Biography
Chang-Tsun Li received the BSc degree in electrical engineering from National Defense University, Taiwan, the MSc degree in computer science from the U.S. Naval Postgraduate School, and the PhD degree in computer science from the University of Warwick, UK. He is currently Professor of Cyber Security at Deakin University. He has had over 20 years research experience in multimedia forensics and security, biometrics, machine learning, data analytics, computer vision, image processing, pattern recognition, bioinformatics and content-based image retrieval. The outcomes of his research have been translated into award-winning commercial products protected by a series of international patents and have been used by a number of law enforcement agencies, national security institutions and companies around the world, including INTERPOL (Lyon, France), UK Home Office, Metropolitan Police Service (UK), Sussex Police Service (UK), Guildford Crown Court (UK), and US Department of Homeland Security. The research team of the CSCRC-funded Development of Australian Cyber Criteria Assessment (DACCA) project under his leadership is the winner of the 2021 AISA Cyber Security Researcher of the Year Award. In addition to his active contribution to the advancement of his field of research through publication, Chang-Tsun Li is also enthusiastically serving the international cyber security community. He is currently Chair of Computational Forensics Technical Committee of the International Association of Pattern Recognition (IAPR), Member of IEEE Information Forensics and Security Technical Committee, Associate Editor of IEEE Transactions on Circuit and System for Video Technology, IET Biometrics and the EURASIP Journal of Image and Video Processing.
Read more on Chang-Tsun's profileResearch interests
Cyber Security, Multimedia Forensics & Security, Biometrics, Machine Learning, Computer Vision, Image Processing, Data Analytics, Pattern Recognition, Content-Based Image Retrieval, Computer Vision, Image Processing, Huma-Computer Interaction, Bioinformatics
Awards
- 2021 AISA Cyber Security Researcher of the Year: This award was presented by the Australian Information Security Association to the research team of the Development of Australian Cyber Criteria Assessment (DACCA) research project led by me. DACCA is funded by the Australian Government’s Cyber Security Cooperative Research Centre.
- Finalist for Scientist of the Year of Australian Defence Awards 2021
- Finalist for Academic of the Year of Australian Defence Awards 2021
- Finalist for Academic of the Year of Australian Defence Awards 2020
- Best Paper Award of the 15th IEEE International Conference on Advanced Video and Signal-based Surveillance, Auckland, New Zealand, 2018 (Co-author Xufeng Lin)
- Finalist of the 2014 IT Project Demonstrating Most Effective Use of Collaborative Technology Award of the prestigious UK IT Industry Awards presented by the British Computing Society (University of Warwick entry).
- EU Marie Curie Fellowship: funded by European Commission, 1 October 2010 – 30 September 2011
- Medallist of the British Computer Society 2011 UK IT Industry Awards (Technology Excellence Award category)
Publications
Self-Supervised Leaf Segmentation under Complex Lighting Conditions
Xufeng Lin, Chang-Tsun Li, Scott Adams, Abbas Kouzani, Richard Jiang, Ligang He, Yongjian Hu, Michael Vernon, Egan Doeven, Lawrence Webb, Todd Mcclellan, Adam Guskich
(2023), Vol. 135, pp. 1-14, Pattern Recognition, Amsterdam, The Netherlands, C1
Deep Learning for Predictive Analytics in Reversible Steganography
Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li
(2023), Vol. 11, pp. 3494-3510, IEEE Access, Piscataway, N.J., C1
Development of a Protection Profile Module for Encryption Key Management Components
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
(2023), Vol. 11, pp. 9113-9121, IEEE Access, Piscataway, N.J., C1
Manisha, C Li, K Kotegar
(2023), Vol. 23, pp. 1-22, Sensors, Basel, Switzerland, C1
An Effective Training Strategy for Enhanced Source Camera Device Identification
Manisha, Chang-Tsun Li, Karunakar Kotegar
(2023), pp. 32-45, ICPR 2022 : Proceedings of the Pattern Recognition, Computer Vision, and Image Processing International Workshops and Challenges, Montreal, Quebec, E1
Yijun Quan, Chang-Tsun Li
(2023), pp. 46-56, ICPR 2022 : Proceedings of the Pattern Recognition, Computer Vision, and Image Processing International Workshops and Challenges, Montreal, Quebec, E1
Hybrid Domain Meta-Learning Network for Face Forgery Detection and Localization in Deepfakes
H Zhao, B Liu, Y Hu, J Li, C Li
(2023), Vol. 2023-June, pp. 1-8, IJCNN 2023 : Proceedings of the International Joint Conference on Neural Networks, Gold Coast, Queensland, E1
Quantum Bitcoin: The Intersection of Bitcoin, Quantum Computing and Blockchain
Y Zhu, Q Ni, R Jiang, A Bouridane, C Li
(2022), pp. 223-234, Advanced Sciences and Technologies for Security Applications, Berlin, Germany, B1
Biometric Blockchain (BBC) Based e-Passports for Smart Border Control
B Xu, Q Ni, R Jiang, A Bouridane, C Li
(2022), pp. 235-248, Advanced Sciences and Technologies for Security Applications, Berlin, Germany, B1
Contention-aware prediction for performance impact of task co-running in multicore computers
S Ren, L He, J Li, Z Chen, P Jiang, C Li
(2022), Vol. 28, pp. 1293-1300, Wireless Networks, C1
Improving Face-Based Age Estimation with Attention-Based Dynamic Patch Fusion
H Wang, V Sanchez, C Li
(2022), Vol. 31, pp. 1084-1096, IEEE Transactions on Image Processing, New York, NY, C1
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Islam, Leo Zhang, Md Islam, Warren Armstrong
(2022), Vol. 10, pp. 44756-44777, IEEE Access, C1
Delve into Activations: Towards Understanding Dying Neuron
Ziping Jiang, Yunpeng Wang, Chang-Tsun Li, Plamen Angelov, Richard Jiang
(2022), pp. 1-13, IEEE Transactions on Artificial Intelligence, Piscataway, N.J., C1
Robust Brain Age Estimation Based on sMRI via Nonlinear Age-Adaptive Ensemble Learning
Z Zhang, R Jiang, C Zhang, B Williams, Z Jiang, C Li, P Chazot, N Pavese, A Bouridane, A Beghdadi
(2022), Vol. 30, pp. 2146-2156, IEEE Transactions on Neural Systems and Rehabilitation Engineering, United States, C1
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
(2022), Vol. 10, pp. 71749-71763, IEEE Access, Piscataway, N.J., C1
R Dinakaran, L Zhang, C Li, A Bouridane, R Jiang
(2022), Vol. 14, Remote Sensing, C1
Open-Set Source Camera Device Identification of Digital Images Using Deep Learning
Manisha, C Li, K Kotegar
(2022), Vol. 10, pp. 110548-110556, IEEE Access, C1
Beyond PRNU: Learning Robust Device-Specific Fingerprint for Source Camera Identification
Manisha, C Li, X Lin, K Kotegar
(2022), Vol. 22, pp. 7871-7871, Sensors, Switzerland, C1
MGGAN: improving sample generations of Generative Adversarial Networks
H Wu, L He, C Li, J Li, W Wu, C Maple
(2022), pp. 369-376, Proceedings: 2021 IEEE 23rd International Conference on High Performance Computing and Communications, 7th International Conference on Data Science and Systems, 19th International Conference on Smart City and 7th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021, Haikou, Hainan, China, E1
A MULTI-SCALE CONTENT-INSENSITIVE FUSION CNN FOR SOURCE SOCIAL NETWORK IDENTIFICATION
Manisha, C Li, K Kotegar
(2022), pp. 2981-2985, ICIP 2022 : Proceedings of the IEEE International Conference on Image Processing 2022, Bordeaux, France, E1
On addressing the impact of ISO speed upon PRNU and forgery detection
Yijun Quan, Chang Li
(2021), Vol. 16, pp. 190-202, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1
Multi-domain adversarial feature generalization for person re-identification
S Lin, C Li, A Kot
(2021), Vol. 30, pp. 1596-1607, IEEE transactions on image processing, Piscataway, N.J., C1
S Liu, Y Hu, B Liu, C Li
(2021), Vol. 146, pp. 23-30, Pattern recognition letters, Amsterdam, The Netherlands, C1
On the detection-to-track association for online multi-object tracking
X Lin, C Li, V Sanchez, C Maple
(2021), Vol. 146, pp. 200-207, Pattern recognition letters, Amsterdam, The Netherlands, C1
Age-Oriented Face Synthesis With Conditional Discriminator Pool and Adversarial Triplet Loss
Haoyi Wang, Victor Sanchez, Chang-Tsun Li
(2021), Vol. 30, pp. 5413-5425, IEEE Transactions on Image Processing, Piscataway, N.J., C1
M Furner, M Islam, C Li
(2021), Vol. 182, pp. 1-11, Expert systems with applications, Amsterdam, The Netherlands, C1
Identification of source social network of digital images using deep neural network
Manisha, A Karunakar, C Li
(2021), Vol. 150, pp. 17-25, Pattern Recognition Letters, Amsterdam, The Netherlands, C1
DeepfakeUCL: Deepfake Detection via Unsupervised Contrastive Learning
S Fung, X Lu, C Zhang, C Li
(2021), pp. 1-8, IJCNN 2021 : Proceedings of the 2021 International Joint Conference on Neural Networks, Shenzhen, China, E1
On Constructing A Better Correlation Predictor For Prnu-Based Image Forgery Localization
X Lin, C Li
(2021), pp. 1-6, ICME 2021 : Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, Shenzhen, China, E1
Person re-identification with soft biometrics through deep learning
Shan Lin, Chang Li
(2020), pp. 21-36, Deep biometrics, Cham, Switzerland, B1
Using age information as a soft biometric trait for face image analysis
Haoyi Wang, Victor Sanchez, Wanli Ouyang, Chang Li
(2020), pp. 1-20, Deep biometrics, Cham, Switzerland, B1
Gary Storey, Ahmed Bouridane, Richard Jiang, Chang Li
(2020), pp. 37-49, Deep biometrics, Cham, Switzerland, B1
ENF based video forgery detection algorithm
Y Wang, Y Hu, A Liew, C Li
(2020), Vol. 12, pp. 131-156, International Journal of Digital Crime and Forensics, Hershey, N.Y., C1
Manifold learning for user profiling and identity verification using motion sensors
G Santos, P Pisani, R Leyva, C Li, T Tavares, A Rocha
(2020), Vol. 106, Pattern Recognition, C1
Provenance inference for instagram photos through device fingerprinting
Y Quan, X Lin, C Li
(2020), Vol. 8, pp. 168309-168320, IEEE Access, C1
PRNU-Based Content Forgery Localization Augmented with Image Segmentation
X Lin, C Li
(2020), Vol. 8, pp. 222645-222659, IEEE Access, C1
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
(2020), Cham, Switzerland, A7
Warwick image forensics dataset for device fingerprinting in multimedia forensics
Y Quan, C Li, Y Zhou, L Li
(2020), pp. 1-6, ICME : Proceedings of the 2020 IEEE International Conference on Multimedia and Expo, Online from London, England, E1
A Algamdi, V Sanchez, C Li
(2020), pp. 3174-3178, ICIP 2020 : Proceedings of the 2020 IEEE International Conference on Image Processing, Online from Abu Dhabi, United Arab Emirates, E1
WolfPath: accelerating iterative traversing-based graph processing algorithms on GPU
H Zhu, L He, S Fu, R Li, X Han, Z Fu, Y Hu, C Li
(2019), Vol. 47, pp. 644-667, International journal of parallel programming, Berlin, Germany, C1-1
Social Network Identification Through Image Classification with CNN
I Amerini, C Li, R Caldelli
(2019), Vol. 7, pp. 35264-35273, IEEE Access, C1-1
Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems
C Chang, C Li
(2019), Vol. 16, pp. 3367-3381, Mathematical biosciences and engineering, Springfield, Mo., C1
Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues
C Chang, C Li, K Chen
(2019), Vol. 7, pp. 54117-54132, IEEE Access, C1
Auto-zooming CNN-based framework for real-time pedestrian detection in outdoor surveillance videos
S Alfasly, B Liu, Y Hu, Y Wang, C Li
(2019), Vol. 7, pp. 105816-105826, IEEE access, Piscataway, N.J., C1
Compact and Low-Complexity Binary Feature Descriptor and Fisher Vectors for Video Analytics
R Leyva, V Sanchez, C Li
(2019), Vol. 28, pp. 6169-6184, IEEE Transactions on Image Processing, United States, C1
Hybrid clustering of shared images on social networks for digital forensics
R Rouhi, F Bertini, D Montesi, X Lin, Y Quan, C Li
(2019), Vol. 7, pp. 87288-87302, IEEE Access, C1
Gary Storey, Richard Jiang, Shelagh Keogh, Ahmed Bouridane, Chang-Tsun Li
(2019), Vol. 7, pp. 121655-121664, IEEE access, PIscataway, N.J., C1
C Chang, C Li
(2019), Vol. 109, pp. 330-339, IIH-MSP 2018 : Proceedings of the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, E1-1
Provenance analysis for instagram photos
Y Quan, X Lin, ChangTsun Li
(2019), Vol. 996, pp. 372-383, AusDM 2018 : Australasian Conference on Data Mining, Bathurst, N.S.W., E1-1
Y Guo, S Lin, X Ma, J Bal, C Li
(2019), Vol. 996, pp. 161-174, AusDM 2018 : Proceedings of the 16th Australasian Data Mining Conference 2018, Bathurst, N.S.W., E1-1
Social network forensics through smartphones and shared images
R Rouhi, F Bertini, D Montesi, C Li
(2019), IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics, Cancun, Mexico, E1
Learning temporal information from spatial information using CapsNets for human action recognition
A Algamdi, V Sanchez, C Li
(2019), pp. 3867-3871, ICASSP 2019 : Proceedings of the 2019 44th IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, Eng., E1
Accelerometer dense trajectories for activity recognition and people identification
R Leyva, G Santos, A Rocha, V Sanchez, C Li
(2019), pp. 1-6, IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics (IWBF), Cancún, Mexico, E1-1
Image provenance inference through content-based device fingerprint analysis
Xufeng Lin, Chang Li
(2018), pp. 279-310, Information security: foundations, technologies and applications, London, Eng., B1-1
Privacy-Aware Reversible Watermarking in Cloud Computing Environments
C Chang, C Li, Y Shi
(2018), Vol. 6, pp. 70720-70733, IEEE Access, C1-1
On view-invariant gait recognition: a feature selection solution
N Jia, V Sanchez, C Li
(2018), Vol. 7, pp. 287-295, IET biometrics, Stevenage, Eng., C1-1
Fast fragile watermark embedding and iterative mechanism with high self-restoration performance
S Bravo-Solorio, F Calderon, C Li, A Nandi
(2018), Vol. 73, pp. 83-92, Digital signal processing, Amsterdam, The Netherlands, C1-1
Inference of a compact representation of sensor fingerprint for source camera identification
R Li, C Li, Y Guan
(2018), Vol. 74, pp. 556-567, Pattern recognition, Amsterdam, The Netherlands, C1-1
Modelling and developing conflict-aware scheduling on large-scale data centres
B Wang, C Chen, L He, B Gao, J Ren, Z Fu, S Fu, Y Hu, C Li
(2018), Vol. 86, pp. 995-1007, Future Generation Computer Systems, C1-1
Developing a pattern discovery method in time series data and its GPU acceleration
H Zhu, Z Gu, H Zhao, K Chen, C Li, L He
(2018), Vol. 1, pp. 266-283, Big data mining and analytics, Piscataway, N.J., C1-1
Active learning in multi-domain collaborative filtering recommender systems
X Guan, C Li, Y Guan
(2018), pp. 1351-1357, SAC 2018 : Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, E1-1
Fast detection of abnormal events in videos with binary features
R Leyva, V Sanchez, C Li
(2018), pp. 1318-1322, ICASSP 2018 : Proceedings of the 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, Calgary, Alta., E1-1
PRNU-based image classification of origin social network with CNN
R Caldelli, I Amerini, C Li
(2018), pp. 1357-1361, EUSIPCO 2018 : Proceedings of the 26th European Signal Processing Conference, Rome, Italy, E1-1
X Lin, C Li
(2018), pp. 1-6, AVSS 2018 : Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance 2018, Auckland, N.Z., E1-1
Detecting small objects in high resolution images with integral fisher score
R Leyva, V Sanchez, C Li
(2018), pp. 316-320, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1
Fusion network for face-based age estimation
H Wang, X Wei, V Sanchez, C Li
(2018), pp. 2675-2679, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1
A multi-task learning CNN for image steganalysis
X Yu, H Tan, H Liang, C Li, G Liao
(2018), pp. 1-7, WIFS 2018 Proceedings of the 10th IEEE International Workshop on Information Forensics and Security 2018, Hong Kong, China, E1-1
S Lin, H Li, C Li, A Kot
(2018), BMVC 2018: Proceedings of the 29th British Machine Vision Conference, Newcastle upon Tyne, England, E1-1
Face recognition technologies for evidential evaluation of video traces
X Wei, C Li
(2017), pp. 177-193, Handbook of biometrics for forensic science, Cham, Switzerland, B1-1
X Guan, C Li, Y Guan
(2017), Vol. 5, pp. 27668-27678, IEEE Access, C1-1
Video anomaly detection with compact feature sets for online performance
R Leyva, V Sanchez, C Li
(2017), Vol. 26, pp. 3463-3478, IEEE Transactions on Image Processing, United States, C1-1
Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation
A Khadidos, V Sanchez, C Li
(2017), Vol. 26, pp. 1979-1991, IEEE Transactions on Image Processing, United States, C1-1
Large-scale image clustering based on camera fingerprints
X Lin, C Li
(2017), Vol. 12, pp. 793-808, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1
A fast source-oriented image clustering method for digital forensics
C Li, X Lin
(2017), Vol. 2017, Eurasip Journal on Image and Video Processing, C1-1
Hierarchical Relaxed Partitioning System for Activity Recognition
F Azhar, C Li
(2017), Vol. 47, pp. 784-795, IEEE Transactions on Cybernetics, United States, C1-1
Learning optimised representations for view-invariant gait recognition
N Jia, V Sanchez, C Li
(2017), pp. 774-780, IJCB 2017 : Proceedings of the 2017 International Joint Conference on Biometrics, Denver, Colo., E1-1
Secure secret sharing in the cloud
C Chang, C Li
(2017), pp. 358-361, ISM 2017 : Proceedings of the 2017 IEEE International Symposium on Multimedia, Taichung, Taiwan, E1-1
S Lin, C Li
(2017), pp. 1-6, DICTA 2017 : Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, Sydney, New South Wales, E1
Fast and robust framework for view-invariant gait recognition
N Jia, C Li, V Sanchez, A Liew
(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1
The LV dataset: a realistic surveillance video dataset for abnormal event detection
R Leyva, V Sanchez, C Li
(2017), pp. 1-6, IWBF 2017 : Proceedings of the 2017 5th International Workshop on Biometrics and Forensics, Coventry, Eng., E1-1
Reversible data hiding in JPEG images based on adjustable padding
C Chang, C Li
(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics 2017, Coventry, Eng., E1-1
An adaptive tri-pixel unit steganographic algorithm using the least two significant bits
X Yu, H Liang, M Li, C Li
(2017), pp. 1-6, IWBF 2017 Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1
Abnormal event detection in videos using binary features
R Leyva, V Sanchez, C Li
(2017), pp. 621-625, TSP 2017 : Proceedings of the 40th International Conference on Telecommunications and Signal Processing, Barcelona, Spain, E1-1
A Khadidos, V Sanchez, C Li
(2017), pp. 1058-1062, 2017 ICASSP : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, New Orleans, La., E1-1
Gait recognition based on the golden ratio
Y Liang, C Li, Y Guan, Y Hu
(2016), Vol. 2016, Eurasip Journal on Image and Video Processing, C1-1
Enhancing sensor pattern noise via filtering distortion removal
X Lin, C Li
(2016), Vol. 23, pp. 381-385, IEEE signal processing letters, Piscataway, N.J., C1-1
Preprocessing reference sensor pattern noise via spectrum equalization
X Lin, C Li
(2016), Vol. 11, pp. 126-140, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1
Enhanced SVD for collaborative filtering
X Guan, C Li, Y Guan
(2016), Vol. 9652, pp. 503-514, PAKDD 2016 : Proceedings of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining 2016, Auckland, N.Z., E1-1
Fast binary-based video descriptors for action recognition
R Leyva, V Sanchez, Chang Li
(2016), pp. 1-8, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1
A novel online Bayes classifier
T Nguyen, T Nguyen, X Pham, A Liew, Y Hu, T Liang, C Li
(2016), pp. 1-6, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1
A fast binary pair-based video descriptor for action recognition
R Leyva, V Sanchez, C Li
(2016), pp. 4185-4189, ICIP 2016 : Proceedings of the 2016 IEEE International Conference on Image Processing, Phoenix, Ariz., E1-1
Refining PRNU-based detection of image forgeries
X Lin, C Li
(2016), pp. 222-226, DMIAF 2016 : Proceedings of the 2016 Digital Media Industry & Academic Forum, Santorini, Greece, E1-1
Banafshe Arbab-Zavar, Xingjie Wei, John Bustard, Mark Nixon, Chang Li
(2015), pp. 270-304, Handbook of digital forensics of multimedia data and devices, Chichester, Eng., B1-1
On reducing the effect of covariate factors in gait recognition: a classifier ensemble method
Yu Guan, Chang Li, Fabio Roli
(2015), Vol. 37, pp. 1521-1528, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1
Fast source camera identification using matching signs between query and reference fingerprints
Yongjian Hu, Chang Li, Zhimao Lai
(2015), Vol. 74, pp. 7405-7428, Multimedia tools and applications, New York, N.Y., C1-1
The influence of segmentation on individual gait recognition
N Jia, V Sanchez, C Li, H Mansour
(2015), WIFS 2015 : Proceedings of the IEEE International Workshop on Information Forensics and Security, Rome, Italy, E1-1
Incremental update of feature extractor for camera identification
R Li, C Li, Y Guan
(2015), pp. 324-328, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1
Random subspace method for source camera identification
R Li, C Kotropoulos, C Li, Y Guan
(2015), MLSP 2015 : Proceedings of the IEEE 25th International Workshop on Machine Learning for Signal Processing, Boston, Massachusetts, E1-1
N Jia, V Sanchez, C Li, H Mansour
(2015), BIOSIG 2015 : Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, Germany, E1-1
Hand gesture recognition and spotting in uncontrolled environments based on classifier weighting
Y Yao, C Li
(2015), pp. 3082-3086, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1
A compact representation of sensor fingerprint for camera identification and fingerprint matching
R Li, C Li, Y Guan
(2015), pp. 1777-1781, ICASSP 2015 : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal, Brisbane, Queensland, E1-1
On the generalization power of face and gait in gender recognition
Y Guan, X Wei, C Li
(2014), Vol. 6, pp. 1-8, International journal of digital crime and forensics, Hershey, Pa., C1-1
Dynamic image-to-class warping for occluded face recognition
X Wei, C Li, Z Lei, D Yi, S Li
(2014), Vol. 9, pp. 2035-2050, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Human gait identification from extremely low-quality videos: an enhanced classifier ensemble method
Y Guan, Y Sun, C Li, M Tistarelli
(2014), Vol. 3, pp. 84-93, IET biometrics, Stevenage, Eng., C1-1
Digital forensic readiness: are we there yet?
A Mouhtaropoulos, C Li, M Grobler
(2014), Vol. 9, pp. 173-179, Journal of international commercial law and technology, Hellerup, Denmark, C1-1
Gait recognition using low spatial and temporal resolution videos
S Choudhury, Y Guan, C Li
(2014), pp. 1-6, IWBF2014 2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1
HPS: histogram preserving steganography in spatial domain
Y Wang, W Chen, Y Li, W Wang, C Li
(2014), pp. 1-4, IWBF2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1
PCA-based denoising of Sensor Pattern Noise for source camera identification
R Li, Y Guan, C Li
(2014), pp. 436-440, ChinaSIP 2014 : Proceedings of the 2014 IEEE China Summit & International Conference on Signal and Information Processing, Xi'an, China, E1-1
A reference estimator based on composite sensor pattern noise for source device identification
R Li, C Li, Y Guan
(2014), Vol. 9028, pp. 90280O-1-90280O-7, SPIE 2014 : Proceedings of the 2014 Media Watermarking, Security and Forensics Conference, San Fransisco, Calif., E1-1
A Khadidos, V Sanchez, C Li
(2014), pp. 902-906, ICIP 2014 : Proceedings of the 2014 IEEE International Conference on Image Processing, Paris, France, E1-1
Video anomaly detection based on wake motion descriptors and perspective grids
R Leyva, V Sanchez, C Li
(2014), pp. 209-214, WIFS 2014 : Proceedings of the IEEE International Workshop on Information Forensics and Security 2014, Atlanta, Ga., E1-1
People identification and tracking through fusion of facial and gait features
Y Guan, X Wei, C Li, Y Keller
(2014), Vol. 8897, pp. 209-221, BIOMET2014 : Proceedings of the 1st International Workshop on Biometrics 2014, Sofia, Bulgaria, E1-1
Two improved forensic methods of detecting contrast enhancement in digital images
X Lin, X Wei, C Li
(2014), Vol. 9028, pp. 90280X-1-90280X-10, Proceedings of the 2014 Media Watermarking, Security, and Forensics Conference, San Fransisco, Calif., E1-1
An improved fingerprinting algorithm for detection of video frame duplication forgery
Y Hu, Y Wang, C Li, B Liu
(2013), pp. 64-76, Emerging digital forensics applications for crime detection, prevention, and security, Hershey, Pa., B1-1
Emerging digital forensics applications for crime detection, prevention, and security
C Li
(2013), Hershey, Pa., A7-1
Audio forensic authentication based on MOCC between ENF and reference signals
Z Lv, Y Hu, C Li, B Liu
(2013), pp. 427-431, IEEE ChinaSIP : Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, E1-1
A robust speed-invariant gait recognition system for walker and runner identification
Y Guan, C Li
(2013), ICB 2013 : Proceedings of the 6th IAPR International Conference on Biometrics, Madrid, Spain, E1-1
Audio forgery detection based on max offsets for cross correlation between ENF and reference signal
Y Hu, C Li, Z Lv, B Liu
(2013), Vol. 7809, pp. 253-266, IWDW12 : Proceedings of the International Workshop on Digital Forensics and Watermarking 2012, Shanghai, China, E1-1
Exposing image forgery through the detection of contrast enhancement
X Lin, C Li, Y Hu
(2013), pp. 4467-4471, ICIP 2013 : Proceedings of the 2013 IEEE International Conference on Image Processing, Melbourne, Vic., E1-1
Y Yao, C Li
(2013), pp. 1205-1210, SMC 2013: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Manchester, England, E1-1
Applying a digital forensic readiness framework: three case studies
A Mouhtaropoulos, P Dimotikalis, C Li
(2013), pp. 217-223, HST 2013 : Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, Mass., E1-1
Y Yao, C Li
(2013), pp. 842-846, ACPR 2013 : Proceedings of the 2013 2nd IAPR Asian Conference on Pattern Recognition, Naha, Japan, E1-1
Combining gait and face for tackling the elapsed time challenges
Y Guan, X Wei, C Li, G Marcialis, F Roli, M Tistarelli
(2013), pp. 1-8, BTAS 2013 : Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, Washington, D.C., E1-1
Y Yao, C Li
(2013), Vol. 8034, pp. 542-551, ISVC 2013 : Proceedings of the 9th International Symposium on Visual Computing, Rethymnon, Crete, Greece, E1-1
X Wei, C Li
(2013), pp. 70-75, CVPRW 2013 : Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, Or., E1-1
Face recognition with occlusion using Dynamic Image-to-Class Warping (DICW)
X Wei, C Li, Y Hu
(2013), pp. 1-6, FG13 : Proceedings of the 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, Shanghai, China, E1-1
Robust face recognition with occlusions in both reference and query images
X Wei, C Li, Y Hu
(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1
Robust gait recognition from extremely low frame-rate videos
Y Guan, C Li, S Choudhury
(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1
Robust face recognition under varying illumination and occlusion considering structured sparsity
X Wei, C Li, Y Hu
(2013), DICTA 2012 : International Conference on Digital Image Computing Techniques and Applications, Fremantle, Western Australia, E1-1
Watermarking method with exact self-propagating restoration capabilities
S Bravo-Solorio, C Li, A Nandi
(2013), pp. 217-222, WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, E1-1
Crime Prevention Technologies and Applications for Advancing Criminal Investigation
Chang-Tsun Li, Anthony Ho
(2012), Hershey, Pa., A1-1
Color-decoupled photo response non-uniformity for digital image forensics
C Li, Y Li
(2012), Vol. 22, pp. 260-271, IEEE transactions on circuits and systems for video technology, Piscataway, N.J., C1-1
C Li, R Satta
(2012), Vol. 6, pp. 560-566, IET computer vision, Stevenage, Eng., C1-1
An improved fingerprinting algorithm for detection of video frame duplication forgery
Y Hu, C Li, Y Wang, B Liu
(2012), Vol. 4, pp. 20-32, International journal of digital crime and forensics, Hershey, Pa., C1-1
Watermarking with lowembedding distortion and self-propagating restoration capabilities
S Bravo-Solorio, C Li, A Nandi
(2012), pp. 2197-2200, Proceedings - International Conference on Image Processing, ICIP, FL, Lake Buena Vista, E1-1
Random subspace method for gait recognition
Yu Guan, Chang Li, Yongjian Hu
(2012), pp. 284-289, Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2012, Melbourne, Victoria, E1-1
Fast camera fingerprint search algorithm for source camera identification
Y Hu, C Li, Z Lai, S Zhang
(2012), ISCCSP 2012 : Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, E1-1
Gait recognition under carrying condition: A static dynamic fusion method
Y Guan, C Li, Y Hu
(2012), Vol. 8436, Proceedings of SPIE - The International Society for Optical Engineering, BELGIUM, Brussels, E1-1
Yinyin Yuan, Chang-Tsun Li, Oliver Windram
(2011), Vol. 6, PLoS one, San Francisco, Calif., C1-1
Source camera identification issues: forensic features selection and robustness
Y Hu, C Li, C Zhou, X Lin
(2011), Vol. 3, pp. 1-15, International journal of digital crime and forensics, Hershey, Pa., C1-1
Chang-Tsun Li, Anthony Ho
(2011), Hershey, Pa., A7-1
Optimized digital library for digital forenisc based on decomposed PRNU
Y Li, C Li
(2011), pp. 610-613, ICMT 2011 : Proceedings of the 20112nd International Conference on Multimedia Technology, Hangzhou, China, E1-1
A temporal precedence based clustering method for gene expression microarray data
R Krishna, C Li, V Buchanan-Wollaston
(2010), Vol. 11, BMC Bioinformatics, C1-1
F Peng, R Guo, C Li, M Long
(2010), Vol. 42, pp. 1207-1216, Computer-aided design, Amsterdam, The Netherlands, C1-1
Progressive exponential clustering-based steganography
C Li, Y Li
(2010), Vol. 2010, pp. 1-14, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1
A conditional random field approach to unsupervised texture image segmentation
C Li
(2010), Vol. 2010, pp. 1-12, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1
Source camera identification using enhanced sensor pattern noise
C Li
(2010), Vol. 5, pp. 280-287, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1
Selecting forensic features for robust source camera identification
Y Hu, C Li, C Zhou
(2010), pp. 506-511, ICS 2010 - International Computer Symposium, E1-1
Digital camera identification using colour-decoupled photo response non-uniformity noise pattern
C Li, Y Li
(2010), pp. 3052-3055, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, Paris, FRANCE, E1-1
F Peng, R Guo, C Li, M Long
(2010), Vol. 41 LNICST, pp. 11-18, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, City Univ London, London, ENGLAND, E1-1
C Li, C Chang, Y Li
(2010), Vol. 41 LNICST, pp. 19-25, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, City Univ London, London, ENGLAND, E1-1
Unsupervised classification of digital images using enhanced sensor pattern noise
C Li
(2010), pp. 3429-3432, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, Paris, FRANCE, E1-1
Using improved imaging sensor pattern noise for source camera identification
Y Hu, C Jian, C Li
(2010), pp. 1481-1486, 2010 IEEE International Conference on Multimedia and Expo, ICME 2010, Singapore, SINGAPORE, E1-1
A contrast-sensitive reversible visible image watermarking technique
Y Yang, X Sun, H Yang, C Li, R Xiao
(2009), Vol. 19, pp. 656-667, IEEE Transactions on Circuits and Systems for Video Technology, Piscataway, N.J., C1-1
C Wei, Y Li, W Chau, C Li
(2009), Vol. 42, pp. 386-394, Pattern Recognition, Amsterdam, The Netherlands, C1-1
Chang-Tsun Li
(2009), Hershey, Pa., A7-1
Authenticating medical images through repetitive index modulation based watermarking
C Li, Y Li
(2009), Vol. 8 LNICST, pp. 153-159, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Univ Adelaide, Australian Natl Wine Ctr, Adelaide, AUSTRALIA, E1-1
Decomposed photo response non-uniformity for digital forensic analysis
Y Li, C Li
(2009), Vol. 8, pp. 166-172, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Adelaide, South Aust., E1-1
Y Yuan, C Li
(2009), pp. 92-99, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, Taichung, TAIWAN, E1-1
Detection of block artifacts for digital forensic analysis
C Li
(2009), Vol. 8 LNICST, pp. 173-178, e-Forensics 2009 : Proceedings of the Second iNternational Conference on Forensics in Telecommunications, Information and Multimedia, Univ Adelaide, Australian Natl Wine Ctr, Adelaide, AUSTRALIA, E1-1
Interaction based functional clustering of genomic data
R Krishna, C Li, V Buchanan-Wollaston
(2009), pp. 130-137, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, Taichung, TAIWAN, E1-1
Source camera identification using enahnced sensor pattern noise
C Li
(2009), pp. 1509-1512, Proceedings - International Conference on Image Processing, ICIP, Cairo, EGYPT, E1-1
Partial mixture model for tight clustering of gene expression time-course
Yinyin Yuan, Chang Li, Roland Wilson
(2008), Vol. 9, pp. 1-17, BMC bioinformatics, London, Eng., C1-1
An unsupervised conditional random fields approach for clustering gene expression time series
C Li, Y Yuan, R Wilson
(2008), Vol. 24, pp. 2467-2473, Bioinformatics, Oxford, Eng., C1-1
A Bayes random field approach for integrative large-scale regulatory network analysis
Y Yuan, C Li
(2008), Vol. 5, Journal of integrative bioinformatics, Berlin, Germany, C1-1
MIMIC-PPT: Mimicking-based steganography for microsoft power Point document
Y Liu, X Sun, Y Liu, C Li
(2008), Vol. 7, pp. 654-660, Information Technology Journal, Faisalabad, Pakistan, C1-1
Removable visible image watermarking algorithm in the discrete cosine transform domain
Y Yang, X Sun, H Yang, C Li
(2008), Vol. 17, pp. 1-11, Journal of Electronic Imaging, Bellingham, Wash., C1-1
Y Yuan, C Li
(2008), pp. 625-628, ICASSP 2008 : Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, E1-1
CBIR approach to building image retrieval based on invariant characteristics in Hough domain
X Yuan, C Li
(2008), pp. 1209-1212, ICASSP 2008 : Proceedings of the 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, E1-1
Wavelet-based fragile watermarking scheme for image authentication
C Li, H Si
(2007), Vol. 16, Journal of electronic imaging, Bellingham, Wash., C1-1
Protection of mammograms using blind steganography and watermarking
Y Li, C Li, C Wei
(2007), pp. 496-499, IAS 2007 : Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, England, E1-1
Steganographic method for colour image using expandable progressive exponential clustering
C Li, Y Li
(2007), pp. 495-500, IEEE DEST 2007 : Proceedings of the 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Queensland, E1-1
Unsupervised clustering of gene expression time series with conditional random fields
Y Yuan, C Li
(2007), pp. 571-576, IEEE DEST 2007 : Proceedings of the 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Queensland, E1-1
Effective extraction of Gabor features for adaptive mammogram retrieval
C Wei, Y Li, C Li
(2007), pp. 1503-1506, ICME 2007 : Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, E1-1
Y Zhu, C Li, H Zhao
(2007), pp. 478-483, IAS 2007 : Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, England, E1-1
Partial mixture model for tight clustering in exploratory gene expression analysis
Y Yuan, C Li
(2007), pp. 1061-1065, BIBE 2007 : Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, Boston, Massachusetts, E1-1
Digital watermarking scheme exploiting nondeterministic dependence for image authentication
C Li, Y Yuan
(2006), Vol. 45, Optical engineering, Bellingham, Wash., C1-1
C Wei, C Li
(2006), Vol. 4046 LNCS, pp. 307-314, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Manchester, ENGLAND, E1-1
CBIR approach to building image retrieval based on linear edge distribution
X Yuan, C Li
(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, Sydney, Australia, E1-1
C Wei, C Li
(2006), pp. 738-741, ISM 2006 - 8th IEEE International Symposium on Multimedia, San Diego, CA, E1-1
Steganographic scheme for VQ compressed images using progressive exponential clustering
Y Li, C Li
(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, Sydney, Australia, E1-1
Skin colour-based face detection in colour images
W Lai, C Li
(2006), pp. 56-61, AVSS 2006 : Proceedings IEEE International Conference on Video and Signal Based Surveillance 2006, Sydney, Australia, E1-1
A general framework for content-based medical image retrieval with its application to mammograms
C Wei, C Li, R Wilson
(2005), Vol. 5748, pp. 134-143, Progress in Biomedical Optics and Imaging - Proceedings of SPIE, San Diego, CA, E1-1
A palette-based image steganographic method using colour quantisation
X Wang, Z Yao, C Li
(2005), Vol. 2, pp. 1087-1090, Proceedings - International Conference on Image Processing, ICIP, Genoa, ITALY, E1-1
High efficiency abrasive machining process and its key technologies
C Li, G Cai, S Xiu
(2005), pp. 516-519, PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, Northeastern Univ, Shenyang, PEOPLES R CHINA, E1-1
Fragile watermarking scheme exploiting non-deterministic block-wise dependency
Y Yuan, C Li
(2004), Vol. 4, pp. 849-852, Proceedings - International Conference on Pattern Recognition, British Machine Vis Assoc, Cambridge, ENGLAND, E1-1
Semi-fragile watermarking scheme for authentication of JPEG images
C Ho, C Li
(2004), Vol. 1, pp. 7-11, International Conference on Information Technology: Coding Computing, ITCC, Las Vegas, NV, E1-1
One-dimensional neighborhood forming strategy for fragile watermarking
C Li, F Yang
(2003), Vol. 12, pp. 284-291, Journal of electronic imaging, Bellingham, Wash., C1-1
Multiresolution image segmentation integrating Gibbs sampler and region merging algorithm
C Li
(2003), Vol. 83, pp. 67-78, Signal processing, Amsterdam, The Netherlands, C1-1
A class of discrete multiresolution random fields and its application to image segmentation
R Wilson, C Li
(2003), Vol. 25, pp. 42-56, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1
Multiresolution genetic clustering algorithm for texture segmentation
C Li, R Chiao
(2003), Vol. 21, pp. 955-966, Image and vision computing, Amsterdam, The Netherlands, C1-1
Watermarking scheme for authentication of compressed image
T Hsieh, C Li, S Wang
(2003), Vol. 5241, pp. 1-9, Proceedings of SPIE - The International Society for Optical Engineering, ORLANDO, FL, C1-1
Unsupervised texture segmentation using multiresolution hybrid genetic algorithm
C Li, R Chiao
(2003), Vol. 2, pp. 1033-1036, IEEE International Conference on Image Processing, BARCELONA, SPAIN, E1-1
Oblivious fragile watermarking scheme for image authentication
C Li, F Yang, C Lee
(2002), Vol. 4, pp. 3445-3448, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, ORLANDO, FL, E1-1
Approach to reducing the labeling cost of Markov random fields within an infinite label space
C Li
(2001), Vol. 81, pp. 609-620, Signal processing, Amsterdam, The Netherlands, C1-1
Edge detection based on the Multiresolution Fourier Transform
C Li, D Lou
(1999), pp. 686-693, IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, Taipei, Taiwan, E1-1
Hidden multiresolution random fields and their application to image segmentation
R Wilson, C Li
(1999), pp. 346-351, ICIAP 1999 : Proceedings of the 10th International Conference on Image Analysis and Processing, Venice, Italy, E1-1
Image segmentation based on a multiresolution Bayesian framework
C Li, R Wilson
(1998), Vol. 3, pp. 761-765, IEEE International Conference on Image Processing, CHICAGO, IL, E1-1
C Li, R Wilson
(1997), pp. 425-430, SCIA '97 : Across the Borders: Future Directions in Image Analysis : Proceedings of the 10th Scandinavian Conference on Image Analysis 1997, Lappeentanta, Finland, E1-1
Funded Projects at Deakin
Other Public Sector Funding
Facial Feature-based Low-bias Age Prediction through Deep learning and Computer Vision.
Prof Chang-Tsun Li
DSTO contract
- 2021: $5,000
- 2020: $15,000
Updating Deep Learning Model with Limited New Data.
Prof Chang-Tsun Li
The Office of National Intelligence
- 2022: $5,000
- 2021: $15,000
Industry and Other Funding
R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening.
Prof Chang-Tsun Li
University of Warwick
- 2020: $131,751
R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening (Phase 2)
Prof Chang-Tsun Li
Defence Science and Technology Laboratory
- 2021: $144,927
- 2020: $109,767
Study of the behaviour and structures of modular microtunnelling.
Dr Amani Ibrahim, A/Prof Mohamed Abdelrazek, Prof Chang-Tsun Li
Dull Pty Ltd
- 2020: $35,897
Investigation into the Feasibility of a Portable Device for Quantification of Cannabinoids and Terpenes in C. Sativa.
Dr Scott Adams, Prof Abbas Kouzani, Dr Egan Doeven, Dr Lawrence Webb, Prof Chang-Tsun Li, Dr Xufeng Lin
Medigrowth Trading Australia Pty Ltd
- 2022: $23,781
- 2021: $23,782
A Strategic Roadmap Towards the Next Level of Intelligent, Sustainable and Human-Centred SMEs
Prof Chang-Tsun Li, Dr Dominik Matt
European Commission - Marie Sklodowska-Curie Actions - Staff Exchanges
- 2023: $7,740
SASI Safe2Go DriverAssist
Prof Douglas Creighton, Prof Chee Peng Lim, Prof Chang-Tsun Li, Prof Richard Tucker, Dr Kevin Murfitt, Dr Darius Nahavandi
Alstom Transport Australia
- 2023: $200,000
Other Funding Sources
Development of Australian Cyber Criteria Assessment.
Prof Chang-Tsun Li, Dr Leo Zhang, Dr Nan Sun
Cyber Security Research Centre Limited
- 2022: $38,391
- 2021: $141,250
Sharing Cybersecurity Data for Australian Research (SCReeD).
Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li
Cyber Security Research Centre Limited
- 2023: $12,500
- 2022: $10,320
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $120,976
Supervisions
No completed student supervisions to report