Profile image of Chang-Tsun Li

Prof Chang-Tsun Li

STAFF PROFILE

Position

Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Qualifications

Postgradute Certificate in Higher Education, University of Warwick, 2006
Doctor of Philosophy in Computer Science, University of Warwick, 1998
Master of Science (Computer Science), US Naval Postgraduate School, 1992
Bachelor of Science in Electrical Engineering, Chung Cheng Institute of Tech, 1987

Contact

changtsun.li@deakin.edu.au
+61 3 522 73559

Biography

Chang-Tsun Li received the BSc degree in electrical engineering from National Defense University, Taiwan, the MSc degree in computer science from the U.S. Naval Postgraduate School, and the PhD degree in computer science from the University of Warwick, UK. He is currently Professor of Cyber Security at Deakin University. He has had over 20 years research experience in multimedia forensics and security, biometrics, machine learning, data analytics, computer vision, image processing, pattern recognition, bioinformatics and content-based image retrieval. The outcomes of his research have been translated into award-winning commercial products protected by a series of international patents and have been used by a number of law enforcement agencies, national security institutions and companies around the world, including INTERPOL (Lyon, France), UK Home Office, Metropolitan Police Service (UK), Sussex Police Service (UK), Guildford Crown Court (UK), and US Department of Homeland Security. The research team of the CSCRC-funded Development of Australian Cyber Criteria Assessment (DACCA) project under his leadership is the winner of the 2021 AISA Cyber Security Researcher of the Year Award. In addition to his active contribution to the advancement of his field of research through publication, Chang-Tsun Li is also enthusiastically serving the international cyber security community. He is currently Chair of Computational Forensics Technical Committee of the International Association of Pattern Recognition (IAPR), Member of IEEE Information Forensics and Security Technical Committee, Associate Editor of IEEE Transactions on Circuit and System for Video Technology, IET Biometrics and the EURASIP Journal of Image and Video Processing. 

Read more on Chang-Tsun's profile

Research interests

Cyber Security, Multimedia Forensics & Security, Biometrics, Machine Learning, Computer Vision, Image Processing, Data Analytics, Pattern Recognition, Content-Based Image Retrieval,  Computer Vision, Image Processing, Huma-Computer Interaction, Bioinformatics

Awards

  1. 2021 AISA Cyber Security Researcher of the Year: This award was presented by the Australian Information Security Association to the research team of the Development of Australian Cyber Criteria Assessment (DACCA) research project led by me. DACCA is funded by the Australian Government’s Cyber Security Cooperative Research Centre.
  2. Finalist for Scientist of the Year of Australian Defence Awards 2021
  3. Finalist for Academic of the Year of Australian Defence Awards 2021
  4. Finalist for Academic of the Year of Australian Defence Awards 2020
  5. Best Paper Award of the 15th IEEE International Conference on Advanced Video and Signal-based Surveillance, Auckland, New Zealand, 2018 (Co-author Xufeng Lin)
  6. Finalist of the 2014 IT Project Demonstrating Most Effective Use of Collaborative Technology Award of the prestigious UK IT Industry Awards presented by the British Computing Society (University of Warwick entry).
  7. EU Marie Curie Fellowship: funded by European Commission, 1 October 2010 – 30 September 2011 
  8. Medallist of the British Computer Society 2011 UK IT Industry Awards (Technology Excellence Award category)

Publications

Filter by

2024

Deepfake detection based on cross-domain local characteristic analysis with multi-domain transformer

M Amin, Y Hu, C Li, B Liu

(2024), Vol. 91, pp. 592-609, AEJ - Alexandria Engineering Journal, Amsterdam, The Netherlands, C1

journal article
2023

Self-Supervised Leaf Segmentation under Complex Lighting Conditions

Xufeng Lin, Chang-Tsun Li, Scott Adams, Abbas Kouzani, Richard Jiang, Ligang He, Yongjian Hu, Michael Vernon, Egan Doeven, Lawrence Webb, Todd Mcclellan, Adam Guskich

(2023), Vol. 135, pp. 1-14, Pattern Recognition, Amsterdam, The Netherlands, C1

journal article

Deep Learning for Predictive Analytics in Reversible Steganography

Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li

(2023), Vol. 11, pp. 3494-3510, IEEE Access, Piscataway, N.J., C1

journal article

Development of a Protection Profile Module for Encryption Key Management Components

Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong

(2023), Vol. 11, pp. 9113-9121, IEEE Access, Piscataway, N.J., C1

journal article

Source Camera Identification with a Robust Device Fingerprint: Evolution from Image-Based to Video-Based Approaches

Manisha, C Li, K Kotegar

(2023), Vol. 23, pp. 1-22, Sensors, Basel, Switzerland, C1

journal article

Learnable Information-Preserving Image Resizer for Face Forgery Detection

H She, Y Hu, B Liu, J Li, C Li

(2023), Vol. 30, pp. 1657-1661, IEEE Signal Processing Letters, Piscataway, N.J., C1

journal article

An Effective Training Strategy for Enhanced Source Camera Device Identification

Manisha, Chang-Tsun Li, Karunakar Kotegar

(2023), pp. 32-45, ICPR 2022 : Proceedings of the Pattern Recognition, Computer Vision, and Image Processing International Workshops and Challenges, Montreal, Quebec, E1

conference

Improving Detection of Unprecedented Anti-forensics Attacks on Sensor Pattern Noises Through Generative Adversarial Networks

Yijun Quan, Chang-Tsun Li

(2023), pp. 46-56, ICPR 2022 : Proceedings of the Pattern Recognition, Computer Vision, and Image Processing International Workshops and Challenges, Montreal, Quebec, E1

conference

Hybrid Domain Meta-Learning Network for Face Forgery Detection and Localization in Deepfakes

H Zhao, B Liu, Y Hu, J Li, C Li

(2023), Vol. 2023-June, pp. 1-8, IJCNN 2023 : Proceedings of the International Joint Conference on Neural Networks, Gold Coast, Queensland, E1

conference
2022

Quantum Bitcoin: The Intersection of Bitcoin, Quantum Computing and Blockchain

Y Zhu, Q Ni, R Jiang, A Bouridane, C Li

(2022), pp. 223-234, Advanced Sciences and Technologies for Security Applications, Berlin, Germany, B1

book chapter

Biometric Blockchain (BBC) Based e-Passports for Smart Border Control

B Xu, Q Ni, R Jiang, A Bouridane, C Li

(2022), pp. 235-248, Advanced Sciences and Technologies for Security Applications, Berlin, Germany, B1

book chapter

Contention-aware prediction for performance impact of task co-running in multicore computers

S Ren, L He, J Li, Z Chen, P Jiang, C Li

(2022), Vol. 28, pp. 1293-1300, Wireless Networks, C1

journal article

Improving Face-Based Age Estimation with Attention-Based Dynamic Patch Fusion

H Wang, V Sanchez, C Li

(2022), Vol. 31, pp. 1084-1096, IEEE Transactions on Image Processing, New York, NY, C1

journal article

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Islam, Leo Zhang, Md Islam, Warren Armstrong

(2022), Vol. 10, pp. 44756-44777, IEEE Access, C1

journal article

Delve into Activations: Towards Understanding Dying Neuron

Ziping Jiang, Yunpeng Wang, Chang-Tsun Li, Plamen Angelov, Richard Jiang

(2022), pp. 1-13, IEEE Transactions on Artificial Intelligence, Piscataway, N.J., C1

journal article

Robust Brain Age Estimation Based on sMRI via Nonlinear Age-Adaptive Ensemble Learning

Z Zhang, R Jiang, C Zhang, B Williams, Z Jiang, C Li, P Chazot, N Pavese, A Bouridane, A Beghdadi

(2022), Vol. 30, pp. 2146-2156, IEEE Transactions on Neural Systems and Rehabilitation Engineering, United States, C1

journal article

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond

Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong

(2022), Vol. 10, pp. 71749-71763, IEEE Access, Piscataway, N.J., C1

journal article

Robust and Fair Undersea Target Detection with Automated Underwater Vehicles for Biodiversity Data Collection

R Dinakaran, L Zhang, C Li, A Bouridane, R Jiang

(2022), Vol. 14, Remote Sensing, C1

journal article

Open-Set Source Camera Device Identification of Digital Images Using Deep Learning

Manisha, C Li, K Kotegar

(2022), Vol. 10, pp. 110548-110556, IEEE Access, C1

journal article

Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification

Manisha, C Li, X Lin, K Kotegar

(2022), Vol. 22, pp. 7871-7871, Sensors, Switzerland, C1

journal article

MGGAN: improving sample generations of Generative Adversarial Networks

H Wu, L He, C Li, J Li, W Wu, C Maple

(2022), pp. 369-376, Proceedings: 2021 IEEE 23rd International Conference on High Performance Computing and Communications, 7th International Conference on Data Science and Systems, 19th International Conference on Smart City and 7th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021, Haikou, Hainan, China, E1

conference

A MULTI-SCALE CONTENT-INSENSITIVE FUSION CNN FOR SOURCE SOCIAL NETWORK IDENTIFICATION

Manisha, C Li, K Kotegar

(2022), pp. 2981-2985, ICIP 2022 : Proceedings of the IEEE International Conference on Image Processing 2022, Bordeaux, France, E1

conference
2021

On addressing the impact of ISO speed upon PRNU and forgery detection

Yijun Quan, Chang Li

(2021), Vol. 16, pp. 190-202, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Multi-domain adversarial feature generalization for person re-identification

S Lin, C Li, A Kot

(2021), Vol. 30, pp. 1596-1607, IEEE transactions on image processing, Piscataway, N.J., C1

journal article

An HEVC steganalytic approach against motion vector modification using local optimality in candidate list

S Liu, Y Hu, B Liu, C Li

(2021), Vol. 146, pp. 23-30, Pattern recognition letters, Amsterdam, The Netherlands, C1

journal article

On the detection-to-track association for online multi-object tracking

X Lin, C Li, V Sanchez, C Maple

(2021), Vol. 146, pp. 200-207, Pattern recognition letters, Amsterdam, The Netherlands, C1

journal article

Age-Oriented Face Synthesis With Conditional Discriminator Pool and Adversarial Triplet Loss

Haoyi Wang, Victor Sanchez, Chang-Tsun Li

(2021), Vol. 30, pp. 5413-5425, IEEE Transactions on Image Processing, Piscataway, N.J., C1

journal article

Knowledge discovery and visualisation framework using machine learning for music information retrieval from broadcast radio data

M Furner, M Islam, C Li

(2021), Vol. 182, pp. 1-11, Expert systems with applications, Amsterdam, The Netherlands, C1

journal article

Identification of source social network of digital images using deep neural network

Manisha, A Karunakar, C Li

(2021), Vol. 150, pp. 17-25, Pattern Recognition Letters, Amsterdam, The Netherlands, C1

journal article

DeepfakeUCL: Deepfake Detection via Unsupervised Contrastive Learning

S Fung, X Lu, C Zhang, C Li

(2021), pp. 1-8, IJCNN 2021 : Proceedings of the 2021 International Joint Conference on Neural Networks, Shenzhen, China, E1

conference

On Constructing A Better Correlation Predictor For Prnu-Based Image Forgery Localization

X Lin, C Li

(2021), pp. 1-6, ICME 2021 : Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, Shenzhen, China, E1

conference
2020

Person re-identification with soft biometrics through deep learning

Shan Lin, Chang Li

(2020), pp. 21-36, Deep biometrics, Cham, Switzerland, B1

book chapter

Using age information as a soft biometric trait for face image analysis

Haoyi Wang, Victor Sanchez, Wanli Ouyang, Chang Li

(2020), pp. 1-20, Deep biometrics, Cham, Switzerland, B1

book chapter

Atypical facial landmark localisation with stacked hourglass networks: a study on 3D facial modelling for medical diagnosis

Gary Storey, Ahmed Bouridane, Richard Jiang, Chang Li

(2020), pp. 37-49, Deep biometrics, Cham, Switzerland, B1

book chapter

ENF based video forgery detection algorithm

Y Wang, Y Hu, A Liew, C Li

(2020), Vol. 12, pp. 131-156, International Journal of Digital Crime and Forensics, Hershey, N.Y., C1

journal article

Manifold learning for user profiling and identity verification using motion sensors

G Santos, P Pisani, R Leyva, C Li, T Tavares, A Rocha

(2020), Vol. 106, Pattern Recognition, C1

journal article

Provenance inference for instagram photos through device fingerprinting

Y Quan, X Lin, C Li

(2020), Vol. 8, pp. 168309-168320, IEEE Access, C1

journal article

PRNU-Based Content Forgery Localization Augmented with Image Segmentation

X Lin, C Li

(2020), Vol. 8, pp. 222645-222659, IEEE Access, C1

journal article

Deep Biometrics

Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger

(2020), Cham, Switzerland, A7

edited book

Warwick image forensics dataset for device fingerprinting in multimedia forensics

Y Quan, C Li, Y Zhou, L Li

(2020), pp. 1-6, ICME : Proceedings of the 2020 IEEE International Conference on Multimedia and Expo, Online from London, England, E1

conference

Dronecaps: recognition of human actions in drone videos using capsule networks with binary volume comparisons

A Algamdi, V Sanchez, C Li

(2020), pp. 3174-3178, ICIP 2020 : Proceedings of the 2020 IEEE International Conference on Image Processing, Online from Abu Dhabi, United Arab Emirates, E1

conference
2019

WolfPath: accelerating iterative traversing-based graph processing algorithms on GPU

H Zhu, L He, S Fu, R Li, X Han, Z Fu, Y Hu, C Li

(2019), Vol. 47, pp. 644-667, International journal of parallel programming, Berlin, Germany, C1-1

journal article

Social Network Identification Through Image Classification with CNN

I Amerini, C Li, R Caldelli

(2019), Vol. 7, pp. 35264-35273, IEEE Access, C1-1

journal article

Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems

C Chang, C Li

(2019), Vol. 16, pp. 3367-3381, Mathematical biosciences and engineering, Springfield, Mo., C1

journal article

Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues

C Chang, C Li, K Chen

(2019), Vol. 7, pp. 54117-54132, IEEE Access, C1

journal article

Auto-zooming CNN-based framework for real-time pedestrian detection in outdoor surveillance videos

S Alfasly, B Liu, Y Hu, Y Wang, C Li

(2019), Vol. 7, pp. 105816-105826, IEEE access, Piscataway, N.J., C1

journal article

Compact and Low-Complexity Binary Feature Descriptor and Fisher Vectors for Video Analytics

R Leyva, V Sanchez, C Li

(2019), Vol. 28, pp. 6169-6184, IEEE Transactions on Image Processing, United States, C1

journal article

Hybrid clustering of shared images on social networks for digital forensics

R Rouhi, F Bertini, D Montesi, X Lin, Y Quan, C Li

(2019), Vol. 7, pp. 87288-87302, IEEE Access, C1

journal article

3DPalsyNet: a facial palsy grading and motion recognition framework using fully 3D convolutional neural networks

Gary Storey, Richard Jiang, Shelagh Keogh, Ahmed Bouridane, Chang-Tsun Li

(2019), Vol. 7, pp. 121655-121664, IEEE access, PIscataway, N.J., C1

journal article

Privacy-preserving reversible watermarking for data exfiltration prevention through lexicographic permutations

C Chang, C Li

(2019), Vol. 109, pp. 330-339, IIH-MSP 2018 : Proceedings of the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, E1-1

conference

Provenance analysis for instagram photos

Y Quan, X Lin, ChangTsun Li

(2019), Vol. 996, pp. 372-383, AusDM 2018 : Australasian Conference on Data Mining, Bathurst, N.S.W., E1-1

conference

Homogeneous feature transfer and heterogeneous location fine-tuning for cross-city property appraisal framework

Y Guo, S Lin, X Ma, J Bal, C Li

(2019), Vol. 996, pp. 161-174, AusDM 2018 : Proceedings of the 16th Australasian Data Mining Conference 2018, Bathurst, N.S.W., E1-1

conference

Social network forensics through smartphones and shared images

R Rouhi, F Bertini, D Montesi, C Li

(2019), IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics, Cancun, Mexico, E1

conference

Learning temporal information from spatial information using CapsNets for human action recognition

A Algamdi, V Sanchez, C Li

(2019), pp. 3867-3871, ICASSP 2019 : Proceedings of the 2019 44th IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, Eng., E1

conference

Accelerometer dense trajectories for activity recognition and people identification

R Leyva, G Santos, A Rocha, V Sanchez, C Li

(2019), pp. 1-6, IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics (IWBF), Cancún, Mexico, E1-1

conference
2018

Image provenance inference through content-based device fingerprint analysis

Xufeng Lin, Chang Li

(2018), pp. 279-310, Information security: foundations, technologies and applications, London, Eng., B1-1

book chapter

Privacy-Aware Reversible Watermarking in Cloud Computing Environments

C Chang, C Li, Y Shi

(2018), Vol. 6, pp. 70720-70733, IEEE Access, C1-1

journal article

On view-invariant gait recognition: a feature selection solution

N Jia, V Sanchez, C Li

(2018), Vol. 7, pp. 287-295, IET biometrics, Stevenage, Eng., C1-1

journal article

Fast fragile watermark embedding and iterative mechanism with high self-restoration performance

S Bravo-Solorio, F Calderon, C Li, A Nandi

(2018), Vol. 73, pp. 83-92, Digital signal processing, Amsterdam, The Netherlands, C1-1

journal article

Inference of a compact representation of sensor fingerprint for source camera identification

R Li, C Li, Y Guan

(2018), Vol. 74, pp. 556-567, Pattern recognition, Amsterdam, The Netherlands, C1-1

journal article

Modelling and developing conflict-aware scheduling on large-scale data centres

B Wang, C Chen, L He, B Gao, J Ren, Z Fu, S Fu, Y Hu, C Li

(2018), Vol. 86, pp. 995-1007, Future Generation Computer Systems, C1-1

journal article

Developing a pattern discovery method in time series data and its GPU acceleration

H Zhu, Z Gu, H Zhao, K Chen, C Li, L He

(2018), Vol. 1, pp. 266-283, Big data mining and analytics, Piscataway, N.J., C1-1

journal article

Active learning in multi-domain collaborative filtering recommender systems

X Guan, C Li, Y Guan

(2018), pp. 1351-1357, SAC 2018 : Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, E1-1

conference

Fast detection of abnormal events in videos with binary features

R Leyva, V Sanchez, C Li

(2018), pp. 1318-1322, ICASSP 2018 : Proceedings of the 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, Calgary, Alta., E1-1

conference

PRNU-based image classification of origin social network with CNN

R Caldelli, I Amerini, C Li

(2018), pp. 1357-1361, EUSIPCO 2018 : Proceedings of the 26th European Signal Processing Conference, Rome, Italy, E1-1

conference

Rotation-invariant binary representation of sensor pattern noise for source-oriented image and video clustering

X Lin, C Li

(2018), pp. 1-6, AVSS 2018 : Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance 2018, Auckland, N.Z., E1-1

conference

Detecting small objects in high resolution images with integral fisher score

R Leyva, V Sanchez, C Li

(2018), pp. 316-320, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1

conference

Fusion network for face-based age estimation

H Wang, X Wei, V Sanchez, C Li

(2018), pp. 2675-2679, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1

conference

A multi-task learning CNN for image steganalysis

X Yu, H Tan, H Liang, C Li, G Liao

(2018), pp. 1-7, WIFS 2018 Proceedings of the 10th IEEE International Workshop on Information Forensics and Security 2018, Hong Kong, China, E1-1

conference

Multi-task mid-level feature alignment network for unsupervised cross-dataset person re-identification

S Lin, H Li, C Li, A Kot

(2018), BMVC 2018: Proceedings of the 29th British Machine Vision Conference, Newcastle upon Tyne, England, E1-1

conference
2017

Face recognition technologies for evidential evaluation of video traces

X Wei, C Li

(2017), pp. 177-193, Handbook of biometrics for forensic science, Cham, Switzerland, B1-1

book chapter

Matrix Factorization with Rating Completion: An Enhanced SVD Model for Collaborative Filtering Recommender Systems

X Guan, C Li, Y Guan

(2017), Vol. 5, pp. 27668-27678, IEEE Access, C1-1

journal article

Video anomaly detection with compact feature sets for online performance

R Leyva, V Sanchez, C Li

(2017), Vol. 26, pp. 3463-3478, IEEE Transactions on Image Processing, United States, C1-1

journal article

Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation

A Khadidos, V Sanchez, C Li

(2017), Vol. 26, pp. 1979-1991, IEEE Transactions on Image Processing, United States, C1-1

journal article

Large-scale image clustering based on camera fingerprints

X Lin, C Li

(2017), Vol. 12, pp. 793-808, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal article

A fast source-oriented image clustering method for digital forensics

C Li, X Lin

(2017), Vol. 2017, Eurasip Journal on Image and Video Processing, C1-1

journal article

Hierarchical Relaxed Partitioning System for Activity Recognition

F Azhar, C Li

(2017), Vol. 47, pp. 784-795, IEEE Transactions on Cybernetics, United States, C1-1

journal article

Learning optimised representations for view-invariant gait recognition

N Jia, V Sanchez, C Li

(2017), pp. 774-780, IJCB 2017 : Proceedings of the 2017 International Joint Conference on Biometrics, Denver, Colo., E1-1

conference

Secure secret sharing in the cloud

C Chang, C Li

(2017), pp. 358-361, ISM 2017 : Proceedings of the 2017 IEEE International Symposium on Multimedia, Taichung, Taiwan, E1-1

conference

End-to-end correspondence and relationship learning of mid-level deep features for person re-identification

S Lin, C Li

(2017), pp. 1-6, DICTA 2017 : Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, Sydney, New South Wales, E1

conference

Fast and robust framework for view-invariant gait recognition

N Jia, C Li, V Sanchez, A Liew

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1

conference

The LV dataset: a realistic surveillance video dataset for abnormal event detection

R Leyva, V Sanchez, C Li

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 2017 5th International Workshop on Biometrics and Forensics, Coventry, Eng., E1-1

conference

Reversible data hiding in JPEG images based on adjustable padding

C Chang, C Li

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics 2017, Coventry, Eng., E1-1

conference

An adaptive tri-pixel unit steganographic algorithm using the least two significant bits

X Yu, H Liang, M Li, C Li

(2017), pp. 1-6, IWBF 2017 Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1

conference

Abnormal event detection in videos using binary features

R Leyva, V Sanchez, C Li

(2017), pp. 621-625, TSP 2017 : Proceedings of the 40th International Conference on Telecommunications and Signal Processing, Barcelona, Spain, E1-1

conference

Patch-based segmentation of overlapping cervical cells using active contour with local edge information

A Khadidos, V Sanchez, C Li

(2017), pp. 1058-1062, 2017 ICASSP : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, New Orleans, La., E1-1

conference
2016

Gait recognition based on the golden ratio

Y Liang, C Li, Y Guan, Y Hu

(2016), Vol. 2016, Eurasip Journal on Image and Video Processing, C1-1

journal article

Enhancing sensor pattern noise via filtering distortion removal

X Lin, C Li

(2016), Vol. 23, pp. 381-385, IEEE signal processing letters, Piscataway, N.J., C1-1

journal article

Preprocessing reference sensor pattern noise via spectrum equalization

X Lin, C Li

(2016), Vol. 11, pp. 126-140, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal article

Enhanced SVD for collaborative filtering

X Guan, C Li, Y Guan

(2016), Vol. 9652, pp. 503-514, PAKDD 2016 : Proceedings of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining 2016, Auckland, N.Z., E1-1

conference

Fast binary-based video descriptors for action recognition

R Leyva, V Sanchez, Chang Li

(2016), pp. 1-8, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1

conference

A novel online Bayes classifier

T Nguyen, T Nguyen, X Pham, A Liew, Y Hu, T Liang, C Li

(2016), pp. 1-6, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1

conference

A fast binary pair-based video descriptor for action recognition

R Leyva, V Sanchez, C Li

(2016), pp. 4185-4189, ICIP 2016 : Proceedings of the 2016 IEEE International Conference on Image Processing, Phoenix, Ariz., E1-1

conference

Refining PRNU-based detection of image forgeries

X Lin, C Li

(2016), pp. 222-226, DMIAF 2016 : Proceedings of the 2016 Digital Media Industry & Academic Forum, Santorini, Greece, E1-1

conference
2015

On forensic use of biometrics

Banafshe Arbab-Zavar, Xingjie Wei, John Bustard, Mark Nixon, Chang Li

(2015), pp. 270-304, Handbook of digital forensics of multimedia data and devices, Chichester, Eng., B1-1

book chapter

On reducing the effect of covariate factors in gait recognition: a classifier ensemble method

Yu Guan, Chang Li, Fabio Roli

(2015), Vol. 37, pp. 1521-1528, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1

journal article

Fast source camera identification using matching signs between query and reference fingerprints

Yongjian Hu, Chang Li, Zhimao Lai

(2015), Vol. 74, pp. 7405-7428, Multimedia tools and applications, New York, N.Y., C1-1

journal article

The influence of segmentation on individual gait recognition

N Jia, V Sanchez, C Li, H Mansour

(2015), WIFS 2015 : Proceedings of the IEEE International Workshop on Information Forensics and Security, Rome, Italy, E1-1

conference

Incremental update of feature extractor for camera identification

R Li, C Li, Y Guan

(2015), pp. 324-328, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1

conference

Random subspace method for source camera identification

R Li, C Kotropoulos, C Li, Y Guan

(2015), MLSP 2015 : Proceedings of the IEEE 25th International Workshop on Machine Learning for Signal Processing, Boston, Massachusetts, E1-1

conference

On reducing the effect of silhouette quality on individual gait recognition: a feature fusion approach

N Jia, V Sanchez, C Li, H Mansour

(2015), BIOSIG 2015 : Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, Germany, E1-1

conference

Hand gesture recognition and spotting in uncontrolled environments based on classifier weighting

Y Yao, C Li

(2015), pp. 3082-3086, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1

conference

A compact representation of sensor fingerprint for camera identification and fingerprint matching

R Li, C Li, Y Guan

(2015), pp. 1777-1781, ICASSP 2015 : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal, Brisbane, Queensland, E1-1

conference
2014

On the generalization power of face and gait in gender recognition

Y Guan, X Wei, C Li

(2014), Vol. 6, pp. 1-8, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal article

Dynamic image-to-class warping for occluded face recognition

X Wei, C Li, Z Lei, D Yi, S Li

(2014), Vol. 9, pp. 2035-2050, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal article

Human gait identification from extremely low-quality videos: an enhanced classifier ensemble method

Y Guan, Y Sun, C Li, M Tistarelli

(2014), Vol. 3, pp. 84-93, IET biometrics, Stevenage, Eng., C1-1

journal article

Digital forensic readiness: are we there yet?

A Mouhtaropoulos, C Li, M Grobler

(2014), Vol. 9, pp. 173-179, Journal of international commercial law and technology, Hellerup, Denmark, C1-1

journal article

Gait recognition using low spatial and temporal resolution videos

S Choudhury, Y Guan, C Li

(2014), pp. 1-6, IWBF2014 2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1

conference

HPS: histogram preserving steganography in spatial domain

Y Wang, W Chen, Y Li, W Wang, C Li

(2014), pp. 1-4, IWBF2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1

conference

PCA-based denoising of Sensor Pattern Noise for source camera identification

R Li, Y Guan, C Li

(2014), pp. 436-440, ChinaSIP 2014 : Proceedings of the 2014 IEEE China Summit & International Conference on Signal and Information Processing, Xi'an, China, E1-1

conference

A reference estimator based on composite sensor pattern noise for source device identification

R Li, C Li, Y Guan

(2014), Vol. 9028, pp. 90280O-1-90280O-7, SPIE 2014 : Proceedings of the 2014 Media Watermarking, Security and Forensics Conference, San Fransisco, Calif., E1-1

conference

Active contours based on weighted gradient vector flow and balloon forces for medical image segmentation

A Khadidos, V Sanchez, C Li

(2014), pp. 902-906, ICIP 2014 : Proceedings of the 2014 IEEE International Conference on Image Processing, Paris, France, E1-1

conference

Video anomaly detection based on wake motion descriptors and perspective grids

R Leyva, V Sanchez, C Li

(2014), pp. 209-214, WIFS 2014 : Proceedings of the IEEE International Workshop on Information Forensics and Security 2014, Atlanta, Ga., E1-1

conference

People identification and tracking through fusion of facial and gait features

Y Guan, X Wei, C Li, Y Keller

(2014), Vol. 8897, pp. 209-221, BIOMET2014 : Proceedings of the 1st International Workshop on Biometrics 2014, Sofia, Bulgaria, E1-1

conference

Two improved forensic methods of detecting contrast enhancement in digital images

X Lin, X Wei, C Li

(2014), Vol. 9028, pp. 90280X-1-90280X-10, Proceedings of the 2014 Media Watermarking, Security, and Forensics Conference, San Fransisco, Calif., E1-1

conference
2013

An improved fingerprinting algorithm for detection of video frame duplication forgery

Y Hu, Y Wang, C Li, B Liu

(2013), pp. 64-76, Emerging digital forensics applications for crime detection, prevention, and security, Hershey, Pa., B1-1

book chapter

Emerging digital forensics applications for crime detection, prevention, and security

C Li

(2013), Hershey, Pa., A7-1

edited book

Audio forensic authentication based on MOCC between ENF and reference signals

Z Lv, Y Hu, C Li, B Liu

(2013), pp. 427-431, IEEE ChinaSIP : Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, E1-1

conference

A robust speed-invariant gait recognition system for walker and runner identification

Y Guan, C Li

(2013), ICB 2013 : Proceedings of the 6th IAPR International Conference on Biometrics, Madrid, Spain, E1-1

conference

Audio forgery detection based on max offsets for cross correlation between ENF and reference signal

Y Hu, C Li, Z Lv, B Liu

(2013), Vol. 7809, pp. 253-266, IWDW12 : Proceedings of the International Workshop on Digital Forensics and Watermarking 2012, Shanghai, China, E1-1

conference

Exposing image forgery through the detection of contrast enhancement

X Lin, C Li, Y Hu

(2013), pp. 4467-4471, ICIP 2013 : Proceedings of the 2013 IEEE International Conference on Image Processing, Melbourne, Vic., E1-1

conference

A framework for real-time hand gesture recognition in uncontrolled environments with partition matrix model based on hidden conditional random fields

Y Yao, C Li

(2013), pp. 1205-1210, SMC 2013: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Manchester, England, E1-1

conference

Applying a digital forensic readiness framework: three case studies

A Mouhtaropoulos, P Dimotikalis, C Li

(2013), pp. 217-223, HST 2013 : Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, Mass., E1-1

conference

Hand gesture segmentation in uncontrolled environments with partition matrix and a spotting scheme based on hidden conditional random fields

Y Yao, C Li

(2013), pp. 842-846, ACPR 2013 : Proceedings of the 2013 2nd IAPR Asian Conference on Pattern Recognition, Naha, Japan, E1-1

conference

Combining gait and face for tackling the elapsed time challenges

Y Guan, X Wei, C Li, G Marcialis, F Roli, M Tistarelli

(2013), pp. 1-8, BTAS 2013 : Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, Washington, D.C., E1-1

conference

Real-time hand gesture recognition for uncontrolled environments using adaptive SURF tracking and hidden conditional random fields

Y Yao, C Li

(2013), Vol. 8034, pp. 542-551, ISVC 2013 : Proceedings of the 9th International Symposium on Visual Computing, Rethymnon, Crete, Greece, E1-1

conference

Fixation and saccade based face recognition from single image per person with various occlusions and expressions

X Wei, C Li

(2013), pp. 70-75, CVPRW 2013 : Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, Or., E1-1

conference

Face recognition with occlusion using Dynamic Image-to-Class Warping (DICW)

X Wei, C Li, Y Hu

(2013), pp. 1-6, FG13 : Proceedings of the 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, Shanghai, China, E1-1

conference

Robust face recognition with occlusions in both reference and query images

X Wei, C Li, Y Hu

(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1

conference

Robust gait recognition from extremely low frame-rate videos

Y Guan, C Li, S Choudhury

(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1

conference

Robust face recognition under varying illumination and occlusion considering structured sparsity

X Wei, C Li, Y Hu

(2013), DICTA 2012 : International Conference on Digital Image Computing Techniques and Applications, Fremantle, Western Australia, E1-1

conference

Watermarking method with exact self-propagating restoration capabilities

S Bravo-Solorio, C Li, A Nandi

(2013), pp. 217-222, WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, E1-1

conference
2012

Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Chang-Tsun Li, Anthony Ho

(2012), Hershey, Pa., A1-1

book

Color-decoupled photo response non-uniformity for digital image forensics

C Li, Y Li

(2012), Vol. 22, pp. 260-271, IEEE transactions on circuits and systems for video technology, Piscataway, N.J., C1-1

journal article

Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise

C Li, R Satta

(2012), Vol. 6, pp. 560-566, IET computer vision, Stevenage, Eng., C1-1

journal article

An improved fingerprinting algorithm for detection of video frame duplication forgery

Y Hu, C Li, Y Wang, B Liu

(2012), Vol. 4, pp. 20-32, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal article

Watermarking with lowembedding distortion and self-propagating restoration capabilities

S Bravo-Solorio, C Li, A Nandi

(2012), pp. 2197-2200, Proceedings - International Conference on Image Processing, ICIP, FL, Lake Buena Vista, E1-1

conference

Random subspace method for gait recognition

Yu Guan, Chang Li, Yongjian Hu

(2012), pp. 284-289, Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2012, Melbourne, Victoria, E1-1

conference

Fast camera fingerprint search algorithm for source camera identification

Y Hu, C Li, Z Lai, S Zhang

(2012), ISCCSP 2012 : Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, E1-1

conference

Gait recognition under carrying condition: A static dynamic fusion method

Y Guan, C Li, Y Hu

(2012), Vol. 8436, Proceedings of SPIE - The International Society for Optical Engineering, BELGIUM, Brussels, E1-1

conference
2011

Directed partial correlation: inferring large-scale gene regulatory network through induced topology disruptions

Yinyin Yuan, Chang-Tsun Li, Oliver Windram

(2011), Vol. 6, PLoS one, San Francisco, Calif., C1-1

journal article

Source camera identification issues: forensic features selection and robustness

Y Hu, C Li, C Zhou, X Lin

(2011), Vol. 3, pp. 1-15, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal article

New Technologies for Digital Crime and Forensics: Devices, Applications, and Software Devices, Applications, and Software

Chang-Tsun Li, Anthony Ho

(2011), Hershey, Pa., A7-1

edited book

Optimized digital library for digital forenisc based on decomposed PRNU

Y Li, C Li

(2011), pp. 610-613, ICMT 2011 : Proceedings of the 20112nd International Conference on Multimedia Technology, Hangzhou, China, E1-1

conference
2010

A temporal precedence based clustering method for gene expression microarray data

R Krishna, C Li, V Buchanan-Wollaston

(2010), Vol. 11, BMC Bioinformatics, C1-1

journal article

A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation

F Peng, R Guo, C Li, M Long

(2010), Vol. 42, pp. 1207-1216, Computer-aided design, Amsterdam, The Netherlands, C1-1

journal article

Progressive exponential clustering-based steganography

C Li, Y Li

(2010), Vol. 2010, pp. 1-14, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1

journal article

A conditional random field approach to unsupervised texture image segmentation

C Li

(2010), Vol. 2010, pp. 1-12, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1

journal article

Source camera identification using enhanced sensor pattern noise

C Li

(2010), Vol. 5, pp. 280-287, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal article

Selecting forensic features for robust source camera identification

Y Hu, C Li, C Zhou

(2010), pp. 506-511, ICS 2010 - International Computer Symposium, E1-1

conference

Digital camera identification using colour-decoupled photo response non-uniformity noise pattern

C Li, Y Li

(2010), pp. 3052-3055, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, Paris, FRANCE, E1-1

conference

A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar transformation

F Peng, R Guo, C Li, M Long

(2010), Vol. 41 LNICST, pp. 11-18, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, City Univ London, London, ENGLAND, E1-1

conference

On the repudiability of device identification and image integrity verification using sensor pattern noise

C Li, C Chang, Y Li

(2010), Vol. 41 LNICST, pp. 19-25, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, City Univ London, London, ENGLAND, E1-1

conference

Unsupervised classification of digital images using enhanced sensor pattern noise

C Li

(2010), pp. 3429-3432, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, Paris, FRANCE, E1-1

conference

Using improved imaging sensor pattern noise for source camera identification

Y Hu, C Jian, C Li

(2010), pp. 1481-1486, 2010 IEEE International Conference on Multimedia and Expo, ICME 2010, Singapore, SINGAPORE, E1-1

conference
2009

A contrast-sensitive reversible visible image watermarking technique

Y Yang, X Sun, H Yang, C Li, R Xiao

(2009), Vol. 19, pp. 656-667, IEEE Transactions on Circuits and Systems for Video Technology, Piscataway, N.J., C1-1

journal article

Trademark image retrieval using synthetic features for describing global shape and interior structure

C Wei, Y Li, W Chau, C Li

(2009), Vol. 42, pp. 386-394, Pattern Recognition, Amsterdam, The Netherlands, C1-1

journal article

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions Methods and Solutions

Chang-Tsun Li

(2009), Hershey, Pa., A7-1

edited book

Authenticating medical images through repetitive index modulation based watermarking

C Li, Y Li

(2009), Vol. 8 LNICST, pp. 153-159, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Univ Adelaide, Australian Natl Wine Ctr, Adelaide, AUSTRALIA, E1-1

conference

Decomposed photo response non-uniformity for digital forensic analysis

Y Li, C Li

(2009), Vol. 8, pp. 166-172, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Adelaide, South Aust., E1-1

conference

Inferring causal relations from multivariate time series: A fast method for large-scale gene expression data

Y Yuan, C Li

(2009), pp. 92-99, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, Taichung, TAIWAN, E1-1

conference

Detection of block artifacts for digital forensic analysis

C Li

(2009), Vol. 8 LNICST, pp. 173-178, e-Forensics 2009 : Proceedings of the Second iNternational Conference on Forensics in Telecommunications, Information and Multimedia, Univ Adelaide, Australian Natl Wine Ctr, Adelaide, AUSTRALIA, E1-1

conference

Interaction based functional clustering of genomic data

R Krishna, C Li, V Buchanan-Wollaston

(2009), pp. 130-137, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, Taichung, TAIWAN, E1-1

conference

Source camera identification using enahnced sensor pattern noise

C Li

(2009), pp. 1509-1512, Proceedings - International Conference on Image Processing, ICIP, Cairo, EGYPT, E1-1

conference
2008

Partial mixture model for tight clustering of gene expression time-course

Yinyin Yuan, Chang Li, Roland Wilson

(2008), Vol. 9, pp. 1-17, BMC bioinformatics, London, Eng., C1-1

journal article

An unsupervised conditional random fields approach for clustering gene expression time series

C Li, Y Yuan, R Wilson

(2008), Vol. 24, pp. 2467-2473, Bioinformatics, Oxford, Eng., C1-1

journal article

A Bayes random field approach for integrative large-scale regulatory network analysis

Y Yuan, C Li

(2008), Vol. 5, Journal of integrative bioinformatics, Berlin, Germany, C1-1

journal article

MIMIC-PPT: Mimicking-based steganography for microsoft power Point document

Y Liu, X Sun, Y Liu, C Li

(2008), Vol. 7, pp. 654-660, Information Technology Journal, Faisalabad, Pakistan, C1-1

journal article

Removable visible image watermarking algorithm in the discrete cosine transform domain

Y Yang, X Sun, H Yang, C Li

(2008), Vol. 17, pp. 1-11, Journal of Electronic Imaging, Bellingham, Wash., C1-1

journal article

Probabilistic framework for gene expression clustering validation based on gene ontology and graph theory

Y Yuan, C Li

(2008), pp. 625-628, ICASSP 2008 : Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, E1-1

conference

CBIR approach to building image retrieval based on invariant characteristics in Hough domain

X Yuan, C Li

(2008), pp. 1209-1212, ICASSP 2008 : Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, E1-1

conference
2007

Wavelet-based fragile watermarking scheme for image authentication

C Li, H Si

(2007), Vol. 16, Journal of electronic imaging, Bellingham, Wash., C1-1

journal article

Protection of mammograms using blind steganography and watermarking

Y Li, C Li, C Wei

(2007), pp. 496-499, IAS 2007 : Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, England, E1-1

conference

Steganographic method for colour image using expandable progressive exponential clustering

C Li, Y Li

(2007), pp. 495-500, IEEE DEST 2007 : Proceedings of the 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Queensland, E1-1

conference

Unsupervised clustering of gene expression time series with conditional random fields

Y Yuan, C Li

(2007), pp. 571-576, IEEE DEST 2007 : Proceedings of the 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Queensland, E1-1

conference

Effective extraction of Gabor features for adaptive mammogram retrieval

C Wei, Y Li, C Li

(2007), pp. 1503-1506, ICME 2007 : Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, E1-1

conference

Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain

Y Zhu, C Li, H Zhao

(2007), pp. 478-483, IAS 2007 : Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, England, E1-1

conference

Partial mixture model for tight clustering in exploratory gene expression analysis

Y Yuan, C Li

(2007), pp. 1061-1065, BIBE 2007 : Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, Boston, Massachusetts, E1-1

conference
2006

Digital watermarking scheme exploiting nondeterministic dependence for image authentication

C Li, Y Yuan

(2006), Vol. 45, Optical engineering, Bellingham, Wash., C1-1

journal article

Calcification descriptor and relevance feedback learning algorithms for content-based mammogram retrieval

C Wei, C Li

(2006), Vol. 4046 LNCS, pp. 307-314, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Manchester, ENGLAND, E1-1

conference

CBIR approach to building image retrieval based on linear edge distribution

X Yuan, C Li

(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, Sydney, Australia, E1-1

conference

Learning pathological characteristics from user's relevance feedback for content-based mammogram retrieval

C Wei, C Li

(2006), pp. 738-741, ISM 2006 - 8th IEEE International Symposium on Multimedia, San Diego, CA, E1-1

conference

Steganographic scheme for VQ compressed images using progressive exponential clustering

Y Li, C Li

(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, Sydney, Australia, E1-1

conference

Skin colour-based face detection in colour images

W Lai, C Li

(2006), pp. 56-61, AVSS 2006 : Proceedings IEEE International Conference on Video and Signal Based Surveillance 2006, Sydney, Australia, E1-1

conference
2005

A general framework for content-based medical image retrieval with its application to mammograms

C Wei, C Li, R Wilson

(2005), Vol. 5748, pp. 134-143, Progress in Biomedical Optics and Imaging - Proceedings of SPIE, San Diego, CA, E1-1

conference

A palette-based image steganographic method using colour quantisation

X Wang, Z Yao, C Li

(2005), Vol. 2, pp. 1087-1090, Proceedings - International Conference on Image Processing, ICIP, Genoa, ITALY, E1-1

conference

High efficiency abrasive machining process and its key technologies

C Li, G Cai, S Xiu

(2005), pp. 516-519, PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, Northeastern Univ, Shenyang, PEOPLES R CHINA, E1-1

conference
2004

Fragile watermarking scheme exploiting non-deterministic block-wise dependency

Y Yuan, C Li

(2004), Vol. 4, pp. 849-852, Proceedings - International Conference on Pattern Recognition, British Machine Vis Assoc, Cambridge, ENGLAND, E1-1

conference

Semi-fragile watermarking scheme for authentication of JPEG images

C Ho, C Li

(2004), Vol. 1, pp. 7-11, International Conference on Information Technology: Coding Computing, ITCC, Las Vegas, NV, E1-1

conference
2003

One-dimensional neighborhood forming strategy for fragile watermarking

C Li, F Yang

(2003), Vol. 12, pp. 284-291, Journal of electronic imaging, Bellingham, Wash., C1-1

journal article

Multiresolution image segmentation integrating Gibbs sampler and region merging algorithm

C Li

(2003), Vol. 83, pp. 67-78, Signal processing, Amsterdam, The Netherlands, C1-1

journal article

A class of discrete multiresolution random fields and its application to image segmentation

R Wilson, C Li

(2003), Vol. 25, pp. 42-56, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1

journal article

Multiresolution genetic clustering algorithm for texture segmentation

C Li, R Chiao

(2003), Vol. 21, pp. 955-966, Image and vision computing, Amsterdam, The Netherlands, C1-1

journal article

Watermarking scheme for authentication of compressed image

T Hsieh, C Li, S Wang

(2003), Vol. 5241, pp. 1-9, Proceedings of SPIE - The International Society for Optical Engineering, ORLANDO, FL, C1-1

journal article

Unsupervised texture segmentation using multiresolution hybrid genetic algorithm

C Li, R Chiao

(2003), Vol. 2, pp. 1033-1036, IEEE International Conference on Image Processing, BARCELONA, SPAIN, E1-1

conference
2002

Oblivious fragile watermarking scheme for image authentication

C Li, F Yang, C Lee

(2002), Vol. 4, pp. 3445-3448, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, ORLANDO, FL, E1-1

conference
2001

Approach to reducing the labeling cost of Markov random fields within an infinite label space

C Li

(2001), Vol. 81, pp. 609-620, Signal processing, Amsterdam, The Netherlands, C1-1

journal article
1999

Edge detection based on the Multiresolution Fourier Transform

C Li, D Lou

(1999), pp. 686-693, IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, Taipei, Taiwan, E1-1

conference

Hidden multiresolution random fields and their application to image segmentation

R Wilson, C Li

(1999), pp. 346-351, ICIAP 1999 : Proceedings of the 10th International Conference on Image Analysis and Processing, Venice, Italy, E1-1

conference
1998

Image segmentation based on a multiresolution Bayesian framework

C Li, R Wilson

(1998), Vol. 3, pp. 761-765, IEEE International Conference on Image Processing, CHICAGO, IL, E1-1

conference
1997

Textured image segmentation using multiresolution Markov Random Fields and a two-component texture model

C Li, R Wilson

(1997), pp. 425-430, SCIA '97 : Across the Borders: Future Directions in Image Analysis : Proceedings of the 10th Scandinavian Conference on Image Analysis 1997, Lappeentanta, Finland, E1-1

conference

Funded Projects at Deakin

Other Public Sector Funding

Facial Feature-based Low-bias Age Prediction through Deep learning and Computer Vision.

Prof Chang-Tsun Li

DSTO contract

  • 2021: $5,000
  • 2020: $15,000

Updating Deep Learning Model with Limited New Data.

Prof Chang-Tsun Li

The Office of National Intelligence

  • 2022: $5,000
  • 2021: $15,000

Industry and Other Funding

R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening.

Prof Chang-Tsun Li

University of Warwick

  • 2020: $131,751

R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening (Phase 2)

Prof Chang-Tsun Li

Defence Science and Technology Laboratory

  • 2021: $144,927
  • 2020: $109,767

Study of the behaviour and structures of modular microtunnelling.

Dr Amani Ibrahim, A/Prof Mohamed Abdelrazek, Prof Chang-Tsun Li

Dull Pty Ltd

  • 2020: $35,897

Investigation into the Feasibility of a Portable Device for Quantification of Cannabinoids and Terpenes in C. Sativa.

Dr Scott Adams, Prof Abbas Kouzani, Dr Egan Doeven, Dr Lawrence Webb, Prof Chang-Tsun Li, Dr Xufeng Lin

Medigrowth Trading Australia Pty Ltd

  • 2022: $23,781
  • 2021: $23,782

A Strategic Roadmap Towards the Next Level of Intelligent, Sustainable and Human-Centred SMEs

Prof Chang-Tsun Li, Dr Dominik Matt

European Commission - Marie Sklodowska-Curie Actions - Staff Exchanges

  • 2023: $7,740

SASI Safe2Go DriverAssist

Prof Douglas Creighton, Prof Chee Peng Lim, Prof Chang-Tsun Li, Prof Richard Tucker, Dr Kevin Murfitt, Dr Darius Nahavandi

Alstom Transport Australia

  • 2024: $295,852
  • 2023: $200,000

Other Funding Sources

Development of Australian Cyber Criteria Assessment.

Prof Chang-Tsun Li, Dr Leo Zhang, Dr Nan Sun

Cyber Security Research Centre Limited

  • 2022: $38,391
  • 2021: $141,250

Sharing Cybersecurity Data for Australian Research (SCReeD).

Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li

Cyber Security Research Centre Limited

  • 2024: $25,000
  • 2023: $12,500
  • 2022: $10,320

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Supervisions

No completed student supervisions to report