师资队伍

李元满

  • 办公室:深圳大学沧海校区致信楼N605
  • 导师类别:
  • E-mail:yuanmanli@szu.edu.cn
  • 办公电话:
个人详情

Introduction

李元满,博士,电子与信息工程学院助理教授,IEEE会员。2012年获重庆大学软件工程专业学士。毕业后以全额奖学金推免到澳门大学,并分别于2015年和2018年获得澳门大学软件工程硕士和计算机科学博士学位。20189月至20198月于澳门大学智慧城市物联网国家重点实验室从事博士后研究。20199月至今就职于深圳大学电子与信息工程学院。长期从事多媒体信息安全计算机视觉等领域的科研工作。获评深圳市"孔雀计划"海外高层次人才C类。主持多项国家自然科学基金项目、省部级自然科学基金项目以及上市企业横向项目,在T-IFS, T-SC, T-CSVT, T-MM, T-NNLS, T-NSE, CVPR, ACMMM, AAAI等国际权威期刊和会议上发表文章50余篇,研究成果荣获2022年澳门自然科学奖。担任信号处理国际著名期刊 IEEE Signal Processing Letters (SPL) 副主编,IEEE Transactions on Image Processing, IEEE Transactions on Information Forensics and Security等多个期刊的审稿人,以及多个国际会议的领域主席

个人主页:https://yuanmanli.github.io/

Teaching

l 大数据分析(本科生)

l 专业综合设计(本科生)

l 机器学习(研究生)

Award and Honor

l 澳门科学技术自然科学奖三等奖(排名第二),澳门特别行政区(2022

l 深圳市优秀科技创新人才,深圳市科技创新委员会(2022

l 澳门研究生科技研发奖,澳门科学技术发展基金(2018

l 研究生全额奖学金,澳门大学(2012-2015

l 重庆大学优秀毕业生,重庆大学(2012

Positions

l 20249月份入学 计算机科学,软件工程,电子信息,数学等方向研究生若干名

l 博士后 Postdoc. Position若干名(税后32W RMB起)

Professional Activities and Affiliations

l   IEEE Signal Processing Letters (SPL) 副主编 2024.04 -

l   Senior Member of IEEE (2024-)

l   中国图像图形学会(CSIG-数字媒体取证与安全专业委员会委员 (2020.11-至今)

Funding (Principal Investigator)

l 国家重点实验室开放项目, 2023.01-2024.12, 80,000 MOP.

l 腾讯犀牛鸟”-青年教师科研基金项目, 2023.01-2024.12, 50,000 RMB.

l CCF-阿里巴巴创新研究计划, 2022.08-2023.07, 300,000 RMB.

l 深圳市优秀科技创新人才项目, 2022.04-2024.04, 300,000 RMB.

l 广东省自然科学基金面上项目, 2022.01-2024.12, 100,000 RMB.

l National Natural Science Foundation of China (NSFC), 2021.01-2022.12, 300,000 RMB.

l Overseas High-Caliber Personnel Fund, 2021.01-2022.12, 2,700,000 RMB.

l Natural Science Foundation of Guangdong, 2020.01-2021.12, 100,000 RMB.

l Natural Science Foundation of Shenzhen University, 2020.01-2022.12, 200,000 RMB.

l 横向项目,2020.07-2021.12185,000 RMB.

Selected Publications

(*Corresponding author)

JOURNAL:

[1].Yuanman Li, Jiaxiong Ye, Limin Zeng, Rongqin Liang, Xianwei Zheng, WeiWei Sun, and Na Wang, "Learning Hierarchical Fingerprints via Multi-Level Fusion for Video Integrity and Source Analysis", IEEE Transactions on Consumer Electronics (T-CE), in press, 2024.

[2].Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, and Xia Li, "Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training", IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), in press, 2023.

[3].Yuanman Li, Minhua Liu, Jinyu Tian, Jie Du, and Xia Li, "Operation History Estimation and Its Application to Multi-Degraded Image Restoration", IEEE Transactions on Consumer Electronics (T-CE), in press, 2023.

[4]. Yuanman Li, Jiaxiang You, Jiantao Zhou, Wei Wang, Xin Liao and Xia Li, "Image Operation Chain Detection with Machine Translation Framework", IEEE Transactions on Multimedia (T-MM), in press, 2022.

[5]. Yuanman Li, J. T. Zhou, J. Y. Tian, X. W. Zheng and Y. Y .Tang, "Weighted Error Entropy based Information Theoretic Learning for Robust Subspace Representation", IEEE Transactions on Neural Networks and Learning Systems (T-NNLS), vol. 33, no. 9, pp. 4228-4242, 2022.

[6]. Yuanman Li and J. T. Zhou, "Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 14, no. 5, pp. 1307-1322, 2019.

[7]. Yuanman Li, J. T. Zhou, and A. Cheng, "SIFT Keypoint Removal via Directed Graph Construction for Color Images", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 12, no. 12, pp. 2971-2985, 2017.

[8]. Yuanman Li, J. T. Zhou, A. Cheng, X. M. Liu, and Y. Y. Tang, "SIFT Keypoint Removal and Injection via Convex Relaxation", IEEE Transactions on Information Forensics and Security (T-IFS), vol. 11, no. 8, pp. 1722-1735, 2016.

[9]. Yuanman Li, Jiantao Zhou and Xia Li, "Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion", IEEE Transactions on Computational Social Systems (T-CSS), vol.9, no.6, pp.1830-1841, 2022.

[10]. Yuanman Li, R. Q. Liang, W. Wei, W. Wang, J. T. Zhou and X. Li, "Temporal Pyramid Network with Spatial-Temporal Attention for Pedestrian Trajectory Prediction", IEEE Transactions on Network Science and Engineering (T-NSE), vol.9, no.3, pp.1006-1019, 2022.

[11]. Yuanman Li, Ce Xie, Rongqin Liang, Jie Du, Jiantao Zhou and Xia Li, "A Synchronous Bi-Directional Framework With Temporally Dependent Interaction Modeling for Pedestrian Trajectory Prediction", IEEE Transactions on Network Science and Engineering (T-NSE), in press, 2023.

[12]. Yuanman Li and J. T. Zhou, "Anti-Forensics of Lossy Predictive Image Compression", IEEE Signal Processing Letters (SPL), vol. 22, no. 12, pp. 2219-2223, 2015.

[13]. Rongqin Liang, Yuanman Li*, Ce Xie, Rongqin Liang, Jie Du, Jiantao Zhou and Xia Li, "STGlow: A Flow-Based Generative Framework with Dual-Graphormer for Pedestrian Trajectory Prediction", IEEE Transactions on Neural Networks and Learning Systems (T-NNLS), in press, 2023.

[14]. Jie Du, Kai Guan, Yanhong Zhou, Yuanman Li* and Tianfu Wang, "Parameter-Free Similarity-Aware Attention Module for Medical Image Classification and Segmentation", IEEE Transactions on Emerging Topics in Computational Intelligence (T-ETCI), pp.845-857, 2023.

[15]. Zhongyun Hua, Ziyi Wang, Yifeng Zheng, Yongyong Chen and Yuanman Li*, "Enabling Large-Capacity Reversible Data Hiding Over Encrypted JPEG Bitstreams", IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), vol. 33, no. 3, pp.1003-1018, 2023.

[16]. Jie Du, Kai Guan, Peng Liu,Yuanman Li* and Tianfu Wang, "Boundary-Sensitive Loss Function With Location Constraint for Hard Region Segmentation", IEEE Journal of Biomedical and Health Informatics (J/BHI), pp.992-1003, 2023.

[17]. Junyang Chen, Zhiguo Gong,Yuanman Li*, Huanjian Zhang, Hongyong Yu, JunzhangZhu, Ge Fan, Xiao-Ming Wu and Kaishun Wu, "Meta-Path Based Neighbors for Behavioral Target Generalization in Sequential Recommendation", IEEE Transactions on Network Science and Engineering (T-NSE), pp.1658-1667, 2022.

[18]. Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yongyong Chen and Yicong Zhou, "AMS-Net: Adaptive Multi-Scale Network for Image Compressive Sensing", IEEE Transactions on Multimedia (T-MM), in press, 2022.

[19]. Junyang Chen, Xueliang Li, Yuanman Li, Paul Li, Mengzhu Wang, Xiang Zhang, Zhiguo Gong, Kaishun Wu and Victor C.M. Leung, "A Simple Yet Effective Layered Loss for Pre-Training of Network Embedding", IEEE Transactions on Network Science and Engineering (T-NSE), pp.1827-1837, 2022.

[20]. Y. C. Su, J. Du, Yuanman Li*, X. Li, Z. Y. Hua and J. T Zhou, "Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network", IEEE Transactions on Intelligent Transportation Systems (T-ITS), vol.23, no.9, pp. 16773-16785, 2022.

[21]. K. Y. Zhang, Z. Y. Hua, Yuanman Li, Y. S. Zhang and Y. C. Zhou, "Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service," IEEE Transactions on Services Computing, accepted, 2023.

[22]. H. W. Wu, J. T. Zhou and Yuanman Li, "Deep Generative Model for Image Inpainting with Local Binary Pattern Learning and Spatial Attention", IEEE Transactions on Multimedia (T-MM), vol. 24, pp. 4016-4027, 2022.

[23]. W. W. Sun, J. T. Zhou, Yuanman Li, M. Cheung and J. She, "Robust High Capacity Watermarking over Online Social Network Shared Images", IEEE Transactions on Circuits and Systems for Video Technology (T-SCVT), vol.31, pp.1208-1221, 2021.

[24]. J. Duan, J. T. Zhou and Yuanman Li, "Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF)", IEEE Transactions on Services Computing (T-SC), vol. 14, no. 6, pp. 1940-1953,2021.

[25]. Z. Y. Hua, K. Y. Zhang, Yuanman Li and Y. C. Zhou, "Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing", Signal Processing, vol.183, pp. 107998, 2021.

[26]. Z. Y. Hua, Z. H. Zhu, Y. Y. Chen and Yuanman Li , "Color image encryption using orthogonal Latin squares and a new 2D chaotic system", Nonlinear Dynamics, vol.104, pp. 4505-4522, 2021.

[27]. Z. Y. Hua, J. X. Li, Yuanman Li and Y. Y. Chen "Image encryption using value-differencing transformation and modified ZigZag transformation", Nonlinear Dynamics, vol.106, pp.3583-3599, 2021.

[28]. J. Duan, J. T. Zhou and Yuanman Li, "Privacy-Preserving distributed deep learning based on secret sharing", Information Science, vol. 527, pp. 108-127, 2020.


CONFERENCE

[1]. Yuanman Li, J. T. Zhou, X. W. Zheng, J. Y. Tian and Y. Y. Tang, "Robust Subspace Clustering with Independent and Piecewise Identically Distributed (i.p.i.d.) Noise Modeling", IEEE Conf. Comput. Vis. and Pattern Recogn. (CVPR), 2019 (oral, top 5% paper).

[2]. Yuxuan Tan, Yuanman Li*, Limin Zeng, Jiaxiong Ye, Wei Wang and Xia Li, "Multi-scale Target-Aware Framework for Constrained Image Splicing Detection and Localization", ACM Multimedia (ACM MM), 2023.

[3]. J. X. You, Yuanman Li*, J. T. Zhou, Z. Y. Hua, W. W. Sun and X. Li, "A Transformer based Approach for Image Manipulation Chain Detection", ACM Multimedia (ACM MM), 2021.

[4]. Y. C. Su, Yuanman Li *, W. Wang, J. T. Zhou and X. Li, "A Unified Environmental Network for Pedestrian Trajectory Prediction", AAAI Conference on Artificial Intelligence (AAAI), 2024.

[5]. R. Q. Liang, Yuanman Li *, X. Li, Y. Tang, J. T. Zhou and W. B. Zou, "Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision", AAAI Conference on Artificial Intelligence (AAAI), 2021.

[6]. J. Y. Tian, J. T. Zhou, Yuanman Li and J. Duan, "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain", AAAI Conference on Artificial Intelligence (AAAI), 2021.

[7]. Y. Y. Li, J. T. Zhou, and Yuanman Li, "Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion", In Proceedings of ACM Multimedia (ACM MM), 2015.

[8]. Yingjie He, Yuanman Li*, Changsheng Chen and Xia Li, "Image Copy-Move Forgery Detection via Deep CrossScale PatchMatch", IEEE International Conference on Multimedia and Expo (ICME), pp.2327-2332, 2023 (oral, top 15% paper).

[9]. Minhua Liu, Yuanman Li*, Rongqin Liang, Jiaxiang You and Xia Li, "Multiple Degraded Image Restoration via Degradation History Estimation", IEEE International Conference on Multimedia and Expo (ICME), pp.528-533, 2023 (oral, top 15% paper).

[10]. Jiaxiang You, Yuanman Li*, Rongqin Liang, Yuxuan Tan, Jiantao Zhou and Xia Li, "Image Sharing Chain Detection via Sequence-To-Sequence Model", IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1-6, 2023 (oral, top 15% paper).

[11]. Ce Xie, Yuanman Li*, Rongqin Liang, Li Dong and Xia Li, "Synchronous Bi-directional Pedestrian Trajectory Prediction with Error Compensation", Asian Conference on Computer Vision (ACCV), pp.2796-2812, 2022.

[12]. Liangpei Hu, Yuanman Li*,Jiaxiang You, Rongqin Liang and Xia Li, "An Edge-Aware Transformer Framework for Image Inpainting Detection", International Conference on Artificial Intelligence and Security (ICAIS), pp.648-660, 2022.

[13]. Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan and Yuanman Li, "Robust Document Image Forgery Localization Against Image Blending", IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.810-817, 2022.

[14]. Li Dong, Jie Wang, Rangding Wang, Yuanman Li and Weiwei Sun "Towards Image Data Hiding via Facial Stego Synthesis with Generative Model", International Joint Conference on Artificial Intelligence - International Workshop on Safety & Security of Deep Learning (IJCAI -Workshop), in press, 2021.

[15]. W. Wang, B. X. Lu, Yuanman Li, W. Wei, J. Q. Li, S. Mumtaz and M. Guizani, "Task Scheduling Game Optimization for Mobile Edge Computing", IEEE International Conference on Communications (ICC), in press, 2021.

[16]. H.W.WU, J.T. Zhou, Yuanman Li, "Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks", APSIPA Annual Summit and Conference (ASC), 2019. (Oral)

[17]. Yuanman Li and J. T. Zhou, "Image Copy-Move Forgery Detection Using Hierarchical Feature Point Matching", APSIPA Annual Summit and Conference (ASC), 2016. (Oral)

[18]. J. Duan, J. T. Zhou, and Yuanman Li, "Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)", ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec-16), 2016.

[19]. A. Cheng, Yuanman Li, and J. T. Zhou, "SIFT Keypoint Removal via Convex Relaxation", IEEE International Conference on Multimedia and Expo (ICME-15), 2015 (oral, top 15% paper).

[20]. Y. Y. Li, J. T. Zhou, Yuanman Li, and O. C. Au, "Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique", IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2015.

[21]. Yuanman Li and J. T. Zhou, "Sparsity-driven reconstruction of L_\infinity-decoded images",IEEE International Conference on Image Processing (ICIP), 2014.

[22]. L. Dong, J. Wang, Yuanman Li and Y. Y. Tang,"Sector projection fourier descriptor for Chinese character recognition", IEEE International Conference on Cybernetics (CYBCONF), 2013.

Recent Accepted Paper:

New!!! One paper is accepted in AAAI 2024

New!!! One paper is accepted in TMM 2023

New!!! One paper is accepted in TNNLS 2023

New!!! One paper is accepted in TNSE 2023

New!!! One paper is accepted in TCSVT 2023

New!!! One paper is accepted in ACMMM 2023

New!!! One paper is accepted in ICASSP 2023

New!!! Two papers are accepted in ICME 2023