Sheng LI (李晟)
Associate Professor,
School of Computer Science, Fudan University
Email: lisheng [at] fudan.edu.cn

I received the Ph.D. degree from the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, in 2013, under the supervision of Prof. Alex Kot. From 2013 to 2016, I was a Research Fellow at the Rapid Rich Object Search Lab, Nanyang Technological University. I am currently an Associate Professor with the School of Computer Science, Fudan University, China. I am a recipient of the IEEE WIFS Best Student Paper Silver Award.


RESEARCH


PUBLICATIONS

corresponding author*, equal contribution#

Journal (selected)

  1. Z. Wang, S. Li, X. Zhang and G. Feng, Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 7, no. 1, pp. 250-260, Feb. 2023.
  2. W. Peng, S. Li, Z. Qian and X. Zhang, Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism, IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 31, pp. 3513-3526, 2023.
  3. Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Transactions on Multimedia, doi: 10.1109/TMM.2023.3281087.
  4. Q. Ying, H. Zhou, Z. Qian, S. Li and X. Zhang, Learning to Immunize Images for Tamper Localization and Self-Recovery, IEEE Transactions on Pattern Analysis and Machine Intelligence, doi: 10.1109/TPAMI.2023.3301958.
  5. S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2023.3253691.
  6. Z. Zhu, P. Wei, Z. Qian, S. Li*, X. Zhang, Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding, IEEE Transactions on Circuits and Systems for Video Technology, to apprear.
  7. Y. Qiu, Q. Ying, Y. Yang, H. Zeng, S. Li*, Z. Qian*, High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding, IEEE Transactions on Circuits and Systems for Video Technology, doi: 10.1109/TCSVT.2022.3163905.
  8. Q. Wang, S. Li, X. Zhang and G. Feng, Multi-granularity Brushstrokes Network for Universal Style Transfer, ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 18, issue. 4, no. 107, pp. 1-17, 2022.
  9. W. Huan, S. Li*, Z. Qian* and X. Zhang, Exploring Stable Coefficients on Joint Sub-bands for Robust Video Watermarking in DT CWT Domain, IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 4, pp. 1955-1965, April 2022.
  10. X. Zhu, S. Li*, X. Zhang, H. Li, and A. C. Kot, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 5, pp. 2039-2045, 2021.
  11. G. Feng, X. Zhang, Y. Ren, Z. Qian, and S. Li*, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 2, pp. 376-386, 2020. (ESI highly cited)
  12. S. Li*, X. Zhang, Z. Qian, G. Feng and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 4, pp. 828-840, 1 July-Aug. 2020.
  13. S. Li* and X. Zhang, Toward Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Transactions on Image Processing, vol. 28, no. 3, pp. 1482-1497, March 2019. (ESI highly cited) [Reported by IEEE Spectrum]
  14. J. Tao, S. Li*, X. Zhang and Z. Wang, Towards Robust Image Steganography, IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594-600, Feb. 2019. (ESI highly cited)
  15. Y. Wang, S. Li, and A. C. Kot, On Branded Handbag Recognition, IEEE Transactions on Multimedia, 18 (9), pp. 1869-1881, 2016.
  16. Y. Wang, S. Li, and A. C. Kot, Deepbag: Recognizing Handbag Models, IEEE Transactions on Multimedia, 17 (11), pp. 2072-2083, 2015.
  17. S. Li and A. C. Kot, Fingerprint Combination for Privacy Protection, IEEE Transactions on Information Forensics and Security, 8 (2), pp. 350-360, 2013.
  18. S. Li and A. C. Kot, An Improved Scheme for Full Fingerprint Reconstruction, IEEE Transactions on Information Forensics and Security, 7 (6), pp. 1906 – 1912, 2012.
  19. S. Li and A. C. Kot, Privacy Protection of Fingerprint Database, IEEE Signal Processing Letters, 18 (2), pp. 115-118, 2011.

Conference (selected)

  1. G. Li#, S. Li#, Z. Luo, Z. Qian and X. Zhang. Purified and Unified Steganographic Network, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024.
  2. Q. Ying, J. Liu, S. Li*, H. Xu, Z. Qian* and X. Zhang,RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection, ACM International Conference on Multimedia (MM), 2023.
  3. Z. Luo, S. Li*, G. Li, Z. Qian and X. Zhang, Securing Fixed Neural Network Steganography, ACM International Conference on Multimedia (MM),2023.
  4. H. Wang, S. Li*, S. Cao, R. Yang, J. Zeng, Z. Qian and X. Zhang, On Physically Occluded Fake Identity Document Detection, ACM International Conference on Multimedia (MM), 2023.
  5. Q. Wang, S. Li*, X. Zhang and G. Feng*, Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images, ACM International Conference on Multimedia (MM), 2023.
  6. M. Zhang, G. Luo, Y. Ma, S. Li, Z. Qian and X. Zhang, VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts, ACM International Conference on Multimedia (MM), 2023.
  7. G. Liu, Y. Si, Z. Qian, X. Zhang, S. Li and Wanli Peng “WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs,” ACM International Conference on Multimedia (MM), 2023.
  8. J. Tan, N. Zhong, Z. Qian, X. Zhang and S. Li, Deep Neural Network Watermarking against Model Extraction Attack, ACM International Conference on Multimedia (MM), 2023.
  9. X. Hu, Q. Ying, Z. Qian, S. Li and X. Zhang, DRAW: Defending Camera-shooted RAW against Image Manipulation, IEEE/CVF International Conference on Computer Vision (ICCV), 2023.
  10. G. Luo, M. Zhang, Y. Ma, S. Li, Z. Qian and X. Zhang, Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Context, ACM International Conference on Information & Knowledge Management (CIKM), 2023.
  11. G. Li, S. Li*, M. Li, X. Zhang*, Z. Qian, Steganography of Steganographic Networks, AAAI, 2023.
  12. Z. Yuan, Z. You, S. Li*, Z. Qian*, X. Zhang, and A. C. Kot, On Generating Identifiable Virtual Faces, ACM International Conference on Multimedia (MM), 2022 (oral).
  13. Z. You, Q. Ying, S. Li*, Z. Qian*, and X. Zhang, Image Generation Network for Covert Transmission in Online Social Network, ACM International Conference on Multimedia (MM), 2022.
  14. P. Wei, S. Li, X. Zhang, Z. Qian, G. Luo, and Q. Zhou, Generative Steganography Network, ACM International Conference on Multimedia (MM), 2022.
  15. B. Zhang, S. Li*, G. Feng, X. Zhang, and Z. Qian, Patch Diffusion: A General Module for Face Manipulation Detection, AAAI, 2022.
  16. L. Feng, S. Li, Z. Qian, and X. Zhang, Unlabeled Backdoor Poisoning in Semi-Supervised Learning, IEEE International Conference on Multimedia(ICME), 2022.
  17. P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, Generative Steganographic Flow, IEEE International Conference on Multimedia (ICME), 2022.
  18. K. Chen, X. Zeng, Q. Ying, S. Li, Z. Qian, and X. Zhang, Invertible Image Dataset Protection, IEEE International Conference on Multimedia (ICME), 2022.
  19. G. Li, S. Li*, Z. Qian, and X. Zhang, Encryption Resistant Deep Neural Network Watermarking, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
  20. S. Qi, S. Li, P. Wei, L. Ge, X. Zhang, Z. Qian, Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
  21. L. Feng, S. Li, Z. Qian and X. Zhang, Stealthy Backdoor Attack with Adversarial Training, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
  22. G. Luo, P. Wei, S. Zhu, X. Zhang, Z. Qian and S. Li, Image Steganalysis with Convolutional Vision Transformer, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
  23. M. Li, N. Zhong, X. Zhang, Z. Qian and S. Li, Object-Oriented Backdoor Attack Against Image Captioning, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022.
  24. S. Li, X. Zhu, G. Feng, X. Zhang and Z. Qian, Diffusing the Liveness Cues for Face Anti-spoofing, ACM International Conference on Multimedia (MM), 2021.
  25. Z. You, S. Li, Z. Qian* and X. Zhang, Reversible Privacy-Preserving Recognition, IEEE International Conference on Multimedia and Expo (ICME), 2021.
  26. M. Shi, S. Li, Z. Yin, X. Zhang* and Z. Qian, On Generating JPEG Adversarial Images, IEEE International Conference on Multimedia and Expo (ICME), 2021.
  27. H. Zhan, S. Li and A. C. Kot, Tagging the Shoe Images by Semantic Attributes, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 892-895.
  28. Y. Wang, S. Li and A. C. Kot, Quality Guided Handbag Segmentation, IEEE International Conference on Digital Signal Processing (DSP), Singapore, 2015, pp. 896-900.
  29. Y. Wang, S. Li and A. C. Kot, Joint Learning for Image-based Handbag Recommendation, IEEE International Conference on Multimedia and Expo (ICME), Turin, 2015, pp. 1-6.
  30. Y. Wang, S. Li and A. C. Kot, Complementary Feature Extraction for Branded Handbag Recognition, IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5896-5900.
  31. S. Li* and A. C. Kot, Attack Using Reconstructed Fingerprint, IEEE International Workshop on Information Forensics and Security (WIFS), Iguacu Falls, 2011, pp. 1-6. [Best Student Paper Silver Award]
  32. S. Li* and A. C. Kot, Privacy Protection of Fingerprint Database Using Lossless Data Hiding, IEEE International Conference on Multimedia and Expo (ICME), Suntec City, 2010, pp. 1293-1298.

Back


FUNDINGS

xxxxFake Certificate Detection Alibaba Innovative Research (AIR) Program Supported by Alibaba Group PI 2022.3-2023.3
Package Watermarking SIIA Tech Research Project PI 2022.1-2022.7
Artificial Intelligence Security Model and Testing Methods National Natural Science Foundation of China, Key Project co-PI 2021.1-2023.12
Robust Image Steganography for Social Networks National Natural Science Foundation of China PI 2021.1-2023.12
xxxProtection Methods The National Key Research and Development Program of China co-PI 2019.7-2022.6
Biometrics Data Protection based on Data Hiding Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security, Key Project PI 2019.1-2021.12
Fingerprint Data Hiding and Disguising National Natural Science Foundation of China PI 2017.1-2019.12
Biometrics Disguising Shanghai Sailing Program PI 2016.6-2019.5
Biometrics Security Shanghai Young Oriental Scholar PI 2015-2018

Back


SERVICES

International Journal Guest Editor:

  1. Mathematical Methods Applied in Explainable Fake Multimedia Detection, Mathematics, 2022 (Lead Guest Editor)
  2. Low complexity methods for multimedia security, Multimedia Systems, 2019
  3. Recent Advances in Deep Learning Model Security, Pattern Recognition Letters, 2021

Reviewer:

  1. IEEE Transactions on Pattern Analysis and Machine Intelligence
  2. IEEE Transactions on Image Processing
  3. IEEE Transactions on Information Forensics and Security
  4. IEEE Transactions on Multimedia
  5. IEEE Transactions on Neural Networks and Learning Systems
  6. IEEE Signal Processing Letters
  7. EURASIP Journal on Advances in Signal Processing
  8. IEEE International Conference on Image Processing
  9. IEEE International Conference on Multimedia and Expo

Back


AWARDS

Toward Construction Based Data Hiding: From Secrets to Fingerprint Images World Artificial Intelligence Conference, Best paper nomination 2022
Shanghai Young Oriental Scholar 2015
Attack Using Reconstructed Fingerprint IEEE WIFS Best Student Paper Silver Award 2011
Steganograph based on Tolerable Error Range NCIG Best Student Paper Award 2006

Back