删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

北京交通大学计算机与信息技术学院导师教师师资介绍简介-李晓龙

本站小编 Free考研考试/2020-05-09

基本信息 办公电话: 电子邮件: lixl@bjtu.edu.cn
通讯地址:北京市海淀区上园村3号,第九教学楼北606 邮编:100044

教育背景 2002/9–2006/3,法国卡尚高等师范学校(ENS de Cachan,France),专业:数学,博士学位,导师:Yves Meyer
2001/9–2002/7,法国巴黎综合理工学校(Ecole Polytechnique,France),专业:数学、视觉和模式识别,硕士学位,导师:Yves Meyer
1999/7–2001/7,法国巴黎综合理工学校(Ecole Polytechnique,France),专业:数学,工程师学位
1995/9–1999/7,北京大学,专业:基础数学,学士学位
工作经历 2016/11-至今,北京交通大学,计算机与信息技术学院
2007/01-2016/10,北京大学,计算机科学技术研究所
2006/06-2006/12,北京北大方正电子有限公司

研究领域:基于人工智能技术的多媒体内容安全,主要包括可逆信息隐藏、隐写和隐写分析、数字水印、数字取证等。
发表学术论文百余篇,其中包含8篇ESI高被引。主持国家自然科学基金重点项目一项、面上项目两项。获得省部级二等奖一次(排名第三)、三等奖一次(排名第六)。据Google Citation统计,学术成果被国内外同行引用5000余次。
研究方向 模式识别与智能系统
数字媒体信息处理
电子与通信工程(专业学位)
软件工程(专业学位)
招生专业 控制科学与工程硕士
信息与通信工程硕士
电子信息硕士
科研项目 国家自然科学基金面上项目,**,基于多直方图的JPEG图像可逆信息隐藏,2020/01-2023/12,主持
国家自然科学基金通用技术基础研究联合基金重点项目,U**,适应多种信道的安全隐写:基础理论和关键技术研究,2018/01-2021/12,主持
国家自然科学基金面上项目,**,高保真可逆图像信息隐藏关键问题研究,2016/01-2019/12,主持
教学工作
研究生课程
秋季学期:机器学习(**,48学时)
秋季学期:智能信息处理数学基础(**,32学时)
春季学期:凸优化理论与应用(**,32学时)
本科生课程
小学期:计算思维综合训练(80S000Q,32学时)



论文/期刊
期刊论文列表
[1]WenfaQi, Xiaolong Li, Tong Zhang, and Zongming Guo, “Optimal reversible data hidingscheme based on multiple histograms modification,” Accepted by IEEE Transactionson Circuits and Systems for Video Technology, to appear.
[2]XiangWang, Xiaolong Li, and Qingqi Pei, “Independent embedding domain basedtwo-stage robust reversible watermarking,” Accepted by IEEE Transactions onCircuits and Systems for Video Technology, to appear.
[3]HaoruiWu, Xiaolong Li, Yao Zhao and Rongrong Ni, “Improved PPVO-based high-fidelityreversible data hiding”, Signal Processing, 167, 107264, 2020.
[4]ZhipengChen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni,“Secure detection of image manipulation by means of random feature selection,” IEEETransactions on Information Forensics and Security, 14(9), pp. 2454-2469, 2019.
[5]Bo Ou,Xiaolong Li, Weiming Zhang, and Yao Zhao, “Improving pairwise PEE viahybrid-dimensional histogram generation and adaptive mapping selection,” IEEETransactions on Circuits and Systems for Video Technology, 29(7), pp.2176-2190, 2019.
[6]YakunNiu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “An enhanced approach fordetecting double JPEG compression with the same quantization matrix,” SignalProcessing: Image Communication, 76, pp. 89-96, 2019.
[7]XiaolongLi and Wei Li, “A case study of a two-stage image segmentation algorithm,” MultimediaTools and Applications, 78(7), pp. 8197-8206, 2019.
[8]WenjieLi, Rongrong Ni, Xiaolong Li, and Yao Zhao, “Robust median filtering detectionbased on the difference of frequency residuals,” Multimedia Tools andApplications, 78(7), pp. 8363-8381, 2019.
[9]TongZhang, Xiaolong Li, Wenfa Qi, Wei Li, and Zongming Guo, “Real-time reversibledata hiding based on multiple histograms modification,” Journal of Real-TimeImage Processing, 16(3), pp. 661-671, 2019.
[10]HaoruiWu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Improved reversible data hidingbased on PVO and adaptive pairwise embedding,” Journal of Real-Time ImageProcessing, 16(3), pp. 685-695, 2019.
[11]YuanyuanMa, Xiangyang Luo, Xiaolong Li, Zhenkun Bao, and Yi Zhang, “Selection of richmodel steganalysis features based on decision rough set α-positive regionreduction,” IEEE Transactions on Circuits and Systems for Video Technology,29(2), pp. 336-350, 2019.
[12]MengyaoXiao, Xiaolong Li, Yangyang Wang, Yao Zhao, and Rongrong Ni, “Reversible datahiding based on pairwise embedding and optimal expansion path,” SignalProcessing, 158, pp. 210-218, 2019.
[13]GuorongXuan, Xiaolong Li, and Yun-Qing Shi, “Minimum entropy and histogram-pair basedJPEG image reversible data hiding,” Journal of Information Security andApplications, 45, pp. 1-9, 2019.
[14]GuorongXuan, Xiaolong Li, and Yun-Qing Shi, “Histogram-pair based reversible datahiding via searching for optimal four thresholds,” Journal of InformationSecurity and Applications, 39, pp. 58-67, 2018.
[15]HongshenTang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Median filtering detection ofsmall-size image based on CNN,” Journal of Visual Communication and ImageRepresentation, 51, pp. 162-168, 2018.
[16]Ran Hu,Xiaolong Li, and Zongming Guo, “Decorrelated local binary patterns forefficient texture classification,” Multimedia Tools and Applications, 77(6),pp. 6863-6882, 2018.
[17]GuangyuanYang, Xiaolong Li, Jinwei Wang, and Zongming Guo, “Efficient large payloadsternary matrix embedding,” Multimedia Tools and Applications, 77(2), pp. 1605-1622,2018.
[18]Bowen Xue,Xiaolong Li, Jinwei Wang, and Zongming Guo, “Improved reversible data hidingbased on two-dimensional difference-histogram modification,” Multimedia Toolsand Applications, 76(11), pp. 13473-13491, 2017.
[19]ZhenkunBao, Xiaolong Li, and Xiangyang Luo, “On the PDF moments and CF moments ofimage steganalysis in the log prediction error wavelet subband,” Journal ofElectronic Imaging, 26(1), pp. 013025, 2017.
[20]Bo Ou,Xiaolong Li, Jinwei Wang, and Fei Peng, “High-fidelity reversible data hidingbased on geodesic path and pairwise prediction-error expansion,” Neurocomputing,226, pp. 23-34, 2017.
[21]XiangyangLuo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, andFenlin Liu, “Steganalysis of HUGO steganography based on parameter recognitionof syndrome-trellis-codes,” Multimedia Tools and Applications, 75(21), pp. 13557-13583,2016.
[22]Yun-QingShi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, and Bin Ma, “Reversible data hiding:Advances in the past two decades,” IEEE Access, 4, pp. 3210-3237, 2016.
[23]Bo Ou,Xiaolong Li, and Jinwei Wang, “High-fidelity reversible data hiding based onpixel-value-ordering and pairwise prediction-error expansion,” Journal ofVisual Communication and Image Representation, 39, pp. 12-23, 2016.
[24]Bo Ou,Xiaolong Li, and Jinwei Wang, “Improved PVO-based reversible data hiding: A newimplementation based on multiple histograms modification,” Journal of VisualCommunication and Image Representation, 38, pp. 328-339, 2016.
[25]XiaolongLi, Weiming Zhang, Xinlu Gui, and Bin Yang, “Efficient reversible data hidingbased on multiple histograms modification,” IEEE Transactions on InformationForensics and Security, 10(9), pp. 2016-2027, 2015.
[26]Bin Li,Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “A strategy of clusteringmodification directions in spatial image steganography,” IEEE Transactions onInformation Forensics and Security, 10(9), pp. 1905-1917, 2015.
[27]XiaolongLi, Siren Cai, Weiming Zhang, and Bin Yang, “A further study of large payloadsmatrix embedding,” Information Sciences, 324, pp. 257-269, 2015.
[28]XiaolongLi, Siren Cai, Weiming Zhang, and Bin Yang, “Matrix embedding in finite abeliangroup,” Signal Processing, 113, pp. 250-258, 2015.
[29]Bo Ou,Xiaolong Li, Yao Zhao, and Rongrong Ni, “Efficient color image reversible datahiding based on channel-dependent payload partition and adaptive embedding,” SignalProcessing, 108, pp. 642-657, 2015.
[30]Bin Li,Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Statistical model ofJPEG noises and its application in quantization step estimation,” IEEETransactions on Image Processing, 24(5), pp. 1471-1484, 2015.
[31]JianLi, Xiaolong Li, Bin Yang, and Xingming Sun, “Segmentation-based imagecopy-move forgery detection scheme,” IEEE Transactions on Information Forensicsand Security, 10(3), pp. 507-518, 2015.
[32]Bin Li,Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Revealing the traceof high-quality JPEG compression through quantization noise analysis,” IEEETransactions on Information Forensics and Security, 10(3), pp. 558-573, 2015.
[33]XiaochengHu, Weiming Zhang, Xiaolong Li, and Nenghai Yu, “Minimum rate prediction andoptimized histograms modification for reversible data hiding,” IEEETransactions on Information Forensics and Security, 10(3), pp. 653-664, 2015.
[34]WeimingZhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Optimal transitionprobability of reversible data hiding for general distortion metrics and itsapplications,” IEEE Transactions on Image Processing, 24(1), pp. 294-304, 2015.
[35]Bo Ou,Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding using invariantpixel-value-ordering and prediction-error expansion,” Signal Processing: ImageCommunication, 29(7), pp. 760-772, 2014.
[36]XinluGui, Xiaolong Li, and Bin Yang, “A high capacity reversible data hiding schemebased on generalized prediction-error expansion and adaptive embedding,” SignalProcessing, 98, pp. 370-380, 2014.
[37]FeiPeng, Xiaolong Li, and Bin Yang, “Improved PVO-based reversible data hiding,” DigitalSignal Processing, 25, pp. 255-265, 2014.
[38]Bo Ou,Xiaolong Li, Yao Zhao, Rongrong Ni, and Y.-Q. Shi, “Pairwise prediction-errorexpansion for efficient reversible data hiding,” IEEE Transactions on ImageProcessing, 22(12), pp. 5010-5021, 2013.
[39]Bo Ou,Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding based on PDEpredictor,” Journal of Systems and Software, 86(10), pp. 2700-2709, 2013.
[40]JianLi, Xiaolong Li, and Bin Yang, “Reversible data hiding scheme for color imagebased on prediction-error expansion and cross-channel correlation,” SignalProcessing, 93(9), pp. 2748-2758, 2013.
[41]XiaolongLi, Bin Li, Xiangyang Luo, Bin Yang, and Ruihui Zhu, “Steganalysis of a PVD-basedcontent adaptive image steganography,” Signal Processing, 93(9), pp. 2529-2538,2013.
[42]XiaolongLi, Weiming Zhang, Xinlu Gui, and Bin Yang, “A novel reversible data hidingscheme based on two-dimensional difference-histogram modification,” IEEE Transactionson Information Forensics and Security, 8(7), pp. 1091-1100, 2013.
[43]WeimingZhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Recursive histogrammodification: establishing equivalency between reversible data hiding andlossless data compression,” IEEE Transactions on Image Processing, 22(7), pp.2775-2785, 2013.
[44]XiaolongLi, Bin Li, Bin Yang, and Tieyong Zeng, “General framework tohistogram-shifting-based reversible data hiding,” IEEE Transactions on ImageProcessing, 22(6), pp. 2181-2191, 2013.
[45]XiaolongLi, Jian Li, Bin Li, and Bin Yang, “High-fidelity reversible data hiding schemebased on pixel-value-ordering and prediction-error expansion,” SignalProcessing, 93(1), pp. 198-205, 2013.
[46]FeiPeng, Xiaolong Li, and Bin Yang, “Adaptive reversible data hiding scheme basedon integer transform,” Signal Processing, 92(1), pp. 54-62, 2012.
[47]XiaolongLi, Bin Yang, and Tieyong Zeng, “Efficient reversible watermarking based onadaptive prediction-error expansion and pixel selection,” IEEE Transactions onImage Processing, 20(12), pp. 3524-3533, 2011.
[48]TieyongZeng, Xiaolong Li, and Michael Ng, “Alternating minimization method for totalvariation based wavelet shrinkage model,” Communications in ComputationalPhysics, 8(5), pp. 976-994, 2010.
[49]XiangWang, Xiaolong Li, Bin Yang, and Zongming Guo, “Efficient generalized integertransform for reversible watermarking,” IEEE Signal Processing Letters, 17(6),pp. 567-570, 2010.
[50]XiaolongLi, Bin Yang, Daofang Cheng, and Tieyong Zeng, “A generalization of LSBmatching,” IEEE Signal Processing Letters, 16(2), pp. 69-72, 2009.
会议论文列表
[1]TongZhang, Xiaolong Li, Wenfa Qi, and Zongming Guo, “Prediction-error valueordering for high-fidelity reversible data hiding”, in Proc. MMM, pp. ???-???,2020.
[2]LiwenQin, Xiaolong Li, and Yao Zhao, “A new JPEG image watermarking method exploitingspatial JND model”, in Proc. IWDW, pp. ???-???, 2019.
[3]QiChang, Gene Cheung, Yao Zhao, Xiaolong Li, and Rongrong Ni, “Non-local graph-basedprediction for reversible data hiding in images”, in Proc. IEEE ICIP, pp.1693-1697, 2018.
[4]Bo Ou,Xiaolong Li, Wei Li, and Yun-Qing Shi, “Pixel-value-ordering based reversibledata hiding with adaptive texture classification and modification”, in Proc. IWDW,pp. 169-179, 2018.
[5]YanhongWu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “A new detector for JPEGdecompressed bitmap identification”, in Proc. APSIPA ASC, pp. 842-845, 2017.
[6]HongshenTang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Detection of various imageoperations based on CNN”, in Proc. APSIPA ASC, pp. 1479-1485, 2017.
[7]GuangyuanYang, Wenfa Qi, Xiaolong Li, and Zongming Guo, “Improved reversible visiblewatermarking based on adaptive block partition”, in Proc. IWDW, pp. 303-317,2017.
[8]ZhipengChen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni, “Agradient-based pixel-domain attack against SVM detection of global imagemanipulations”, in Proc. IEEE WIFS pp. 1-6, 2017.
[9]XiaolongLi and Zongming Guo, “General expansion-shifting model for reversible datahiding”, in Proc. APSIPA ASC, pp. 1-4, 2016.
[10]SirenCai, Xiaolong Li, Jiaying Liu, and Zongming Guo, “A new reversible data hidingscheme exploiting high-dimensional prediction-error histogram”, in Proc. IEEEICIP, pp. 2732-2736, 2016.
[11]SirenCai, Xiaolong Li, Bowen Xue, and Zongming Guo, “A new reversible data hiding schemebased on high-dimensional pixel-intensity-histogram modification”, in Proc. IEEEICME Workshops, pp. 1-6, 2016.
[12]GuangyuanYang, Xiaolong Li, Bin Li, and Zongming Guo, “A new detector of LSB matchingsteganography based on likelihood ratio test for multivariate Gaussian covers”,in Proc. APSIPA ASC, pp. 757-760, 2015.
[13]BowenXue, Xiaolong Li, and Zongming Guo, “A new SDCS-based content-adaptivesteganography using iterative noise-level estimation”, in Proc. IIH-MSP, pp. 68-71,2015.
[14]Bo Ou,Xiaolong Li, and Weiming Zhang, “PVO-based reversible data hiding for encryptedimages,” in Proc. IEEE ChinaSIP, pp. 831-835, 2015.
[15]BowenXue, Xiaolong Li, Bin Li, and Zongming Guo, “Steganalysis of LSB replacementfor multivariate Gaussian covers,” in Proc. IEEE ChinaSIP, pp. 836-840, 2015.
[16]FeiPeng, Xiaolong Li, and Bin Yang, “An adaptive PEE-based reversible data hidingscheme exploiting referential prediction-errors,” in Proc. IEEE ICME, 2015.
[17]Bin Li,Ming Wang, Jiwu Huang, and Xiaolong Li, “A new cost function for spatial imagesteganography,” in Proc. IEEE ICIP, pp. 4206-4210, 2014.
[18]XinluGui, Xiaolong Li, Wenfa Qi, and Bin Yang, “Blind median filtering detectionbased on histogram features,” in Proc. APSIPA ASC, 2014.
[19]XinluGui, Xiaolong Li, and Bin Yang, “High-dimensional histogram utilization forreversible data hiding,” in Proc. IWDW, pp. ?-?, 2014.
[20]XinluGui, Siren Cai, Xiaolong Li, and Bin Yang, “A novel reversible data hidingscheme based on reference pixels and adaptive block selection,” in Proc.IIH-MSP, pp. 276-280, 2014.
[21]XinluGui, Xiaolong Li, and Bin Yang, “Steganalysis of LSB matching based on localbinary patterns,” in Proc. IIH-MSP, pp. 475-480, 2014.
[22]XiaolongLi, Weiming Zhang, Bo Ou, and Bin Yang, “A brief review on reversible datahiding: current techniques and future prospects,” in Proc. IEEE ChinaSIP, pp.426-430, 2014.
[23]XinluGui, Xiaolong Li, and Bin Yang, “Efficient reversible data hiding based ontwo-dimensional pixel-intensity-histogram modification,” in Proc. IEEE ICASSP,pp. 7420-7424, 2014.
[24]Ran Hu,Xiaolong Li, and Bin Yang, “A new lossy compression scheme for encryptedgray-scale images,” in Proc. IEEE ICASSP, pp. 7387-7390, 2014.
[25]JianLi, Xiaolong Li, and Xingming Sun, “A new reversible data hiding scheme basedon efficient prediction,” in Proc. IWDW, pp. 326-336, 2013.
[26]FeiPeng, Xiaolong Li, and Bin Yang, “Calibration based reliable detector fordetecting LSB matching steganography,” in Proc. IWDW, pp. 44-53, 2012.
[27]YuanzhiQi, Xiaolong Li, Bin Wang, and Bin Yang, “A study of optimal matrix forefficient matrix embedding in F3,” in Proc. IWDW, pp. 8-18, 2012.
[28]Jie Yu,Guopu Zhu, Xiaolong Li, and Jianquan Yang, “An improved algorithm forreversible data hiding in encrypted image,” in Proc. IWDW, pp. 384-394, 2012.
[29]XinluGui, Xiaolong Li, and Bin Yang, “A novel integer transform for efficientreversible watermarking,” in Proc. ICPR, pp. 947-950, 2012.
[30]JianLi, Xiaolong Li, and Bin Yang, “A new PEE-based reversible watermarkingalgorithm for color image,” in Proc. IEEE ICIP, pp. 2181-2184, 2012.
[31]XinluGui, Xiaolong Li, and Bin Yang, “Improved payload location for LSB matchingsteganography,” in Proc. IEEE ICIP, pp. 1125-1128, 2012.
[32]XinluGui, Xiaolong Li, and Bin Yang, “A content-adaptive ±1-based steganography byminimizing the distortion of first order statistics,” in Proc. IEEE ICASSP, pp.1781-1784, 2012.
[33]FeiPeng, Xiaolong Li, and Bin Yang, “A content-adaptive image steganography basedon SDCS,” in Proc. APSIPA ASC, 2011.
[34]XiaolongLi, Bin Yang, and Wenfa Qi, “Print-and-photocopy resilient text watermarkingbased on Hadamard transform,” in Proc. APSIPA ASC, 2011.
[35]RuoyuWu, Xiaolong Li, and Bin Yang, “Identifying computer generated graphics viahistogram features,” in Proc. IEEE ICIP, pp. 1933-1936, 2011.
[36]Yi Luo,Xiaolong Li, and Bin Yang, “Locating steganographic payload for LSB matchingembedding,” in Proc. IEEE ICME, 2011.
[37]Yi Luo,Fei Peng, Xiaolong Li, and Bin Yang, “Reversible image watermarking based onprediction-error expansion and compensation,” in Proc. IEEE ICME, 2011.
[38]KaiweiCai, Xiaolong Li, Bin Yang, and Xiaoqing Lu, “Blind tampering identification byincorporating EFR and calibration,” in Proc. MINES, pp. 379-383, 2010.
[39]LipingJi, Xiaolong Li, Bin Yang, and Zhihong Liu, “A further study on a PVD-basedsteganography,” in Proc. MINES, pp. 686-690, 2010.
[40]ChaoWang, Xiaolong Li, and Bin Yang, “High capacity reversible image watermarkingbased on integer transform,” in Proc. IEEE ICIP, pp. 217-220, 2010.
[41]ChaoWang, Xiaolong Li, and Bin Yang, “Efficient reversible image watermarking byusing dynamical prediction-error expansion,” in Proc. IEEE ICIP, pp. 3673-3676,2010.
[42]KaiweiCai, Xiaolong Li, Tieyong Zeng, Bin Yang, and Xiaoqing Lu, “Reliable histogramfeatures for detecting LSB matching,” in Proc. IEEE ICIP, pp. 1761-1764, 2010.
[43]ChaoWang, Xiaolong Li, Bin Yang, Xiaoqing Lu, and Chengcheng Liu, “Acontent-adaptive approach for reducing embedding impact in steganography,” in Proc.IEEE ICASSP, pp. 1762-1765, 2010.
[44]XudongChen, Xiaolong Li, Bin Yang, and Yingmin Tang, “Reversible image watermarkingbased on a generalized integer transform,” in Proc. IEEE ICASSP, pp. 2382-2385,2010.
[45]XiangWang, Xiaolong Li, Bin Yang, and Zongming Guo, “A reversible watermarkingscheme for high-fidelity applications,” in Proc. PCM, pp.613-624, 2009.
[46]GaoyangWang, Xiaolong Li, and Bin Yang, “A high capacity reversible watermarkingscheme based on an integer transform,” in Proc. PCM, pp. 1287-1292, 2009.
[47]YunkaiGao, Xiaolong Li, Tieyong Zeng, and Bin Yang, “Improving embedding efficiencyvia matrix embedding: A case study,” in Proc. IEEE ICIP, pp. 109-112, 2009.
[48]YifengLu, Xiaolong Li, and Bin Yang, “A ±1-based steganography by minimizing thedistortion of first order statistics,” in Proc. IIH-MSP, pp. 754-758, 2009.(Best paper award)
[49]YifengLu, Xiaolong Li, and Bin Yang, “A secure steganography: noisy regionembedding,” in Proc. IIH-MSP, pp. 1046-1051, 2009.
[50]YunkaiGao, Xiaolong Li, and Bin Yang, “Employing optimal matrix for efficient matrixembedding,” in Proc. IIH-MSP, pp. 161-165, 2009.
[51]WenfaQi, Xiaolong Li, and Bin Yang, “Bilinear coons patch and its application insecurity pattern design,” in Proc. IIH-MSP, pp. 881-884, 2009.
[52]YunkaiGao, Xiaolong Li, and Bin Yang, “Constructing specific matrix for efficientmatrix embedding,” in Proc. IEEE ICME, pp. 1006-1009, 2009.
[53]ChengchengLiu, Xiaolong Li, Xiaoqing Lu, and Bin Yang, “Improving embedding efficiency byincorporating SDCS and WPC,” in Proc. IEEE ICME, pp. 1018-1021, 2009.
[54]YunkaiGao, Xiaolong Li, Bin Yang, and Yifeng Lu, “Detecting LSB matching bycharacterizing the amplitude of histogram,” in Proc. IEEE ICASSP, pp.1505-1508, 2009.
[55]WenfaQi, Xiaolong Li, and Bin Yang, “A character segmentation method withoutcharacter verification,” in Proc. IITAW, pp. 581-584, 2008.
[56]YifengLu, Xiaolong Li, Wenfa Qi, and Bin Yang, “A further study on an opticalwatermarking scheme,” in Proc. ICSP, pp. 2213-2216, 2008.
[57]XiaolongLi, Tieyong Zeng, and Bin Yang, “A further study on steganalysis of LSBmatching by calibration,” in Proc. IEEE ICIP, pp. 2072-2075, 2008.
[58]XiaolongLi, Tieyong Zeng, and Bin Yang, “Detecting LSB matching by applying calibrationtechnique for difference image,” in Proc. ACM MM&SEC, pp. 133-138, 2008.
[59]DaofangCheng, Xiaolong Li, Wenfa Qi, and Bin Yang, “A statistics-based watermarkingscheme robust to print-and-scan,” in Proc. ISECS, pp. 894-898, 2008.
[60] Xiaolong Li, Tieyong Zeng,and Bin Yang, “Improvement of the embedding efficiency of LSB matching by sumand difference covering set,” in Proc. IEEE ICME, pp. 209-212, 2008.



专著/译著
专利 [1] 亓文法,李晓龙,张华,一种数字水印嵌入与提取方法及装置,2006.10.25,中国,ZL8.0
[2] 亓文法,李晓龙,一种用于数字图像的数字水印方法及装置,2007.01.10,中国,ZL 9.4
[3] 李晓龙,亓文法,程道放,基于数字图像变换域系数统计模型的水印嵌入及提取方法,2007.01.25,中国,ZL 3.4
[4] 李晓龙,亓文法,杨斌,张华,程道放,二值图像中数字水印的嵌入、提取方法和装置,2007.09.11,中国,ZL 2.7
[5] 李晓龙,亓文法,程道放,杨斌,一种数字图像的水印嵌入、提取方法及装置,2007.09.12,中国,ZL 0.6
[6] 李晓龙,杨斌,程道放,亓文法,一种在数字图像中嵌入和提取水印的方法与装置,2007.12.27,中国,ZL 2.5
[7] 李晓龙,亓文法,程道放,杨斌,二值文本图像中数字水印的嵌入和提取的方法及装置,2008.01.08,中国,ZL 0.0
[8] 王祥,郭宗明,李晓龙,杨斌,一种数字水印嵌入和提取方法及装置,2009.10.19,中国,ZL 8.5
[9] 王高阳,亓文法,李晓龙,杨斌,一种数字图像中水印嵌入和检测的方法及装置,2009.12.31,中国,ZL 2.2
[10] 郭宗明,王祥,李晓龙,杨斌,可逆水印嵌入、提取方法及装置和图像恢复方法及装置,2010.03.15,中国,ZL 4.7
[11] 王超,李晓龙,亓文法,杨斌,一种数字图像中可逆水印的嵌入方法及其提取方法,2010.04.23,中国,ZL 9.1
[12] 李晓龙,王超,亓文法,杨斌,一种数字图像中的水印嵌入和提取方法,2010.06.22,中国,ZL 7.8
软件著作权
获奖与荣誉 2015,视觉媒体内容保护的理论与方法,教育部自然科学二等奖(排名第三)
社会兼职



相关话题/北京交通大学 计算机

  • 领限时大额优惠券,享本站正版考研考试资料!
    大额优惠券
    优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
    本站小编 Free壹佰分学习网 2022-09-19
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-牛温佳
    基本信息办公电话:**电子邮件:niuwj@bjtu.edu.cn通讯地址:海淀区上园村3号北京交通大学邮编:100044教育背景中科院计算所博士毕业,美国加州大学欧文分校访问,主要研究方向为人工智能安全。作为项目负责人,先后主持了国家自然科学基金委青年基金、应急管理基金、面上基金及国家科技奖励办公室课题和总参国防重点实验室课题等5项国家级项目;作为项目骨干,先后参与了工信部重大专项和中科院战略先 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-桑基韬
    基本信息办公电话:电子邮件:jtsang@bjtu.edu.cn通讯地址:北京交通大学九教北506邮编:100044教育背景桑基韬,出生于山东烟台。东南大学学士、中科院自动化研究所博士。20122017年在模式识别国家重点实验室工作,2017年入选北京交通大学“卓越百人”计划。曾获中科院院长特别奖、中科院百篇优博、CCF优秀博士论文提名、ACM中国新星奖等。主要研究方向为多媒体计算、网络数据挖掘、 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-高博
    基本信息办公电话:电子邮件:bogao@bjtu.edu.cn通讯地址:北京市海淀区上园村3号院北京交通大学计算机与信息技术学院邮编:100044EnglishVersionDr.BoGao'sHomepage:ClickHere!教育背景·博士学位,计算机工程@弗吉尼亚理工大学(VirginiaTech),美国(09/2014)博士导师:JungMin"Jerry"Park(Professor, ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-郝爽
    基本信息办公电话:电子邮件:haoshuang@bjtu.edu.cn通讯地址:九教北512邮编:教育背景2013.92018.7清华大学工学博士导师:冯建华、李国良2009.92013.6山东大学工学学士工作经历2018.7至今北京交通大学讲师2020.12021.1GeorgiaInstituteofTechnology访问欢迎对数据管理、群体智能、机器学习有兴趣的学生与我联系,共同进行数据库 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-王晶
    基本信息办公电话:电子邮件:wj@bjtu.edu.cn通讯地址:北京海淀区高梁桥斜街28号中安联合楼603邮编:100044研究兴趣本人的主要研究兴趣如下:·时间序列分析与挖掘(TimeSeriesAnalysisandMining)·机器学习及其在医疗、交通、金融大数据的应用(MachineLearninganditsApplications)·异常检测(AnomalyDetection)·脑 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-童恩栋
    基本信息办公电话:电子邮件:edtong@bjtu.edu.cn通讯地址:北京市海淀区上园村3号北京交通大学机械工程楼D305邮编:100044工作经历2013.7~2018.9,中国科学院微电子研究所,从事物联网可信服务计算工作,课题组长2018.9~至今,北京交通大学计算机与信息技术学院信息安全系,研究方向包括面向信息安全的人工智能、机器学习和数据挖掘研究方向网络安全计算机技术(专业学位)软件 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-张硕
    基本信息办公电话:电子邮件:zhangshuo@bjtu.edu.cn通讯地址:科技大厦9013邮编:教育背景张硕,博士,讲师,硕士生导师2018年6月毕业于北京航空航天大学计算机学院,获得计算机应用技术专业博士学位;2015年9月至2016年9月作为访问学生,前往美国麻省理工学院(MIT)计算机科学与人工智能实验室(CSAIL)访问一年;主要研究方向为计算机视觉;在IEEETransaction ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-陈乃月
    基本信息办公电话:电子邮件:nychen@bjtu.edu.cn通讯地址:邮编:教育背景2018年1月博士毕业于北京交通大学通信与信息系统专业工作经历研究方向信息内容安全计算机技术(专业学位)软件工程(专业学位)招生专业网络空间安全硕士电子信息硕士科研项目国家(工信部等)专项:2019年工业互联网创新发展工程工业企业侧安全数据采集设备,20192021国家重点研发计划课题:交通事故纠纷案件跨机构损 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-张淳杰
    基本信息办公电话:电子邮件:cjzhang@bjtu.edu.cn通讯地址:北京市海淀区上园村3号北京交通大学第九教学楼北630邮编:100044教育背景2020年的硕士复试分数线已出,还有最多3个硕士名额。欢迎大家积极联系。张淳杰,2011年7月毕业于中国科学院自动化所模式识别国家重点实验室,获工学博士学位。研究方向包括图像处理与理解、计算机视觉、多媒体数据处理与分析等方面。主持包括国家自然科学 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-夏佳楠
    基本信息办公电话:电子邮件:xiajn@bjtu.edu.cn通讯地址:北京市海淀区北京交通大学九教东202B邮编:100044教育背景2012/092017/07,北京交通大学,统计学,博士2008/092012/07,北京交通大学,信息与计算科学,学士工作经历2019/07至今,北京交通大学计算机与信息技术学院,讲师2017/092019/07,北京师范大学认知神经科学与学习国家重点实验室,博 ...
    本站小编 Free考研考试 2020-05-09