default search action
Li Dong 0006
Person information
- affiliation: Ningbo University, Faculty of Electrical Engineering and Computer Science, China
- affiliation: University of Macau, Department of Computer and Information Science, Faculty of Science and Technology, Macau
Other persons with the same name
- Li Dong — disambiguation page
- Li Dong 0001 — Tsinghua University, Department of Computer Science and Technology / System Division of Library, Beijing, China
- Li Dong 0002 — Bohai University, College of Mathematics and Physics, Jinzhou, China (and 1 more)
- Li Dong 0003 — University of Electronic Science and Technology of China, School of Life Science and Technology, Chengdu, China
- Li Dong 0004 — Microsoft Research Asia, Natural Language Computing Group, Beijing, China (and 2 more)
- Li Dong 0005 — Dalian Nationalities University, College of Science, China
- Li Dong 0007 — Xi'an Jiaotong University, School of Microelectronics, China
- Li Dong 0008 — Northeastern University, Engineering Optimization and Smart Antenna Institute, Qinhuangdao, China
- Li Dong 0009 — Hunan University of Technology and Business, Key Laboratory of Hunan Province for New Retail Virtual Reality Technology, Changsha, China (and 1 more)
- Li Dong 0010 — Microsoft Research
- Li Dong 0011 — Shenzhen Technology University, College of Big Data and Internet, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Yuting Hong, Li Dong, Xiaojie Qiu, Hui Xiao, Baochen Yao, Siming Zheng, Chengbin Peng:
A multi-view consistency framework with semi-supervised domain adaptation. Eng. Appl. Artif. Intell. 136: 108886 (2024) - [j34]Dongjie Zhang, Yuting Hong, Xiaojie Qiu, Li Dong, Diqun Yan, Chengbin Peng:
C²F²: Cross-Task Cross-Domain Feature Fusion for Semi-Supervised Change Detection. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j33]Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong:
Audio steganography cover enhancement via reinforcement learning. Signal Image Video Process. 18(2): 1007-1013 (2024) - [j32]Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Chengbin Peng:
Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern. IEEE Signal Process. Lett. 31: 286-290 (2024) - [j31]Li Dong, Weipeng Liang, Rangding Wang:
Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention. IEEE Trans. Consumer Electron. 70(1): 3495-3507 (2024) - [j30]Yuanman Li, Liangpei Hu, Li Dong, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li:
Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1857-1872 (2024) - [j29]Baochen Yao, Li Dong, Xiaojie Qiu, Kangkang Song, Diqun Yan, Chengbin Peng:
Uncertainty-Guided Contrastive Learning for Weakly Supervised Point Cloud Segmentation. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [j28]Lin Yang, Rangding Wang, Dawen Xu, Li Dong, Songhan He:
Centralized Error Distribution-Preserving Adaptive Steganography for HEVC. IEEE Trans. Multim. 26: 4255-4270 (2024) - [j27]Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Junjie Xiong, Jiayan Zhuang, Dongtai Liang, Chengbin Peng:
Multi-Level Label Correction by Distilling Proximate Patterns for Semi-Supervised Semantic Segmentation. IEEE Trans. Multim. 26: 8077-8087 (2024) - [j26]Yang Tian, Xin Liao, Li Dong, Yang Xu, Hongbo Jiang:
Amount-Based Covert Communication Over Blockchain. IEEE Trans. Netw. Serv. Manag. 21(3): 3095-3111 (2024) - [c30]Zhe Ye, Diqun Yan, Li Dong, Kailai Shen:
Breaking Speaker Recognition with Paddingback. ICASSP 2024: 4435-4439 - [i10]Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Jiayan Zhuang, Junjie Xiong, Dongtai Liang, Chengbin Peng:
Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation. CoRR abs/2404.02065 (2024) - [i9]Yuanman Li, Yingjie He, Changsheng Chen, Li Dong, Bin Li, Jiantao Zhou, Xia Li:
Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning. CoRR abs/2404.17310 (2024) - 2023
- [j25]Hui Xiao, Li Dong, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng:
Corrigendum to "Semi-supervised semantic segmentation with cross teacher training" [Neurocomputing 508 (2022) 36-46]. Neurocomputing 516: 48 (2023) - [j24]Hao Xu, Hui Xiao, Huazheng Hao, Li Dong, Xiaojie Qiu, Chengbin Peng:
Semi-supervised learning with pseudo-negative labels for image classification. Knowl. Based Syst. 260: 110166 (2023) - [j23]Lang Chen, Rangding Wang, Li Dong, Diqun Yan:
Imperceptible adversarial audio steganography based on psychoacoustic model. Multim. Tools Appl. 82(17): 26451-26463 (2023) - [j22]Kailai Shen, Diqun Yan, Zhe Ye, Xianbo Xu, Jinxing Gao, Li Dong, Chengbin Peng, Kun Yang:
Non-intrusive speech quality assessment with attention-based ResNet-BiLSTM. Signal Image Video Process. 17(7): 3377-3385 (2023) - [j21]Zhe Ye, Diqun Yan, Li Dong, Jiacheng Deng, Shui Yu:
Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger. IEEE Signal Process. Lett. 30: 1057-1061 (2023) - [c29]Jiale Chen, Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Jinyu Tian:
Physically Robust Reversible Watermarking. AMC-SME 2023: 37-43 - [c28]Kailai Shen, Diqun Yan, Li Dong, Ying Ren, Xiaoxun Wu, Jing Hu:
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction. ASRU 2023: 1-6 - [c27]Huazheng Hao, Hui Xiao, Li Dong, Diqun Yan, Dongtai Liang, Jiayan Zhuang, Chengbin Peng:
A Pseudo-Dual Self-Rectification Framework for Semantic Segmentation. ICME 2023: 408-413 - [c26]Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Yang Yin, Jinyu Tian:
Gradient Sign Inversion: Making an Adversarial Attack a Good Defense. IJCNN 2023: 1-6 - [c25]Zhe Ye, Terui Mao, Li Dong, Diqun Yan:
Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion. INTERSPEECH 2023: 4923-4927 - [c24]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. ACM Multimedia 2023: 7559-7568 - [c23]Xianbo Xu, Diqun Yan, Li Dong:
Adaptive-SpEx: Local and Global Perceptual Modeling with Speaker Adaptation for Target Speaker Extraction. SMC 2023: 342-347 - [i8]Hao Xu, Hui Xiao, Huazheng Hao, Li Dong, Xiaojie Qiu, Chengbin Peng:
Semi-Supervised Learning with Pseudo-Negative Labels for Image Classification. CoRR abs/2301.03976 (2023) - [i7]Zhe Ye, Terui Mao, Li Dong, Diqun Yan:
Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion. CoRR abs/2306.15875 (2023) - [i6]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. CoRR abs/2308.02369 (2023) - [i5]Zhe Ye, Diqun Yan, Li Dong, Kailai Shen:
Evil Operation: Breaking Speaker Recognition with PaddingBack. CoRR abs/2308.04179 (2023) - [i4]Jiahao Chen, Diqun Yan, Li Dong:
Adversarial defense based on distribution transfer. CoRR abs/2311.13841 (2023) - 2022
- [j20]Hui Xiao, Li Dong, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng:
Semi-supervised semantic segmentation with cross teacher training. Neurocomputing 508: 36-46 (2022) - [j19]Jiacheng Deng, Li Dong, Rangding Wang, Rui Yang, Diqun Yan:
Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation. IEEE Signal Process. Lett. 29: 1432-1436 (2022) - [j18]Yuanman Li, Jiantao Zhou, Junyang Chen, Jinyu Tian, Li Dong, Xia Li:
Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion. IEEE Trans. Comput. Soc. Syst. 9(6): 1830-1841 (2022) - [c22]Ce Xie, Yuanman Li, Rongqin Liang, Li Dong, Xia Li:
Synchronous Bi-directional Pedestrian Trajectory Prediction with Error Compensation. ACCV (6) 2022: 699-715 - [c21]Li Dong, Jiale Chen, Chengbin Peng, Yuanman Li, Weiwei Sun:
Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking. ICME 2022: 1-6 - [c20]Lin Yang, Rangding Wang, Dawen Xu, Li Dong, Songhan He, Fang Liu:
High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC. IWDW 2022: 20-34 - [c19]Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Weiwei Sun, Hang-Yu Fan:
Physical Anti-copying Semi-robust Random Watermarking for QR Code. IWDW 2022: 131-146 - [c18]Jiacheng Deng, Terui Mao, Diqun Yan, Li Dong, Mingyu Dong:
Detection of Synthetic Speech Based on Spectrum Defects. DDAM@MM 2022: 3-8 - [c17]Ning Lu, Li Dong, Diqun Yan, Xianliang Jiang:
On Attacking Deep Image Quality Evaluator Via Spatial Transform. SMC 2022: 2876-2881 - [c16]Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li:
Robust Document Image Forgery Localization Against Image Blending. TrustCom 2022: 810-817 - [i3]Jiacheng Deng, Shunyi Chen, Li Dong, Diqun Yan, Rangding Wang:
Transferability of Adversarial Attacks on Synthetic Speech Detection. CoRR abs/2205.07711 (2022) - [i2]Mingyu Dong, Jiahao Chen, Diqun Yan, Jingxing Gao, Li Dong, Rangding Wang:
Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations. CoRR abs/2206.15128 (2022) - [i1]Hui Xiao, Li Dong, Kangkang Song, Hao Xu, Shuibo Fu, Diqun Yan, Chengbin Peng:
Semi-Supervised Semantic Segmentation with Cross Teacher Training. CoRR abs/2209.01327 (2022) - 2021
- [j17]Xianwei Zheng, Cuiming Zou, Li Dong, Jiantao Zhou:
Multi-windowed vertex-frequency analysis for signals on undirected graphs. Comput. Commun. 172: 35-44 (2021) - [j16]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan:
Fast speech adversarial example generation for keyword spotting system with conditional GAN. Comput. Commun. 179: 145-156 (2021) - [j15]Jie Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yuzhen Lin:
Towards breaking DNN-based audio steganalysis with GAN. Int. J. Auton. Adapt. Commun. Syst. 14(4): 371-383 (2021) - [j14]Yuzhen Lin, Rangding Wang, Li Dong, Diqun Yan, Jie Wang:
Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain Adaptation. IEEE Signal Process. Lett. 28: 1475-1479 (2021) - [j13]Weiwei Sun, Jiantao Zhou, Li Dong, Jinyu Tian, Jun Liu:
Optimal Pre-Filtering for Improving Facebook Shared Images. IEEE Trans. Image Process. 30: 6292-6306 (2021) - 2020
- [j12]Xueyuan Zhang, Rangding Wang, Diqun Yan, Li Dong, Yuzhen Lin:
Selecting Optimal Submatrix for Syndrome-Trellis Codes (STCs)-Based Steganography With Segmentation. IEEE Access 8: 61754-61766 (2020) - [j11]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan, Jie Wang:
Targeted Speech Adversarial Example Generation With Generative Adversarial Network. IEEE Access 8: 124503-124513 (2020) - [j10]Heng Yu, Rangding Wang, Li Dong, Diqun Yan, Yongkang Gong, Yuzhen Lin:
A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio. IEEE Access 8: 162271-162278 (2020) - [j9]Lang Lin, Rangding Wang, Diqun Yan, Li Dong:
A Robust Method for Speech Replay Attack Detection. KSII Trans. Internet Inf. Syst. 14(1): 168-182 (2020) - [j8]Diqun Yan, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. Secur. Commun. Networks 2020: 8849902:1-8849902:8 (2020) - [j7]Li Dong, Jiantao Zhou, Weiwei Sun, Diqun Yan, Rangding Wang:
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding. IEEE Trans. Circuits Syst. II Express Briefs 67-II(5): 951-955 (2020) - [c15]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan, Yuzhen Lin, Jie Wang:
Towards Designing an Effective Complexity Indicator for Audio Steganography. ICC 2020: 1-6 - [c14]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren:
Efficient Generation of Speech Adversarial Examples with Generative Model. IWDW 2020: 251-264 - [c13]Jie Wang, Rangding Wang, Li Dong, Diqun Yan:
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN. SPDE 2020: 427-442 - [c12]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. SPDE 2020: 443-468 - [c11]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan:
Post-processing for Enhancing Audio Steganographic Undetectability. SPDE 2020: 546-559
2010 – 2019
- 2019
- [j6]Cuiming Zou, Kit Ian Kou, Li Dong, Xianwei Zheng, Yuan Yan Tang:
From Grayscale to Color: Quaternion Linear Regression for Color Face Recognition. IEEE Access 7: 154131-154140 (2019) - [j5]Xiaowen Li, Diqun Yan, Li Dong, Rangding Wang:
Anti-Forensics of Audio Source Identification Using Generative Adversarial Network. IEEE Access 7: 184332-184339 (2019) - [j4]Li Dong, Jiantao Zhou, Yuan Yan Tang:
Content-Adaptive Noise Estimation for Color Images With Cross-Channel Noise Modeling. IEEE Trans. Image Process. 28(8): 4161-4176 (2019) - [c10]Li Dong, Jiantao Zhou, Cuiming Zou, Yulong Wang:
Iterative first-order reverse image filtering. ACM TUR-C 2019: 144:1-144:5 - [c9]Yuzhen Lin, Rangding Wang, Diqun Yan, Li Dong, Xueyuan Zhang:
Audio Steganalysis with Improved Convolutional Neural Network. IH&MMSec 2019: 210-215 - 2018
- [j3]Li Dong, Jiantao Zhou, Yuan Yan Tang:
Effective and Fast Estimation for Image Sensor Noise Via Constrained Weighted Least Squares. IEEE Trans. Image Process. 27(6): 2715-2730 (2018) - [c8]Tao Dai, Yong-bing Zhang, Li Dong, Lida Li, Xin-Ji Liu, Shu-Tao Xia:
Content-Aware Bilateral Filtering. BigMM 2018: 1-6 - [c7]Li Dong, Jiantao Zhou, Tao Dai:
Color Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling. ICME 2018: 1-6 - [c6]Li Dong, Jiantao Zhou:
Locally Adaptive Noise Covariance Estimation for Color Images. IFTC 2018: 91-105 - 2017
- [j2]Li Dong, Jiantao Zhou, Yuan Yan Tang:
Noise Level Estimation for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity. IEEE Trans. Image Process. 26(2): 1017-1030 (2017) - [c5]Li Dong, Jiantao Zhou, Guangtao Zhai:
Efficient image sensor noise estimation via iterative re-weighted least squares. ICME 2017: 1326-1331 - 2016
- [j1]Jiantao Zhou, Weiwei Sun, Li Dong, Xianming Liu, Oscar C. Au, Yuan Yan Tang:
Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3): 441-452 (2016) - [c4]Li Dong, Jiantao Zhou:
Noise-Robust SLIC Superpixel for Natural Images. CCBD 2016: 335-340 - [c3]Li Dong, Jiantao Zhou:
Estimating noise level for natural images based on scale-invariant kurtosis and piecewise stationarity. ICIP 2016: 4393-4397 - 2014
- [c2]Li Dong, Jiantao Zhou, Yuan Yan Tang, Xianming Liu:
Estimation of capacity parameters for dynamic histogram shifting (DHS)-based reversible image watermarking. ICME 2014: 1-6 - 2013
- [c1]Li Dong, Jian Wang, Yuan-Man Li, Yuan Yan Tang:
Sector Projection Fourier Descriptor for Chinese character recognition. CYBCONF 2013: 162-167
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint