Shenghong Li

ORCID: 0000-0002-0767-2307
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optimization and Search Problems
  • Advanced Steganography and Watermarking Techniques
  • Machine Learning and Algorithms
  • Digital Media Forensic Detection
  • Complex Network Analysis Techniques
  • stochastic dynamics and bifurcation
  • Opinion Dynamics and Social Influence
  • Network Security and Intrusion Detection
  • Ecosystem dynamics and resilience
  • Anomaly Detection Techniques and Applications
  • Image Processing Techniques and Applications
  • Cooperative Communication and Network Coding
  • Adversarial Robustness in Machine Learning
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Malware Detection Techniques
  • Advanced Neural Network Applications
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Computational Techniques and Applications
  • Advanced Image and Video Retrieval Techniques
  • Nonlinear Dynamics and Pattern Formation
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Graph Neural Networks
  • Spam and Phishing Detection
  • Advanced Bandit Algorithms Research

Shanghai Jiao Tong University
2016-2025

Soochow University
2023-2025

Wuhan University
2025

Renmin Hospital of Wuhan University
2025

Chinese Academy of Sciences
2025

Kunming Institute of Botany
2025

Jiangxi University of Finance and Economics
2006-2024

Health Sciences and Nutrition
2024

Commonwealth Scientific and Industrial Research Organisation
2024

Zhejiang Ocean University
2024

In this paper, a 2-D noncausal Markov model is proposed for passive digital image-splicing detection. Different from the traditional model, approach models an image as signal and captures underlying dependencies between current node its neighbors. The parameters are treated discriminative features to differentiate spliced images natural ones. We apply in block discrete cosine transformation domain Meyer wavelet transform domain, cross-domain final classification. support vector machine which...

10.1109/tcsvt.2014.2347513 article EN IEEE Transactions on Circuits and Systems for Video Technology 2014-08-13

Software-defined industrial Internet of things (SD-IIoT) exploits federated learning to process the sensitive data at edges, while adaptive poisoning attacks threat security SD-IIoT. To address this problem, article proposes a multi-tentacle (MTFL) framework, which is essential guarantee trustness training in In MTFL, participants with similar tasks are assigned same tentacle group. identify attacks, distribution-based efficient attack detection (TD-EPAD) algorithm presented. And also,...

10.1109/tii.2022.3173996 article EN IEEE Transactions on Industrial Informatics 2022-05-10

Abstract Perovskite photodetectors with bipolar photoresponse characteristics are expected to be applied in the field of secure optical communication (SOC). However, how realize perovskite photodetector response remains challenging. Herein, by introducing bismuth iodide (BiI 3 ) into Sn‐Pb mixed precursor solution, 2D FA Bi 2 I 9 is spontaneously formed at bottom a wide‐narrow bandgap‐laminated film. Wavelength‐dependent realized based on absorption difference photoactive region different...

10.1002/adma.202307534 article EN Advanced Materials 2023-11-28

Recently, detecting the traces introduced by content-preserving image manipulations has received a great deal of attention from forensic analyzers. It is well known that median filter widely used nonlinear denoising operator. Therefore, detection filtering important realistic significance in forensics. In this letter, novel local texture operator, named second-order ternary pattern (LTP), proposed for detection. The operator encodes derivative direction variations using 3-valued coding...

10.1109/lsp.2013.2295858 article EN IEEE Signal Processing Letters 2014-01-24

Spectrum sensing based dynamic spectrum sharing is one of the key innovative techniques in future 5G communications. When realistic mobile scenarios are concerned, location primary user (PU) great significance to reliable detections and cognitive network enhancements. Given disappearance its emission signals, passive locations tracking PU, nevertheless, remains dramatically different from existing positioning problems. In this investigation, a new joint estimation paradigm, namely deep...

10.1109/jsac.2015.2430279 article EN IEEE Journal on Selected Areas in Communications 2015-05-06

The machine-to-machine (M2M) communications, which achieve the implementation of Internet Things (IoT), can be carried over wireless cellular networks. massive random access (RA) in M2M communications will cause radio network congestion base station (BS), leading to sharp deterioration delay and probability. Access class barring (ACB) that directly control flow machine-type communication (MTC) devices by an ACB factor is efficient scheme prevent BS from traffic overload. In networks, RA...

10.1109/jiot.2018.2867937 article EN IEEE Internet of Things Journal 2018-08-31

10.1016/j.physa.2013.03.014 article EN Physica A Statistical Mechanics and its Applications 2013-03-29

Semi-Supervised Learning (SSL) is a powerful derivative for humans to discover the hidden knowledge, and will be great substitute data taggers. Although availability of unlabeled rises up huge passion SSL, untrustness leads many unknown security risks. In this paper, we first identify an insidious backdoor threat SSL where training are poisoned by methods migrated from supervised settings. Then, further exploit threat, Deep Neural Backdoor (DeNeB) scheme proposed, which requires less...

10.1109/tifs.2021.3116431 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

This paper considers the stochastic point location (SPL) problem as a learning mechanism trying to locate on real line via interacting with random environment. Compared environment in literatures that confines moving two directions, i.e., left or right, this introduces general triple level which not only tells go but also informs it stay unmoved. It is easy understand, we will prove paper, reported previous just special case of And new algorithm, named walk-based proposed an unknown under...

10.1109/tcyb.2015.2446198 article EN IEEE Transactions on Cybernetics 2015-07-08

The threat of data-poisoning backdoor attacks on learning algorithms typically comes from the labeled data. However, in deep semi-supervised (SSL), unknown threats mainly stem unlabeled In this paper, we propose a novel hidden (DeHiB) attack scheme for SSL-based systems. contrast to conventional attacking methods, DeHiB can inject malicious training data learner so as enable SSL model output premeditated results. particular, robust adversarial perturbation generator regularized by unified...

10.1609/aaai.v35i12.17266 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-05-18

Adversarial attacks and defenses in machine learning deep neural network have been gaining significant attention due to the rapidly growing applications of Internet relevant scenarios. This survey provides a comprehensive overview recent advancements field adversarial attack defense techniques, with focus on network-based classification models. Specifically, we conduct methods state-of-the-art techniques based principles, present them visually appealing tables tree diagrams. is rigorous...

10.48550/arxiv.2303.06302 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Abstract Flexible perovskite photodetectors (FPDs) are promising for novel wearable devices in bionics, robotics and health care. However, their performance degradation instability during operations remain a grand challenge. Superior flexibility spontaneous functional repair of without the need any external drive or intervention ideal goals FPDs. Herein, by using phenyl disulfide instead alkyl as crosslinking agent, bonds with lower bond energy introduced, thus endowing polyurethane network...

10.1002/inf2.12594 article EN cc-by InfoMat 2024-06-28

We focus on a full-duplex multi-user MIMO system where the base station (BS) serves multiple uplink and downlink users simultaneously. Both BS mobile stations (MSs) are equipped with antennas. The performance of is limited by self-interference at interference caused users. To address this issue, we propose to jointly design beamformers MSs. An optimization problem formulated maximize weighted sum data rate subject maximum power constraints. Although non-convex, it can be solved via iterative...

10.1109/icc.2014.6884100 article EN 2014-06-01

Deep neural network are one of the most powerful model for machine learning, which can learn underlying patterns automatically from a large amount data. So it be extensively used in more and Internet-of-Things (IoT) applications. However, training deep models is difficult, suffering overfitting gradient vanishing problem. Besides, parameters multiplication operations make impractical learning to directly execute on target hardware. In this paper, we propose method gradually pruning weakly...

10.1109/jiot.2017.2711426 article EN IEEE Internet of Things Journal 2017-06-06

Many factors influence the connection states between nodes of wireless sensor networks, such as physical distance, and network load, making network's edge length dynamic in abundant scenarios. This property makes essentially form a graph with stochastic lengths. In this paper, we study shortest path problem on directional lengths, using reinforcement learning algorithms. regard each random variable following unknown probability distribution aim to find graph. We evaluate performance...

10.1109/access.2019.2950055 article EN cc-by IEEE Access 2019-01-01

Influence diffusion estimation is a crucial problem in social network analysis. Most prior works mainly focus on predicting the total influence spread, i.e., expected number of influenced nodes given an initial set active (aka. seeds). However, accurate susceptibility, probability being for each individual, more appealing and valuable real-world applications. Previous methods generally adopt Monte Carlo simulation or heuristic rules to estimate influence, resulting high computational cost...

10.1145/3437963.3441829 article EN 2021-03-05
Coming Soon ...