default search action
Sheng Li 0006
Person information
- affiliation: Fudan University, School of Computer Science, Shanghai Institute of Intelligent Electronics and Systems, China
- affiliation (former): Shanghai University, School of Communication and Information Engineering, China
- affiliation (PhD 2013): Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
Other persons with the same name
- Sheng Li — disambiguation page
- Sheng Li 0001 — University of Virginia, Charlottesville, VA, USA (and 3 more)
- Sheng Li 0002 — Peking University, Department of Psychology, Beijing, China (and 2 more)
- Sheng Li 0003 — Harbin Institute of Technology, Laboratory of Machine Intelligence and Translation, China
- Sheng Li 0005 — Zhejiang University of Technology, Hangzhou, China (and 2 more)
- Sheng Li 0007 — Google, Mountain View, CA, USA (and 3 more)
- Sheng Li 0008 — Peking University, Department of Computer Science, Beijing, China
- Sheng Li 0009 — Xijing University, Xi'an, China (and 1 more)
- Sheng Li 0010 — National Institute of Information and Communications Technology (NICT), Universal Communication Research Institute (UCRI), Kyoto, Japan (and 5 more)
- Sheng Li 0011 — Zhongnan University of Economics and Law, School of Information and Safety Engineering, Wuhan, China (and 1 more)
- Sheng Li 0012 — Nanjing Institute of Technology, School of Electric Power Engineering, China
- Sheng Li 0013 — Central University of Finance and Economics, Beijing, China
- Sheng Li 0014 — Karlsruhe Institute of Technology, Germany
- Sheng Li 0015 — University of Texas Health Science Center at Houston, TX, USA
- Sheng Li 0016 — Nanjing University of Science and Technology, Nanjing, Jiangsu, China
- Sheng Li 0017 — Alibaba Inc., Hangzhou, China (and 1 more)
- Sheng Li 0018 — Wuhan University of Technology, National Engineering Laboratory for Fiber Optic Sensing Technology, China
- Sheng Li 0019 — University of Pittsburgh, PA, USA (and 1 more)
- Sheng Li 0020 — University of Electronic Science and Technology of China, Chengdu, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. Comput. J. 67(2): 498-507 (2024) - [j36]Le Feng, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. Comput. J. 67(5): 1879-1891 (2024) - [j35]Yi Luo, Sheng Li, Xinpeng Zhang, Guorui Feng:
Controlling the performance of deep neural networks using a single parameter. Evol. Intell. 17(5): 4303-4313 (2024) - [j34]Guorui Feng, Sheng Li, Jian Zhao, Zheng Wang:
Recent Advances in Deep Learning Model Security. Pattern Recognit. Lett. 185: 262-263 (2024) - [j33]Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024) - [j32]Xiaoxiao Hu, Sheng Li, Qichao Ying, Wanli Peng, Xinpeng Zhang, Zhenxing Qian:
Establishing Robust Generative Image Steganography via Popular Stable Diffusion. IEEE Trans. Inf. Forensics Secur. 19: 8094-8108 (2024) - [j31]Quan Wang, Sheng Li, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Multi-Source Style Transfer via Style Disentanglement Network. IEEE Trans. Multim. 26: 1373-1383 (2024) - [c42]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang:
Purified and Unified Steganographic Network. CVPR 2024: 27559-27568 - [i26]Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
From Covert Hiding to Visual Editing: Robust Generative Video Steganography. CoRR abs/2401.00652 (2024) - [i25]Xuntao Liu, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning. CoRR abs/2401.00653 (2024) - [i24]Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Object-oriented backdoor attack against image captioning. CoRR abs/2401.02600 (2024) - [i23]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang:
Purified and Unified Steganographic Network. CoRR abs/2402.17210 (2024) - [i22]Guobiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Cover-separable Fixed Neural Network Steganography via Deep Generative Models. CoRR abs/2407.11405 (2024) - [i21]Jialiang Li, Haoyue Wang, Sheng Li, Zhenxing Qian, Xinpeng Zhang, Athanasios V. Vasilakos:
Are handcrafted filters helpful for attributing AI-generated images? CoRR abs/2407.14570 (2024) - [i20]Miaomiao Wang, Guang Hua, Sheng Li, Guorui Feng:
A Key-Driven Framework for Identity-Preserving Face Anonymization. CoRR abs/2409.03434 (2024) - 2023
- [j30]Le Feng, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning. Inf. Sci. 647: 119453 (2023) - [j29]Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Learning to Immunize Images for Tamper Localization and Self-Recovery. IEEE Trans. Pattern Anal. Mach. Intell. 45(11): 13814-13830 (2023) - [j28]Wanli Peng, Tao Wang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack. IEEE Signal Process. Lett. 30: 299-303 (2023) - [j27]Wanli Peng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism. IEEE ACM Trans. Audio Speech Lang. Process. 31: 3513-3526 (2023) - [j26]Zhiying Zhu, Ping Wei, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding. IEEE Trans. Circuits Syst. Video Technol. 33(6): 3017-3029 (2023) - [j25]Zichi Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 250-260 (2023) - [c41]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian:
Steganography of Steganographic Networks. AAAI 2023: 5178-5186 - [c40]Manman Zhang, Yuchen Ma, Ge Luo, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Identifying the Style of Chatting. APSIPA ASC 2023: 1085-1092 - [c39]Ge Luo, Manman Zhang, Yuchen Ma, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts. CIKM 2023: 1687-1696 - [c38]Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. ICCV 2023: 22377-22387 - [c37]Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Image Protection for Robust Cropping Localization and Recovery. ICME 2023: 1193-1198 - [c36]Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. ACM Multimedia 2023: 737-746 - [c35]Haoyue Wang, Sheng Li, Silu Cao, Rui Yang, Jishen Zeng, Zhenxing Qian, Xinpeng Zhang:
On Physically Occluded Fake Identity Document Detection. ACM Multimedia 2023: 1556-1564 - [c34]Jingxuan Tan, Nan Zhong, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Deep Neural Network Watermarking against Model Extraction Attack. ACM Multimedia 2023: 1588-1597 - [c33]Manman Zhang, Ge Luo, Yuchen Ma, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts. ACM Multimedia 2023: 4688-4696 - [c32]Quan Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images. ACM Multimedia 2023: 6928-6937 - [c31]Gaozhi Liu, Yichao Si, Zhenxing Qian, Xinpeng Zhang, Sheng Li, Wanli Peng:
WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs. ACM Multimedia 2023: 7274-7282 - [c30]Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. ACM Multimedia 2023: 7943-7951 - [i19]Le Feng, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Trojaning semi-supervised learning model via poisoning wild images on the web. CoRR abs/2301.00435 (2023) - [i18]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian:
Steganography of Steganographic Networks. CoRR abs/2302.14521 (2023) - [i17]Ping Wei, Qing Zhou, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Generative Steganography Diffusion. CoRR abs/2305.03472 (2023) - [i16]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Generative Steganographic Flow. CoRR abs/2305.05838 (2023) - [i15]Guobiao Li, Sheng Li, Meiling Li, Zhenxing Qian, Xinpeng Zhang:
Towards Deep Network Steganography: From Networks to Networks. CoRR abs/2307.03444 (2023) - [i14]Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. CoRR abs/2307.10642 (2023) - [i13]Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. CoRR abs/2307.16418 (2023) - [i12]Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. CoRR abs/2309.09700 (2023) - [i11]Ge Luo, Junqiang Huang, Manman Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. CoRR abs/2311.13619 (2023) - 2022
- [j24]Chao Xu, Yunfeng Yan, Lehangyu Yang, Sheng Li, Guorui Feng:
Altered Fingerprints Detection Based on Deep Feature Fusion. IEICE Trans. Inf. Syst. 105-D(9): 1647-1651 (2022) - [j23]Xiaoping Liang, Zhenjun Tang, Sheng Li, Chunqiang Yu, Xianquan Zhang:
A novel hashing scheme via image feature map and 2D PCA. IET Image Process. 16(12): 3225-3236 (2022) - [j22]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Robust backdoor injection with the capability of resisting network transfer. Inf. Sci. 612: 594-611 (2022) - [j21]Biao Deng, Sheng Li, Zhenxing Qian:
An SVD-based screen-shooting resilient watermarking scheme. Multim. Tools Appl. 81(23): 32841-32855 (2022) - [j20]Yu Zhou, Sheng Li, Witold Pedrycz, Guorui Feng:
ACDB-EA: Adaptive convergence-diversity balanced evolutionary algorithm for many-objective optimization. Swarm Evol. Comput. 75: 101145 (2022) - [j19]Zhiying Zhu, Hang Zhou, Siyuan Xing, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Perceptual Hash of Neural Networks. Symmetry 14(4): 810 (2022) - [j18]Wennan Huan, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1955-1965 (2022) - [j17]Yingqiang Qiu, Qichao Ying, Yuyan Yang, Huanqiang Zeng, Sheng Li, Zhenxing Qian:
High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5874-5887 (2022) - [j16]Quan Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Multi-granularity Brushstrokes Network for Universal Style Transfer. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 107:1-107:17 (2022) - [c29]Baogen Zhang, Sheng Li, Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Patch Diffusion: A General Module for Face Manipulation Detection. AAAI 2022: 3243-3251 - [c28]Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Object-Oriented Backdoor Attack Against Image Captioning. ICASSP 2022: 2864-2868 - [c27]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Stealthy Backdoor Attack with Adversarial Training. ICASSP 2022: 2969-2973 - [c26]Guobiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Encryption Resistant Deep Neural Network Watermarking. ICASSP 2022: 3064-3068 - [c25]Ge Luo, Ping Wei, Shuwen Zhu, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Image Steganalysis with Convolutional Vision Transformer. ICASSP 2022: 3089-3093 - [c24]Qi Song, Sheng Li, Ping Wei, Ge Luo, Xinpeng Zhang, Zhenxing Qian:
Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation. ICASSP 2022: 6587-6591 - [c23]Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
RWN: Robust Watermarking Network for Image Cropping Localization. ICIP 2022: 301-305 - [c22]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. ICME 2022: 1-6 - [c21]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Unlabeled Backdoor Poisoning in Semi-Supervised Learning. ICME 2022: 1-6 - [c20]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Generative Steganographic Flow. ICME 2022: 1-6 - [c19]Zhuowen Yuan, Zhengxin You, Sheng Li, Zhenxing Qian, Xinpeng Zhang, Alex C. Kot:
On Generating Identifiable Virtual Faces. ACM Multimedia 2022: 1465-1473 - [c18]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, Qing Zhou:
Generative Steganography Network. ACM Multimedia 2022: 1621-1629 - [c17]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. ACM Multimedia 2022: 2834-2842 - [c16]Gaozhi Liu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
HF-Defend: Defending Against Adversarial Examples Based on Halftoning. MMSP 2022: 1-6 - [i10]Yangming Zhou, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Multimodal Fake News Detection via CLIP-Guided Learning. CoRR abs/2205.14304 (2022) - [i9]Yifei Wang, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion. CoRR abs/2206.01094 (2022) - [i8]Yangming Zhou, Qichao Ying, Xiangyu Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness. CoRR abs/2207.03409 (2022) - [i7]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. CoRR abs/2207.10292 (2022) - [i6]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, Qing Zhou:
Generative Steganography Network. CoRR abs/2207.13867 (2022) - [i5]Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Learning to Immunize Images for Tamper Localization and Self-Recovery. CoRR abs/2210.15902 (2022) - [i4]Haoyue Wang, Meiling Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Exploring Depth Information for Face Manipulation Detection. CoRR abs/2212.14230 (2022) - 2021
- [j15]Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Destroying robust steganography in online social networks. Inf. Sci. 581: 605-619 (2021) - [j14]Guorui Feng, Sheng Li, Haoliang Li, Shujun Li:
Special issue on low complexity methods for multimedia security. Multim. Syst. 27(3): 301-302 (2021) - [j13]Xun Zhu, Sheng Li, Xinpeng Zhang, Haoliang Li, Alex C. Kot:
Detection of Spoofing Medium Contours for Face Anti-Spoofing. IEEE Trans. Circuits Syst. Video Technol. 31(5): 2039-2045 (2021) - [c15]Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
On Generating JPEG Adversarial Images. ICME 2021: 1-6 - [c14]Zhengxin You, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Reversible Privacy-Preserving Recognition. ICME 2021: 1-6 - [c13]Renjie Zhu, Ping Wei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
Fragile Neural Network Watermarking with Trigger Image Set. KSEM 2021: 280-293 - [c12]Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, Zhenxing Qian:
Diffusing the Liveness Cues for Face Anti-spoofing. ACM Multimedia 2021: 1636-1644 - [i3]Zhuowen Yuan, Sheng Li, Xinpeng Zhang, Zhenxin Qian, Alex C. Kot:
On Generating Identifiable Virtual Faces. CoRR abs/2110.07986 (2021) - [i2]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. CoRR abs/2112.14420 (2021) - 2020
- [j12]Guorui Feng, Xinpeng Zhang, Yanli Ren, Zhenxing Qian, Sheng Li:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020) - [j11]Sheng Li, Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020)
2010 – 2019
- 2019
- [j10]Sheng Li, Jiajun Su, Zichi Wang, Xin Chen:
Privacy protection based on binary fingerprint compression. J. Real Time Image Process. 16(3): 791-798 (2019) - [j9]Jinyuan Tao, Sheng Li, Xinpeng Zhang, Zichi Wang:
Towards Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2): 594-600 (2019) - [j8]Sheng Li, Xinpeng Zhang:
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images. IEEE Trans. Image Process. 28(3): 1482-1497 (2019) - [c11]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. ICAIS (3) 2019: 115-127 - 2018
- [j7]Yingqiang Qiu, Han He, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream using alternative embedding. J. Vis. Commun. Image Represent. 52: 86-91 (2018) - [j6]Jinpeng Lv, Sheng Li, Xinpeng Zhang:
A novel auxiliary data construction scheme for reversible data hiding in JPEG images. Multim. Tools Appl. 77(14): 18029-18041 (2018) - [c10]Zhenxing Qian, Lin Pan, Sheng Li, Xinpeng Zhang:
Steganography by Constructing Marbling Texture. ICCCS (4) 2018: 428-439 - 2017
- [i1]Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang:
Data hiding in Fingerprint Minutiae Template for Privacy Protection. CoRR abs/1710.00516 (2017) - 2016
- [j5]Yan Wang, Sheng Li, Alex C. Kot:
On Branded Handbag Recognition. IEEE Trans. Multim. 18(9): 1869-1881 (2016) - 2015
- [j4]Yan Wang, Sheng Li, Alex C. Kot:
DeepBag: Recognizing Handbag Models. IEEE Trans. Multim. 17(11): 2072-2083 (2015) - [c9]Huijing Zhan, Sheng Li, Alex C. Kot:
Tagging the shoe images by semantic attributes. DSP 2015: 892-895 - [c8]Yan Wang, Sheng Li, Alex C. Kot:
Quality guided handbag segmentation. DSP 2015: 896-900 - [c7]Yan Wang, Sheng Li, Alex ChiChung Kot:
Joint learning for image-based handbag recommendation. ICME 2015: 1-6 - 2014
- [c6]Yan Wang, Sheng Li, Alex C. Kot:
Complementary feature extraction for branded handbag recognition. ICIP 2014: 5896-5900 - [c5]Yan Wang, Sheng Li, Alex C. Kot:
Category-Separating Strategy for branded handbag recognition. ISCCSP 2014: 61-64 - 2013
- [j3]Sheng Li, Alex C. Kot:
Fingerprint Combination for Privacy Protection. IEEE Trans. Inf. Forensics Secur. 8(2): 350-360 (2013) - 2012
- [j2]Sheng Li, Alex C. Kot:
An Improved Scheme for Full Fingerprint Reconstruction. IEEE Trans. Inf. Forensics Secur. 7(6): 1906-1912 (2012) - [c4]Huafeng Qin, Sheng Li, Alex C. Kot, Lan Qin:
Quality assessment of finger-vein image. APSIPA 2012: 1-4 - 2011
- [j1]Sheng Li, Alex C. Kot:
Privacy Protection of Fingerprint Database. IEEE Signal Process. Lett. 18(2): 115-118 (2011) - [c3]Sheng Li, Alex C. Kot:
A novel system for fingerprint privacy protection1. IAS 2011: 262-266 - [c2]Sheng Li, Alex C. Kot:
Attack using reconstructed fingerprint. WIFS 2011: 1-6 - 2010
- [c1]Sheng Li, Alex C. Kot:
Privacy protection of fingerprint database using lossless data hiding. ICME 2010: 1293-1298
Coauthor Index
aka: Alex C. Kot
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint