李昊東

  • 辦公室:
  • 導(dǎo)師類別:
  • E-mail:
  • 辦公電話:
個(gè)人詳情

李昊東  Dr. Haodong Li

工學(xué)博士、深圳大學(xué)電子與信息工程學(xué)院助理教授、碩士研究生導(dǎo)師。


聯(lián)系方式(Contact):

Email: lihaodong@szu.edu.cn

地址:深圳市南山區(qū)白石路深圳大學(xué)電子與信息工程學(xué)院N801


簡介(Biography)

李昊東,1990年1月出生,工學(xué)博士、助理教授、碩士生導(dǎo)師2012年獲中山大學(xué)通信工程專業(yè)學(xué)士學(xué)位,2017年獲中山大學(xué)通信與信息系統(tǒng)專業(yè)博士學(xué)位。2017-2020年于深圳大學(xué)信息與通信工程博士后流動(dòng)站從事博士后研究。2020年9月開始任深圳大學(xué)電子與信息工程學(xué)院助理教授。主要研究興趣包括多媒體內(nèi)容取證與安全、智能信息處理、機(jī)器學(xué)習(xí)等。已在IEEE T-IFS、IEEE T-CSVT、ICCV等國際權(quán)威期刊和重要學(xué)術(shù)會(huì)議發(fā)表論文多篇。目前主持國家自然科學(xué)基金青年科學(xué)基金項(xiàng)目一項(xiàng)。擔(dān)任IEEE JSTSP、IEEE T-IFS、IEEE T-CSVT等國際權(quán)威期刊的審稿人。


研究興趣(Research Interests)

· 多媒體取證與安全、圖像處理、模式識(shí)別、機(jī)器學(xué)習(xí);

· Multimedia Forensics and Security, Image Processing, Pattern Recognition, Machine Learning.


主講課程(Teaching Courses)

本科生:概率論與數(shù)理統(tǒng)計(jì),工程導(dǎo)論。


主要學(xué)術(shù)兼職 (Academic Service)

· IEEE Transactions on Information Forensics and Security, IEEE Transactions on Circuits and Systems for Video Technology, IEEE Journal of Selected Topics in Signal Processing, IEEE Signal Processing Letters等國際刊物審稿人。


科研項(xiàng)目 (Research Projects)

· 國家自然科學(xué)基金青年科學(xué)基金項(xiàng)目,面向復(fù)雜情形的數(shù)字圖像篡改定位方法研究,(2019.01-2021.12),61802226225萬元


學(xué)術(shù)成果(Publications)

期刊論文

[1] P. Zhuang, H. Li*, S. Tan, B. Li, and J. Huang. Image Tampering Localization Using a Dense Fully Convolutional Network. IEEE Transactions on Information Forensics and Security, 16: 2986–2999, 2021. (中科院大類2區(qū)小類1區(qū)、Top期刊,CCF-A)

[2] H. Li, W. Luo, X. Qiu, and J. Huang. Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security, 12(5):1240–1252, 2017. (中科院大類2區(qū)小類1區(qū)、Top期刊,CCF-A)

[3] H. Li, W. Luo, and J. Huang. Localization of diffusion-based inpainting in digital images. IEEE Transactions on Information Forensics and Security, 12(12):3050–3064, 2017. (中科院大類2區(qū)小類1區(qū)、Top期刊,CCF-A)

[4] H. Li, W. Luo, X. Qiu, and J. Huang. Identification of various image operations using residual-based features. IEEE Transactions on Circuits and Systems for Video Technology, 28(1):31–45, 2018. (中科院2區(qū),CCF-B)

[5] H. Li, B. Li, S. Tan, and J. Huang, Identification of deep network generated images using disparities in color components, Signal Processing, 174:107616, 2020. (中科院2區(qū),CCF-C)

[6] H. Li, W. Luo, and J. Huang. Anti-forensics of double JPEG compression with the same quantization matrix. Multimedia Tools and Applications, 74(17):6729–6744, 2015.

[7] B. Chen, H. Li, and W. Luo. Image processing operations identification via convolutional neural network. SCIENCE CHINA Information Sciences, 63:139109:1–139109:3, 2020. (中科院2區(qū),CCF-B)

[8] W. Luo, H. Li, Q. Yan, R. Yang, and J. Huang. Improved audio steganalytic feature and its applications in audio forensics. ACM Transactions on Multimedia Computing, Communications, and Applications, 14(2):43:1–43:14, 2018. (中科院2區(qū),CCF-B)

[9] W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Transactions on Information Forensics and Security, 11(4):734–745, 2016. (中科院大類2區(qū)小類1區(qū)、Top期刊,CCF-A)

會(huì)議論文:

[1] H. Li and J. Huang. Localization of deep inpainting using high-pass fully convolutional network. In IEEE International Conference on Computer Vision (ICCV), pp. 8300–8309, 2019. (CCF-A)

[2] H. Li, H. Chen, B. Li, and S. Tan. Can forensic detectors identify GAN generated images? In Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 722–727, 2018.

[3] H. Li, W. Luo, and J. Huang. Countering anti-JPEG compression forensics. In 19th IEEE International Conference on Image Processing (ICIP), pp. 241–244, 2012.

[4] W. Luo, Y. Zhang, and H. Li. Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding. In 16th International Workshop on Digital Watermarking (IWDW), pp. 177-186, 2017.

[5] B. Chen, W. Luo, and H. Li. Audio steganalysis with convolutional neural network. In 5th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 85-90, 2017.

[6] X. Qiu, H. Li, W. Luo, and J. Huang. A universal image forensic strategy based on steganalytic model. In 2nd ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 165–170, 2014.

[7] W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis against wow embedding algorithm. In 2nd ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 91–96, 2014.

[8] C. Chen, H. Li, W. Luo, R. Yang, and J. Huang. Anti-forensics of JPEG detectors via adaptive quantization table replacement. In 22nd International Conference on Pattern Recognition (ICPR), pp. 672–677, 2014.

專利:

[1] 莊培裕,李昊東,黃繼武. 圖像篡改定位模型的生成方法、圖像篡改定位方法及設(shè)備,專利申請(qǐng)?zhí)枺?span style="font-size: 14.5pt; color: rgb(48, 48, 48); background: rgb(255, 255, 255); font-family: "times new roman";">2020106769380,申請(qǐng)日:2020.07.14

[2] 李昊東,劉永亮,黃繼武,張琦. 一種圖像檢測(cè)方法、裝置及設(shè)備,專利申請(qǐng)?zhí)枺?span style="font-size: 14.5pt; color: rgb(48, 48, 48); background: rgb(255, 255, 255); font-family: "times new roman";">201910154177X,申請(qǐng)日:2019.03.01

[3] 李昊東,黃繼武. 一種深度網(wǎng)絡(luò)生成人臉圖像的檢測(cè)方法及系統(tǒng),專利申請(qǐng)?zhí)枺?span style="font-size: 14.5pt; color: rgb(48, 48, 48); background: rgb(255, 255, 255); font-family: "times new roman";">2018104346204,申請(qǐng)日:2018.5.8

[4] 丘曉青,李昊東,駱偉祺,黃繼武. 一種基于隱寫分析的圖像拼接篡改檢測(cè)方法及裝置,國家發(fā)明專利(已授權(quán)),中華人民共和國國家知識(shí)產(chǎn)權(quán)局,ZL201410118902.5,授權(quán)日期:2017.2.15


竹北市| 随州市| 泾源县| 墨玉县| 元阳县| 枣庄市| 乌海市| 龙州县| 台北市| 乡宁县| 肥城市| 长泰县| 林州市| 全州县| 龙南县| 丰顺县| 阳春市| 普宁市| 凤冈县| 中西区| 威远县| 辉南县| 朔州市| 宁化县| 夹江县| 石嘴山市| 台东县| 潼南县| 云南省| 泸溪县| 陆河县| 简阳市| 武乡县| 正阳县| 焦作市| 新营市| 旬邑县| 曲水县| 香格里拉县| 遂溪县| 兰州市|