Transactions on Circuits and Systems for Video Technology, to apprear.
- Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li*, Z. Qian*, High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2022.3163905.
- Q. Wang, S. Li, X. Zhang and G. Feng, Multi-granularity Brushstrokes Network for Universal Style Transfer, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 18, issue. 4, no. 107, pp. 1-17, 2022.
- W. Huan, S. Li*, Z. Qian* and X. Zhang, Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1955-1965, April 2022.
- X. Zhu, S. Li*, X. Zhang, H. Li, and A. C. Kot, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 2039-2045, 2021.
- G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li*, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 2, pp. 376-386, 2020. (ESI highly cited)
- S. Li*, X. Zhang, Z. Qian, G. Feng and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, pp. 828-840, 1 July-Aug. 2020.
- S. Li* and X. Zhang, Toward Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Transactions on Image Processing, vol. 28, no. 3, pp. 1482-1497, March 2019. (ESI highly cited) [Reported by IEEE Spectrum]
- J. Tao, S. Li*, X. Zhang and Z. Wang, Towards Robust Image Steganography, IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594-600, Feb. 2019. (ESI highly cited)
- Y. Wang, S. Li, and A. C. Kot, On Branded Handbag Recognition, IEEE Transactions on Multimedia, 18 (9), pp. 1869-1881, 2016.
- Y. Wang, S. Li, and A. C. Kot, Deepbag: Recognizing Handbag Models, IEEE Transactions on Multimedia, 17 (11), pp. 2072-2083, 2015.
- S. Li and A. C. Kot, Fingerprint Combination for Privacy Protection, IEEE Transactions on Information Forensics and Security, 8 (2), pp. 350-360, 2013.
- S. Li and A. C. Kot, An Improved Scheme for Full Fingerprint Reconstruction, IEEE Transactions on Information Forensics and Security, 7 (6), pp. 1906 – 1912, 2012.
- S. Li and A. C. Kot, Privacy Protection of Fingerprint Database, IEEE Signal Processing Letters, 18 (2), pp. 115-118, 2011.
会议 (部分)
- J. Huang, Z. Guo, G. Luo, Z. Qian, S. Li, and X. Zhang, Disentangled Style Domain for Implicit z-Watermark Towards Copyright Protection, The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS), 2024.
- M. Wang, G. Hua, S. Li*, and G. Feng, A Key-Driven Framework for Identity-Preserving Face Anonymization, Network and Distributed System Security Symposium (NDSS), 2025.
- G. Luo, Y. Ma, M. Zhang, J. Huang, S. Li, Z. Qian, X. Zhang, Engaging Live Video Comments Generation, ACM International Conference on Multimedia (MM),2024.
- X. Mao, X. Hu, W. Peng, Z. Gan, Z. Qian, X. Zhang, S. Li, From Covert Hiding To Visual Editing: Robust Generative Video Steganography, ACM International Conference on Multimedia (MM),2024.
- G. Li, S. Li*, Z. Qian, X. Zhang, Cover-separable Fixed Neural Network Steganography via Deep Generative Models, ACM International Conference on Multimedia (MM),2024.
- X. Liu, Y. Yang, H. Wang, Q. Ying, Z. Qian, X. Zhang, S. Li, Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization, ACM International Conference on Multimedia (MM),2024.
- J. Li, H. Wang, S. Li*, Z. Qian, X. Zhang, A. Vasilakos, Are handcrafted filters helpful for attributing AI-generated images?, ACM International Conference on Multimedia (MM),2024.
- G. Li#, S. Li#, Z. Luo, Z. Qian and X. Zhang. Purified and Unified Steganographic Network, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
- Q. Ying, J. Liu, S. Li*, H. Xu, Z. Qian* and X. Zhang,RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection, ACM International Conference on Multimedia (MM), 2023.
- Z. Luo, S. Li*, G. Li, Z. Qian and X. Zhang, Securing Fixed Neural Network Steganography, ACM International Conference on Multimedia (MM),2023.
- H. Wang, S. Li*, S. Cao, R. Yang, J. Zeng, Z. Qian and X. Zhang, On Physically Occluded Fake Identity Document Detection, ACM International Conference on Multimedia (MM), 2023.
- Q. Wang, S. Li*, X. Zhang and G. Feng*, Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images, ACM International Conference on Multimedia (MM), 2023.
- M. Zhang, G. Luo, Y. Ma, S. Li, Z. Qian and X. Zhang, VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts, ACM International Conference on Multimedia (MM), 2023.
- G. Liu, Y. Si, Z. Qian, X. Zhang, S. Li and Wanli Peng “WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs,” ACM International Conference on Multimedia (MM), 2023.
- J. Tan, N. Zhong, Z. Qian, X. Zhang and S. Li, Deep Neural Network Watermarking against Model Extraction Attack, ACM International Conference on Multimedia (MM), 2023.
- X. Hu, Q. Ying, Z. Qian, S. Li and X. Zhang, DRAW: Defending Camera-shooted RAW against Image Manipulation, IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
- G. Luo, M. Zhang, Y. Ma, S. Li, Z. Qian and X. Zhang, Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Context, ACM International Conference on Information & Knowledge Management (CIKM), 2023.
- G. Li, S. Li*, M. Li, X. Zhang*, Z. Qian, Steganography of Steganographic Networks, AAAI, 2023.
- Z. Yuan, Z. You, S. Li*, Z. Qian*, X. Zhang, and A. C. Kot, On Generating Identifiable Virtual Faces, ACM International Conference on Multimedia (MM), 2022 (oral).
- Z. You, Q. Ying, S. Li*, Z. Qian*, and X. Zhang, Image Generation Network for Covert Transmission in Online Social Network, ACM International Conference on Multimedia (MM), 2022.
- P. Wei, S. Li, X. Zhang, Z. Qian, G. Luo, and Q. Zhou, Generative Steganography Network, ACM International Conference on Multimedia (MM), 2022.
- B. Zhang, S. Li*, G. Feng, X. Zhang, and Z. Qian, Patch Diffusion: A General Module for Face Manipulation Detection, AAAI, 2022.
- L. Feng, S. Li, Z. Qian, and X. Zhang, Unlabeled Backdoor Poisoning in Semi-Supervised Learning, IEEE International Conference on Multimedia(ICME), 2022.
- P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, Generative Steganographic Flow, IEEE International Conference on Multimedia (ICME), 2022.
- K. Chen, X. Zeng, Q. Ying, S. Li, Z. Qian, and X. Zhang, Invertible Image Dataset Protection, IEEE International Conference on Multimedia (ICME), 2022.
- G. Li, S. Li*, Z. Qian, and X. Zhang, Encryption Resistant Deep Neural Network Watermarking, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- S. Qi, S. Li, P. Wei, L. Ge, X. Zhang, Z. Qian, Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- L. Feng, S. Li, Z. Qian and X. Zhang, Stealthy Backdoor Attack with Adversarial Training, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian and S. Li, Image Steganalysis with Convolutional Vision Transformer, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- M. Li, N. Zhong, X. Zhang, Z. Qian and S. Li, Object-Oriented Backdoor Attack Against Image Captioning, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
- S. Li, X. Zhu, G. Feng, X. Zhang and Z. Qian, Diffusing the Liveness Cues for Face Anti-spoofing, ACM International Conference on Multimedia (MM), 2021.
- Z. You, S. Li, Z. Qian* and X. Zhang, Reversible Privacy-Preserving Recognition, IEEE International Conference on Multimedia and Expo (ICME), 2021.
- M. Shi, S. Li, Z. Yin, X. Zhang* and Z. Qian, On Generating JPEG Adversarial Images, IEEE International Conference on Multimedia and Expo (ICME), 2021.
- H. Zhan, S. Li and A. C. Kot, Tagging the Shoe Images by Semantic Attributes, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 892-895.
- Y. Wang, S. Li and A. C. Kot, Quality Guided Handbag Segmentation, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 896-900.
- Y. Wang, S. Li and A. C. Kot, Joint Learning for Image-based Handbag Recommendation, IEEE International Conference on Multimedia and Expo (ICME), Turin, 2015, pp. 1-6.
- Y. Wang, S. Li and A. C. Kot, Complementary Feature Extraction for Branded Handbag Recognition, IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5896-5900.
- S. Li* and A. C. Kot, Attack Using Reconstructed Fingerprint, IEEE International Workshop on Information Forensics and Security (WIFS), Iguacu Falls, 2011, pp. 1-6. [Best Student Paper Silver Award]
- S. Li* and A. C. Kot, Privacy Protection of Fingerprint Database Using Lossless Data Hiding, IEEE International Conference on Multimedia and Expo (ICME), Suntec City, 2010, pp. 1293-1298.
Back
科研项目
xxxx虚假证件检测 |
阿里巴巴创新研究计划 |
项目负责人 |
2022.3-2023.3 |
产品外包装水印 |
上海驰亚科技 |
项目负责人 |
2022.1-2022.7 |
人工智能模型安全和测试方法 |
国家自然基金联合重点项目 |
子课题负责人 |
2021.1-2023.12 |
面向社交网络的稳健数字图像隐写 |
国家自然科学基金面上项目 |
项目负责人 |
2021.1-2023.12 |
xxx保护方法 |
国家重点研发计划 |
子课题负责人 |
2019.7-2022.6 |
基于信息隐藏的生物特征保护 |
广西多源数据挖掘与安全实验室重点基金 |
项目负责人 |
2019.1-2021.12 |
面向指纹载体的信息隐藏和伪装 |
国家自然科学基金青年项目 |
项目负责人 |
2017.1-2019.12 |
生物特征伪装技术研究 |
上海市科委扬帆计划 |
项目负责人 |
2016.6-2019.5 |
Back
学术任职
International Journal Guest Editor:
- Mathematical Methods Applied in Explainable Fake Multimedia Detection, Mathematics, 2022 (Lead Guest Editor)
- Low complexity methods for multimedia security, Multimedia Systems, 2019
- Recent Advances in Deep Learning Model Security, Pattern Recognition Letters, 2021
Reviewer:
- IEEE Transactions on Pattern Analysis and Machine Intelligence
- IEEE Transactions on Image Processing
- IEEE Transactions on Information Forensics and Security
- IEEE Transactions on Multimedia
- IEEE Transactions on Neural Networks and Learning Systems
- IEEE Signal Processing Letters
- EURASIP Journal on Advances in Signal Processing
- IEEE International Conference on Image Processing
- IEEE International Conference on Multimedia and Expo
Back
学术奖项
Toward Construction Based Data Hiding: From Secrets to Fingerprint Images |
World Artificial Intelligence Conference, Best paper nomination |
2022 |
Shanghai Young Oriental Scholar |
2015 |
|
Attack Using Reconstructed Fingerprint |
IEEE WIFS Best Student Paper Silver Award |
2011 |
Steganograph based on Tolerable Error Range |
NCIG Best Student Paper Award |
2006 |
Back