Stebėti
Li Dong
Li Dong
Associate Professor, Ningbo University
Patvirtintas el. paštas nbu.edu.cn - Pagrindinis puslapis
Pavadinimas
Cituota
Cituota
Metai
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
J Zhou, W Sun, L Dong, X Liu, O Au, Y Tang
IEEE Transactions on Circuits and Systems for Video Technology 26 (3), 441 - 452, 2015
2572015
Noise level estimation for natural images based on scale-invariant kurtosis and piecewise stationarity
L Dong, J Zhou, YY Tang
IEEE Transactions on Image Processing 26 (2), 1017-1030, 2016
542016
Targeted speech adversarial example generation with generative adversarial network
D Wang, L Dong, R Wang, D Yan, J Wang
IEEE Access 8, 124503-124513, 2020
392020
Audio steganalysis with improved convolutional neural network
Y Lin, R Wang, D Yan, L Dong, X Zhang
Proceedings of the ACM workshop on information hiding and multimedia …, 2019
352019
Effective and Fast Estimation for Image Sensor Noise via Constrained Weighted Least Squares
L Dong, J Zhou, YY Tang
IEEE Transactions on Image Processing, 2018
322018
Semi-supervised learning with pseudo-negative labels for image classification
H Xu, H Xiao, H Hao, L Dong, X Qiu, C Peng
Knowledge-Based Systems 260, 110166, 2023
282023
From grayscale to color: Quaternion linear regression for color face recognition
C Zou, KI Kou, L Dong, X Zheng, YY Tang
IEEE Access 7, 154131-154140, 2019
272019
Semi-supervised semantic segmentation with cross teacher training
H Xiao, D Li, H Xu, S Fu, D Yan, K Song, C Peng
Neurocomputing 508, 36-46, 2022
242022
THAN: task-driven hierarchical attention network for the diagnosis of mild cognitive impairment and Alzheimer’s disease
Z Zhang, L Gao, G Jin, L Guo, Y Yao, L Dong, J Han, ...
Quantitative Imaging in Medicine and Surgery 11 (7), 3338, 2021
212021
Adversarial examples attack and countermeasure for speech recognition system: A survey
D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong
International Conference on Security and Privacy in Digital Economy, 443-468, 2020
212020
Anti-forensics of audio source identification using generative adversarial network
X Li, D Yan, L Dong, R Wang
IEEE Access 7, 184332-184339, 2019
212019
Watermark-preserving keypoint enhancement for screen-shooting resilient watermarking
L Dong, J Chen, C Peng, Y Li, W Sun
2022 IEEE international conference on multimedia and expo (ICME), 1-6, 2022
172022
Optimal pre-filtering for improving Facebook shared images
W Sun, J Zhou, L Dong, J Tian, J Liu
IEEE Transactions on Image Processing 30, 6292-6306, 2021
152021
Transformer-based image inpainting detection via label decoupling and constrained adversarial training
Y Li, L Hu, L Dong, H Wu, J Tian, J Zhou, X Li
IEEE Transactions on Circuits and Systems for Video Technology 34 (3), 1857-1872, 2023
142023
Fake the real: Backdoor attack on deep speech classification via voice conversion
Z Ye, T Mao, L Dong, D Yan
arXiv preprint arXiv:2306.15875, 2023
122023
Color image noise covariance estimation with cross-channel image noise modeling
L Dong, J Zhou, T Dai
2018 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2018
122018
Estimation of capacity parameters for dynamic histogram shifting (DHS)-based reversible image watermarking
L Dong, J Zhou, YY Tang, X Liu
2014 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2014
122014
First steps toward concealing the traces left by reversible image data hiding
L Dong, J Zhou, W Sun, D Yan, R Wang
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (5), 951-955, 2020
112020
Stealthy backdoor attack against speaker recognition using phase-injection hidden trigger
Z Ye, D Yan, L Dong, J Deng, S Yu
IEEE Signal Processing Letters 30, 1057-1061, 2023
102023
Robust text image tampering localization via forgery traces enhancement and multiscale attention
L Dong, W Liang, R Wang
IEEE Transactions on Consumer Electronics, 2024
82024
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20