(*Corresponding author)
JOURNAL:
[1].Yuanman Li, Jiaxiong Ye, Limin Zeng, Rongqin Liang, Xianwei Zheng, WeiWei Sun, and Na Wang, "Learning Hierarchical Fingerprints via Multi-Level Fusion for Video Integrity and Source Analysis", IEEE Transactions on Consumer Electronics (T-CE), in press, 2024.
[2].Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, and Xia Li, "Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training", IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), in press, 2023.
[3].Yuanman Li, Minhua Liu, Jinyu Tian, Jie Du, and Xia Li, "Operation History Estimation and Its Application to Multi-Degraded Image Restoration", IEEE Transactions on Consumer Electronics (T-CE), in press, 2023.
[4]. Yuanman Li, Jiaxiang You, Jiantao Zhou, Wei Wang, Xin Liao and Xia Li, "Image Operation Chain Detection with Machine Translation Framework", IEEE Transactions on Multimedia (T-MM), in press, 2022.
[5]. Yuanman Li, J. T. Zhou, J. Y. Tian, X. W. Zheng and Y. Y .Tang, "Weighted Error Entropy based Information Theoretic Learning for Robust Subspace Representation", IEEE Transactions on Neural Networks and Learning Systems (T-NNLS), vol. 33, no. 9, pp. 4228-4242, 2022.
[6]. Yuanman Li and J. T. Zhou, "Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 14, no. 5, pp. 1307-1322, 2019.
[7]. Yuanman Li, J. T. Zhou, and A. Cheng, "SIFT Keypoint Removal via Directed Graph Construction for Color Images", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 12, no. 12, pp. 2971-2985, 2017.
[8]. Yuanman Li, J. T. Zhou, A. Cheng, X. M. Liu, and Y. Y. Tang, "SIFT Keypoint Removal and Injection via Convex Relaxation", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 11, no. 8, pp. 1722-1735, 2016.
[9]. Yuanman Li, Jiantao Zhou and Xia Li, "Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion", IEEE Transactions on Computational Social Systems (T-CSS), vol.9, no.6, pp.1830-1841, 2022.
[10]. Yuanman Li, R. Q. Liang, W. Wei, W. Wang, J. T. Zhou and X. Li, "Temporal Pyramid Network with Spatial-Temporal Attention for Pedestrian Trajectory Prediction", IEEE Transactions on Network Science and Engineering (T-NSE), vol.9, no.3, pp.1006-1019, 2022.
[11]. Yuanman Li, Ce Xie, Rongqin Liang, Jie Du, Jiantao Zhou and Xia Li, "A Synchronous Bi-Directional Framework With Temporally Dependent Interaction Modeling for Pedestrian Trajectory Prediction", IEEE Transactions on Network Science and Engineering (T-NSE), in press, 2023.
[12]. Yuanman Li and J. T. Zhou, "Anti-Forensics of Lossy Predictive Image Compression", IEEE Signal Processing Letters (SPL), vol. 22, no. 12, pp. 2219-2223, 2015.
[13]. Rongqin Liang, Yuanman Li*, Ce Xie, Rongqin Liang, Jie Du, Jiantao Zhou and Xia Li, "STGlow: A Flow-Based Generative Framework with Dual-Graphormer for Pedestrian Trajectory Prediction", IEEE Transactions on Neural Networks and Learning Systems (T-NNLS), in press, 2023.
[14]. Jie Du, Kai Guan, Yanhong Zhou, Yuanman Li* and Tianfu Wang, "Parameter-Free Similarity-Aware Attention Module for Medical Image Classification and Segmentation", IEEE Transactions on Emerging Topics in Computational Intelligence (T-ETCI), pp.845-857, 2023.
[15]. Zhongyun Hua, Ziyi Wang, Yifeng Zheng, Yongyong Chen and Yuanman Li*, "Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams", IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), vol. 33, no. 3, pp.1003-1018, 2023.
[16]. Jie Du, Kai Guan, Peng Liu,Yuanman Li* and Tianfu Wang, "Boundary-Sensitive Loss Function With Location Constraint for Hard Region Segmentation", IEEE Journal of Biomedical and Health Informatics (J/BHI), pp.992-1003, 2023.
[17]. Junyang Chen, Zhiguo Gong,Yuanman Li*, Huanjian Zhang, Hongyong Yu, JunzhangZhu, Ge Fan, Xiao-Ming Wu and Kaishun Wu, "Meta-Path Based Neighbors for Behavioral Target Generalization in Sequential Recommendation", IEEE Transactions on Network Science and Engineering (T-NSE), pp.1658-1667, 2022.
[18]. Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yongyong Chen and Yicong Zhou, "AMS-Net: Adaptive Multi-Scale Network for Image Compressive Sensing", IEEE Transactions on Multimedia (T-MM), in press, 2022.
[19]. Junyang Chen, Xueliang Li, Yuanman Li, Paul Li, Mengzhu Wang, Xiang Zhang, Zhiguo Gong, Kaishun Wu and Victor C.M. Leung, "A Simple Yet Effective Layered Loss for Pre-Training of Network Embedding", IEEE Transactions on Network Science and Engineering (T-NSE), pp.1827-1837, 2022.
[20]. Y. C. Su, J. Du, Yuanman Li*, X. Li, Z. Y. Hua and J. T Zhou, "Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network", IEEE Transactions on Intelligent Transportation Systems (T-ITS), vol.23, no.9, pp. 16773-16785, 2022.
[21]. K. Y. Zhang, Z. Y. Hua, Yuanman Li, Y. S. Zhang and Y. C. Zhou, "Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service," IEEE Transactions on Services Computing, accepted, 2023.
[22]. H. W. Wu, J. T. Zhou and Yuanman Li, "Deep Generative Model for Image Inpainting with Local Binary Pattern Learning and Spatial Attention", IEEE Transactions on Multimedia (T-MM), vol. 24, pp. 4016-4027, 2022.
[23]. W. W. Sun, J. T. Zhou, Yuanman Li, M. Cheung and J. She, "Robust High Capacity Watermarking over Online Social Network Shared Images", IEEE Transactions on Circuits and Systems for Video Technology (T-SCVT), vol.31, pp.1208-1221, 2021.
[24]. J. Duan, J. T. Zhou and Yuanman Li, "Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF)", IEEE Transactions on Services Computing (T-SC), vol. 14, no. 6, pp. 1940-1953,2021.
[25]. Z. Y. Hua, K. Y. Zhang, Yuanman Li and Y. C. Zhou, "Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing", Signal Processing, vol.183, pp. 107998, 2021.
[26]. Z. Y. Hua, Z. H. Zhu, Y. Y. Chen and Yuanman Li , "Color image encryption using orthogonal Latin squares and a new 2D chaotic system", Nonlinear Dynamics, vol.104, pp. 4505-4522, 2021.
[27]. Z. Y. Hua, J. X. Li, Yuanman Li and Y. Y. Chen "Image encryption using value-differencing transformation and modified ZigZag transformation", Nonlinear Dynamics, vol.106, pp.3583-3599, 2021.
[28]. J. Duan, J. T. Zhou and Yuanman Li, "Privacy-Preserving distributed deep learning based on secret sharing", Information Science, vol. 527, pp. 108-127, 2020.
CONFERENCE
[1]. Yuanman Li, J. T. Zhou, X. W. Zheng, J. Y. Tian and Y. Y. Tang, "Robust Subspace Clustering with Independent and Piecewise Identically Distributed (i.p.i.d.) Noise Modeling", IEEE Conf. Comput. Vis. and Pattern Recogn. (CVPR), 2019 (oral, top 5% paper).
[2]. Yuxuan Tan, Yuanman Li*, Limin Zeng, Jiaxiong Ye, Wei Wang and Xia Li, "Multi-scale Target-Aware Framework for Constrained Image Splicing Detection and Localization", ACM Multimedia (ACM MM), 2023.
[3]. J. X. You, Yuanman Li*, J. T. Zhou, Z. Y. Hua, W. W. Sun and X. Li, "A Transformer based Approach for Image Manipulation Chain Detection", ACM Multimedia (ACM MM), 2021.
[4]. Y. C. Su, Yuanman Li *, W. Wang, J. T. Zhou and X. Li, "A Unified Environmental Network for Pedestrian Trajectory Prediction", AAAI Conference on Artificial Intelligence (AAAI), 2024.
[5]. R. Q. Liang, Yuanman Li *, X. Li, Y. Tang, J. T. Zhou and W. B. Zou, "Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision", AAAI Conference on Artificial Intelligence (AAAI), 2021.
[6]. J. Y. Tian, J. T. Zhou, Yuanman Li and J. Duan, "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain", AAAI Conference on Artificial Intelligence (AAAI), 2021.
[7]. Y. Y. Li, J. T. Zhou, and Yuanman Li, "Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion", In Proceedings of ACM Multimedia (ACM MM), 2015.
[8]. Yingjie He, Yuanman Li*, Changsheng Chen and Xia Li, "Image Copy-Move Forgery Detection via Deep CrossScale PatchMatch", IEEE International Conference on Multimedia and Expo (ICME), pp.2327-2332, 2023 (oral, top 15% paper).
[9]. Minhua Liu, Yuanman Li*, Rongqin Liang, Jiaxiang You and Xia Li, "Multiple Degraded Image Restoration via Degradation History Estimation", IEEE International Conference on Multimedia and Expo (ICME), pp.528-533, 2023 (oral, top 15% paper).
[10]. Jiaxiang You, Yuanman Li*, Rongqin Liang, Yuxuan Tan, Jiantao Zhou and Xia Li, "Image Sharing Chain Detection via Sequence-To-Sequence Model", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1-6, 2023 (oral, top 15% paper).
[11]. Ce Xie, Yuanman Li*, Rongqin Liang, Li Dong and Xia Li, "Synchronous Bi-directional Pedestrian Trajectory Prediction with Error Compensation", Asian Conference on Computer Vision (ACCV), pp.2796-2812, 2022.
[12]. Liangpei Hu, Yuanman Li*,Jiaxiang You, Rongqin Liang and Xia Li, "An Edge-Aware Transformer Framework for Image Inpainting Detection", International Conference on Artificial Intelligence and Security (ICAIS), pp.648-660, 2022.
[13]. Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan and Yuanman Li, "Robust Document Image Forgery Localization Against Image Blending", IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.810-817, 2022.
[14]. Li Dong, Jie Wang, Rangding Wang, Yuanman Li and Weiwei Sun "Towards Image Data Hiding via Facial Stego Synthesis with Generative Model", International Joint Conference on Artificial Intelligence - International Workshop on Safety & Security of Deep Learning (IJCAI -Workshop), in press, 2021.
[15]. W. Wang, B. X. Lu, Yuanman Li, W. Wei, J. Q. Li, S. Mumtaz and M. Guizani, "Task Scheduling Game Optimization for Mobile Edge Computing", IEEE International Conference on Communications (ICC), in press, 2021.
[16]. H.W.WU, J.T. Zhou, Yuanman Li, "Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks", APSIPA Annual Summit and Conference (ASC), 2019. (Oral)
[17]. Yuanman Li and J. T. Zhou, "Image Copy-Move Forgery Detection Using Hierarchical Feature Point Matching", APSIPA Annual Summit and Conference (ASC), 2016. (Oral)
[18]. J. Duan, J. T. Zhou, and Yuanman Li, "Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)", ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec-16), 2016.
[19]. A. Cheng, Yuanman Li, and J. T. Zhou, "SIFT Keypoint Removal via Convex Relaxation", IEEE International Conference on Multimedia and Expo (ICME-15), 2015 (oral, top 15% paper).
[20]. Y. Y. Li, J. T. Zhou, Yuanman Li, and O. C. Au, "Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique", IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.
[21]. Yuanman Li and J. T. Zhou, "Sparsity-driven reconstruction of L_\infinity-decoded images",IEEE International Conference on Image Processing (ICIP), 2014.
[22]. L. Dong, J. Wang, Yuanman Li and Y. Y. Tang,"Sector projection fourier descriptor for Chinese character recognition", IEEE International Conference on Cybernetics (CYBCONF), 2013.
Recent Accepted Paper:
New!!! One paper is accepted in AAAI 2024
New!!! One paper is accepted in TMM 2023
New!!! One paper is accepted in TNNLS 2023
New!!! One paper is accepted in TNSE 2023
New!!! One paper is accepted in TCSVT 2023
New!!! One paper is accepted in ACMMM 2023
New!!! One paper is accepted in ICASSP 2023
New!!! Two papers are accepted in ICME 2023