


default search action
Haodong Li 0001
Person information
- affiliation: Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen, China
- affiliation: Shenzhen University, Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China
Other persons with the same name
- Haodong Li — disambiguation page
- Haodong Li 0002
— The University of Manchester, Manchester, UK
- Haodong Li 0003
— Beijing Jiaotong University, Beijing, China
- Haodong Li 0004
— Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Haodong Li 0005
— North China University of Technology, School of Economics and Management, Beijing, China
- Haodong Li 0006 — Sichuan University, College of Electrical Engineering, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Haodong Li, Peiyu Zhuang, Yang Su, Jiwu Huang:
Towards generalizable and robust image tampering localization with multi-task learning and contrastive learning. Expert Syst. Appl. 270: 126492 (2025) - 2024
- [j15]Changsheng Chen
, Xijin Li, Baoying Chen
, Haodong Li
:
A distortion model guided adversarial surrogate for recaptured document detection. Pattern Recognit. 151: 110433 (2024) - [j14]Bin Li
, Jian Shi, Weixiang Li
, Haodong Li
:
WebP-JPEG Transcoding Detection by Spotting Re-Compression Artifacts With CNN-ViT for Processing Dual-Domain Features. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12535-12549 (2024) - [c11]Changsheng Chen, Wenyu Chen, Ximin Chen, Haodong Li:
A Document Presentation Attack Detection Scheme with Optical Flow under a Flashlight. APSIPA 2024: 1-6 - 2023
- [j13]Peiyu Zhuang
, Haodong Li
, Rui Yang, Jiwu Huang
:
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. IEEE Trans. Inf. Forensics Secur. 18: 5243-5257 (2023) - 2022
- [j12]Yuanhang Huang, Shan Bian
, Haodong Li
, Chuntao Wang, Kangshun Li:
DS-UNet: A dual streams UNet for refined image forgery localization. Inf. Sci. 610: 73-89 (2022) - [j11]Changsheng Chen
, Lin Zhao
, Jiabin Yan, Haodong Li
:
A distortion model-based pre-screening method for document image tampering localization under recapturing attack. Signal Process. 200: 108666 (2022) - [c10]Shujin Wei, Haodong Li
, Jiwu Huang:
Deep Video Inpainting Localization Using Spatial and Temporal Traces. ICASSP 2022: 8957-8961 - [i5]Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang:
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. CoRR abs/2211.03930 (2022) - 2021
- [j10]Bin Li, Bowei Zheng, Haodong Li
, Yanran Li:
Detail-enhanced image inpainting based on discrete wavelet transforms. Signal Process. 189: 108278 (2021) - [j9]Peiyu Zhuang
, Haodong Li
, Shunquan Tan
, Bin Li
, Jiwu Huang
:
Image Tampering Localization Using a Dense Fully Convolutional Network. IEEE Trans. Inf. Forensics Secur. 16: 2986-2999 (2021) - [c9]Haodong Li
, Xiaoming Chen, Peiyu Zhuang
, Bin Li
:
Image Tampering Localization Using Unified Two-Stream Features Enhanced with Channel and Spatial Attention. PRCV (2) 2021: 610-622 - 2020
- [j8]Bolin Chen, Haodong Li
, Weiqi Luo, Jiwu Huang:
Image processing operations identification via convolutional neural network. Sci. China Inf. Sci. 63(3) (2020) - [j7]Haodong Li
, Bin Li, Shunquan Tan
, Jiwu Huang:
Identification of deep network generated images using disparities in color components. Signal Process. 174: 107616 (2020)
2010 – 2019
- 2019
- [c8]Haodong Li
, Jiwu Huang:
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network. ICCV 2019: 8300-8309 - 2018
- [j6]Haodong Li
, Weiqi Luo
, Xiaoqing Qiu, Jiwu Huang:
Identification of Various Image Operations Using Residual-Based Features. IEEE Trans. Circuits Syst. Video Technol. 28(1): 31-45 (2018) - [j5]Weiqi Luo, Haodong Li
, Qi Yan, Rui Yang, Jiwu Huang:
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics. ACM Trans. Multim. Comput. Commun. Appl. 14(2): 43:1-43:14 (2018) - [c7]Haodong Li
, Han Chen, Bin Li, Shunquan Tan:
Can Forensic Detectors Identify GAN Generated Images? APSIPA 2018: 722-727 - [i4]Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang:
Detection of Deep Network Generated Images Using Disparities in Color Components. CoRR abs/1808.07276 (2018) - 2017
- [j4]Haodong Li
, Weiqi Luo
, Xiaoqing Qiu, Jiwu Huang
:
Image Forgery Localization via Integrating Tampering Possibility Maps. IEEE Trans. Inf. Forensics Secur. 12(5): 1240-1252 (2017) - [j3]Haodong Li
, Weiqi Luo
, Jiwu Huang
:
Localization of Diffusion-Based Inpainting in Digital Images. IEEE Trans. Inf. Forensics Secur. 12(12): 3050-3064 (2017) - [c6]Bolin Chen, Weiqi Luo, Haodong Li
:
Audio Steganalysis with Convolutional Neural Network. IH&MMSec 2017: 85-90 - [c5]Weiqi Luo, Yue Zhang, Haodong Li
:
Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding. IWDW 2017: 177-186 - [i3]Haodong Li, Weiqi Luo, Quanquan Rao, Jiwu Huang:
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack. CoRR abs/1707.07795 (2017) - [i2]Bolin Chen, Haodong Li, Weiqi Luo:
Image Processing Operations Identification via Convolutional Neural Network. CoRR abs/1709.02908 (2017) - 2016
- [j2]Weixuan Tang, Haodong Li
, Weiqi Luo, Jiwu Huang:
Adaptive Steganalysis Based on Embedding Probabilities of Pixels. IEEE Trans. Inf. Forensics Secur. 11(4): 734-745 (2016) - 2015
- [j1]Haodong Li
, Weiqi Luo, Jiwu Huang:
Anti-forensics of double JPEG compression with the same quantization matrix. Multim. Tools Appl. 74(17): 6729-6744 (2015) - [i1]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Identification of Image Operations Based on Steganalytic Features. CoRR abs/1503.04718 (2015) - 2014
- [c4]Chao Chen, Haodong Li
, Weiqi Luo, Rui Yang, Jiwu Huang:
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement. ICPR 2014: 672-677 - [c3]Weixuan Tang, Haodong Li
, Weiqi Luo, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. IH&MMSec 2014: 91-96 - [c2]Xiaoqing Qiu, Haodong Li
, Weiqi Luo, Jiwu Huang:
A universal image forensic strategy based on steganalytic model. IH&MMSec 2014: 165-170 - 2012
- [c1]Haodong Li
, Weiqi Luo, Jiwu Huang:
Countering anti-JPEG compression forensics. ICIP 2012: 241-244
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-27 23:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint