李昊东 Dr. Haodong Li
工学博士、永利集团助理教授、硕士研究生导师。
联系方式(Contact):
Email: lihaodong@szu.edu.cn
地址:深圳市南山区白石路永利集团N801
简介(Biography):
李昊东,1990年1月出生,工学博士、助理教授、硕士生导师。于2012年获中山大学通信工程专业学士学位,2017年获中山大学通信与信息系统专业博士学位。2017-2020年于永利集团信息与通信工程博士后流动站从事博士后研究。2020年9月开始任永利集团助理教授。主要研究兴趣包括多媒体内容取证与安全、智能信息处理、机器学习等。已在IEEE T-IFS、IEEE T-CSVT、ICCV等国际权威期刊和重要学术会议发表论文多篇。目前主持国家自然科学基金青年科学基金项目一项。担任IEEE JSTSP、IEEE T-IFS、IEEE T-CSVT等国际权威期刊的审稿人。
研究兴趣(Research Interests):
· 多媒体取证与安全、图像处理、模式识别、机器学习;
· Multimedia Forensics and Security, Image Processing, Pattern Recognition, Machine Learning.
主讲课程(Teaching Courses):
本科生:概率论与数理统计,工程导论。
主要学术兼职 (Academic Service):
· IEEE Transactions on Information Forensics and Security, IEEE Transactions on Circuits and Systems for Video Technology, IEEE Journal of Selected Topics in Signal Processing, IEEE Signal Processing Letters等国际刊物审稿人。
科研项目 (Research Projects):
· 国家自然科学基金青年科学基金项目,“面向复杂情形的数字图像篡改定位方法研究”,(2019.01-2021.12),618022262,25万元
学术成果(Publications):
期刊论文:
[1] P. Zhuang, H. Li*, S. Tan, B. Li, and J. Huang. Image Tampering Localization Using a Dense Fully Convolutional Network. IEEE Transactions on Information Forensics and Security, 16: 2986–2999, 2021. (中科院大类2区、小类1区、Top期刊,CCF-A)
[2] H. Li, W. Luo, X. Qiu, and J. Huang. Image forgery localization via integrating tampering possibility maps. IEEE Transactions on Information Forensics and Security, 12(5):1240–1252, 2017. (中科院大类2区、小类1区、Top期刊,CCF-A)
[3] H. Li, W. Luo, and J. Huang. Localization of diffusion-based inpainting in digital images. IEEE Transactions on Information Forensics and Security, 12(12):3050–3064, 2017. (中科院大类2区、小类1区、Top期刊,CCF-A)
[4] H. Li, W. Luo, X. Qiu, and J. Huang. Identification of various image operations using residual-based features. IEEE Transactions on Circuits and Systems for Video Technology, 28(1):31–45, 2018. (中科院2区,CCF-B)
[5] H. Li, B. Li, S. Tan, and J. Huang, Identification of deep network generated images using disparities in color components, Signal Processing, 174:107616, 2020. (中科院2区,CCF-C)
[6] H. Li, W. Luo, and J. Huang. Anti-forensics of double JPEG compression with the same quantization matrix. Multimedia Tools and Applications, 74(17):6729–6744, 2015.
[7] B. Chen, H. Li, and W. Luo. Image processing operations identification via convolutional neural network. SCIENCE CHINA Information Sciences, 63:139109:1–139109:3, 2020. (中科院2区,CCF-B)
[8] W. Luo, H. Li, Q. Yan, R. Yang, and J. Huang. Improved audio steganalytic feature and its applications in audio forensics. ACM Transactions on Multimedia Computing, Communications, and Applications, 14(2):43:1–43:14, 2018. (中科院2区,CCF-B)
[9] W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Transactions on Information Forensics and Security, 11(4):734–745, 2016. (中科院大类2区、小类1区、Top期刊,CCF-A)
会议论文:
[1] H. Li and J. Huang. Localization of deep inpainting using high-pass fully convolutional network. In IEEE International Conference on Computer Vision (ICCV), pp. 8300–8309, 2019. (CCF-A)
[2] H. Li, H. Chen, B. Li, and S. Tan. Can forensic detectors identify GAN generated images? In Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 722–727, 2018.
[3] H. Li, W. Luo, and J. Huang. Countering anti-JPEG compression forensics. In 19th IEEE International Conference on Image Processing (ICIP), pp. 241–244, 2012.
[4] W. Luo, Y. Zhang, and H. Li. Adaptive audio steganography based on advanced audio coding and syndrome-trellis coding. In 16th International Workshop on Digital Watermarking (IWDW), pp. 177-186, 2017.
[5] B. Chen, W. Luo, and H. Li. Audio steganalysis with convolutional neural network. In 5th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 85-90, 2017.
[6] X. Qiu, H. Li, W. Luo, and J. Huang. A universal image forensic strategy based on steganalytic model. In 2nd ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 165–170, 2014.
[7] W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis against wow embedding algorithm. In 2nd ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSec), pp. 91–96, 2014.
[8] C. Chen, H. Li, W. Luo, R. Yang, and J. Huang. Anti-forensics of JPEG detectors via adaptive quantization table replacement. In 22nd International Conference on Pattern Recognition (ICPR), pp. 672–677, 2014.
专利:
[1] 庄培裕,李昊东,黄继武. 图像篡改定位模型的生成方法、图像篡改定位方法及设备,专利申请号:2020106769380,申请日:2020.07.14
[2] 李昊东,刘永亮,黄继武,张琦. 一种图像检测方法、装置及设备,专利申请号:201910154177X,申请日:2019.03.01
[3] 李昊东,黄继武. 一种深度网络生成人脸图像的检测方法及系统,专利申请号:2018104346204,申请日:2018.5.8
[4] 丘晓青,李昊东,骆伟祺,黄继武. 一种基于隐写分析的图像拼接篡改检测方法及装置,国家发明专利(已授权),中华人民共和国国家知识产权局,ZL201410118902.5,授权日期:2017.2.15