{"id":16334,"date":"2021-09-07T16:00:57","date_gmt":"2021-09-07T08:00:57","guid":{"rendered":"https:\/\/www.fst.um.edu.mo\/personal\/?page_id=16334"},"modified":"2026-04-09T15:18:48","modified_gmt":"2026-04-09T07:18:48","slug":"jtzhou","status":"publish","type":"page","link":"https:\/\/www.fst.um.edu.mo\/personal\/jtzhou\/","title":{"rendered":"Jiantao Zhou Homepage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16334\" class=\"elementor elementor-16334\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6711364 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6711364\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a2044ca\" data-id=\"a2044ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc7fdc0 elementor-widget elementor-widget-image\" data-id=\"fc7fdc0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"494\" src=\"https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-1024x791.jpg\" class=\"attachment-large size-large wp-image-16471\" alt=\"\" srcset=\"https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-1024x791.jpg 1024w, https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-300x232.jpg 300w, https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-768x593.jpg 768w, https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-1536x1187.jpg 1536w, https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-2048x1582.jpg 2048w, https:\/\/www.fst.um.edu.mo\/personal\/wp-content\/uploads\/2021\/09\/Jiantao_1-1-1568x1211.jpg 1568w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-5cab913\" data-id=\"5cab913\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ad716c elementor-widget elementor-widget-text-editor\" data-id=\"6ad716c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"color: #154dc4\"><span style=\"font-size: 14pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Jiantao ZHOU (\u5468\u5efa\u6fe4)<br \/><\/span><\/strong><\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000;font-size: 12pt\">Professor<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000;font-size: 12pt\">,<\/span><br \/><span style=\"font-family: 'times new roman', times, serif;color: #000000;font-size: 12pt\">Department of Computer and Information Science,<\/span><br \/><span style=\"font-family: 'times new roman', times, serif;color: #000000;font-size: 12pt\">Faculty of Science and Technology, University of Macau<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fed24d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0fed24d\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">(+853) 8822-4495<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-fax\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">(+853) 8822-2426\u200b<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mail-bulk\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">jtzhou@um.edu.mo\u200b<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-address-card\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">E11-4089, University of Macau<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6227de5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6227de5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-02b49ae\" data-id=\"02b49ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c26b6c block elementor-widget elementor-widget-text-editor\" data-id=\"4c26b6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"color: #154dc4\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Research Interests<\/span><\/strong><\/span><\/p><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li style=\"text-align: justify\"><strong><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #003300\">Trustworthy AI<\/span><\/strong><\/li><li style=\"text-align: justify\"><strong><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #003300\">Low-level Vision <br \/><\/span><\/strong><\/li><li style=\"text-align: justify\"><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif;color: #003300\"><strong><span style=\"font-size: 10pt\">Multimedia Forensics and Security<\/span><\/strong><\/span><\/li><\/ul><\/li><\/ul><p style=\"color: #154dc4;text-align: left\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Education<\/span><\/strong><\/span><\/p><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">PhD in Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China, 2005-2009<\/span><\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">Fulbright Junior Scholar in Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA, 2007-2008<\/span><\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Master in Radio Engineering, Southeast University, China, 2002-2005<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Bachelor in Electronics Engineering, Dalian University of Technology, China, 1998-2002<\/span><\/li><\/ul><\/li><\/ul><p style=\"color: #154dc4;text-align: left\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Positions and Experience<\/span><\/strong><\/span><\/p><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\"><strong>Director<\/strong>, Research Services and Knowledge Transfer Office, University of Macau, <span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2025.11-<\/span><\/span><\/span><\/span><\/li><li><span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">Interim Director, Research Services and Knowledge Transfer Office, University of Macau, <span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2024.11-2025.11<\/span><\/span><\/span><\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><strong>Professor<\/strong>, Department of Computer and Information Science, <span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">University of Macau, <span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2023.8-\u00a0<\/span><\/span><\/span><\/span><\/li><li><span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\">Department Head<span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">, Department of Computer and Information Science, <span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">University of Macau, <span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2024.7-2025.7<\/span><\/span><\/span><\/span><\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Interim Head of Centre for AI and Robotics, Institute of Collaborative Innovation, <span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\"><span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">University of Macau, <span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2019.7-2022.10<\/span><\/span><\/span><\/span><\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Associate Professor<span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\">, Department of Computer and Information Science, <span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">University of Macau, <span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2017.8-2023.8<\/span><\/span><\/span><\/span><\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Assistant Professor<span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\">, Department of Computer and Information Science, <span style=\"color: #000000;font-family: times new roman, times, serif\"><span style=\"font-size: 13.3333px\">University of Macau, <span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">2012.10-2017.8<\/span><\/span><\/span><\/span><\/span><\/li><\/ul><\/li><\/ul><p style=\"color: #154dc4;text-align: left\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Professional Activities<\/span><\/strong><\/span><\/p><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-weight: bold\">IEEE Trans. Dependable and Secure Computing<\/span> (IF: 7.3), Associate Editor, 2023-2025; <\/span><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Senior Editor, 2025-<\/span><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-weight: bold\">IEEE Trans. Multimedia<\/span> (IF: 8.182), Associate Editor, 2021-<\/span><\/li><li><span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\">APSIPA Newsletters, Editor-in-Chief, 2024-2025<\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-weight: bold\">IEEE Trans. Image Processing<\/span> (IF: 11.041), Associate Editor, 2018-2023<\/span><\/li><li><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><strong>Chair-Elect<\/strong>, IEEE CASS MSA-TC, 2024-<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><strong>TPC Co-Chair<\/strong>, Int. Conf. on Multimedia and Expo (CCF B), 2023<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><strong>General Co-Chair<\/strong>, APSIPA Annual Summit and Conference, 2024<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><strong>TPC Co-Chair<\/strong>, IEEE IFTC-16<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Chair, Track 10 (Multimedia Engineering), IEEE TENCON, 2015<\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Senior Member of IEEE, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Member of APSIPA<\/span><\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01e7f3c block elementor-widget elementor-widget-text-editor\" data-id=\"01e7f3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"color: #154dc4;text-align: left\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Alumni<\/span><\/strong><\/span><\/p><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Fengpeng Li, PhD 2025, first employment: Post-Doc Fellow, King Abdullah University of Science and Technology (KAUST), Saudi Arabia.<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Jun Liu, PhD 2025, first employment: Post-Doc Fellow, National Institute of Informatics, Japan<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Xiangyu Chen, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">PhD 2025 (Joint PhD with Prof. Chao Dong, SIAT), current employment: Research Scientist, TeleAI, China Telecom <\/span><\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Binbin Song, PhD 2024, first employment: Post-Doc Fellow, Nanyang Technological University-&gt; Associate Professor, Harbin Institute of Technology <br \/><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Haiwei Wu, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">PhD 2023, current employment: Professor, UESTC, China <\/span><\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Jiandian Zeng, PhD 2023, first employment: Assistant Professor, Beijing Normal University at Zhuhai<\/span><\/li><li><span style=\"color: #000000;font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Jinyu Tian, PhD 2021, first employment: Assistant Professor, Macau University <\/span><span style=\"font-family: 'times new roman', times, serif\">of Science and Technology<\/span><\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Jia Duan, PhD 2020, first employment: Research Scientist, JD Explore Academy<\/span><\/li><li><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Weiwei Sun, PhD 2020, first employment: Research Scientist, Alibaba Group<\/span><\/li><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-size: 10pt\">Li Dong, PhD 2019, <\/span><span style=\"font-size: 10pt\"><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">current <\/span><\/span><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-size: 10pt\">employment: Associate Professor, Ningbo University<\/span><\/li><li><span style=\"color: #000000;font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Yuanman Li, PhD 2019, first employment: Associate Professor, Shenzhen Uni<\/span><span style=\"font-family: 'times new roman', times, serif\">versity<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">Xianwei Zheng, PhD 2018, <\/span><\/span><\/span><span style=\"font-size: 10pt\"><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">current <\/span><\/span><\/span><span style=\"font-size: 10pt\"><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">employment: <\/span><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Associate <\/span><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">Professor, Foshan Uni<\/span><span style=\"font-family: 'times new roman', times, serif\">versity<\/span><\/span><\/span><\/li><li><span style=\"color: #000000;font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Wencheng Zou, Post-Doctoral Fellow 2020-2022, current employment: Professor, <\/span><span style=\"font-family: 'times new roman', times, serif\">Nanjing University of Science and Technology<\/span><\/span><\/li><li><span style=\"color: #000000;font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Yushu Zhang, Post-Doctoral Fellow 2015-2016, current employment: Professor, <\/span><span style=\"font-family: 'times new roman', times, serif\">Nanjing University of Aeronautics and Astronautics<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">Yu Zhang, Research Assistant, 2015-2016, current employment: Senior Lecturer (<\/span><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Associate <\/span><span style=\"color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">professor), Griffith University, Australia.<\/span><\/span><\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b59040f block elementor-widget elementor-widget-text-editor\" data-id=\"b59040f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 12pt\"><b><span style=\"color: #000080;font-family: 'times new roman', times, serif\">External Grants<br \/><\/span><\/b><\/span><\/p><ol><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"color: #000000;font-family: times new roman, times, serif;font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Alibaba Innovative Research Program, <strong>PI<\/strong>, \u201c\u9762\u5411\u5728\u7ebf\u793e\u4ea4\u7f51\u7edc\u4e0a\u4f20\u64ad\u7684\u56fe\u50cf\u6765\u6e90\u8bc6\u522b\u7814\u7a76\u201d, Mar. 2023 \u2013 Mar. 2024. (Total: 300K RMB)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: times new roman, times, serif\">Macau Science and Technology Development Fund (FDCT),\u00a0<\/span><span style=\"color: #000000;font-family: times new roman, times, serif\"><strong>PI<\/strong>, \u201cResearch and industrialization of key technologies for multimedia information forensics over online social networks\u201d,\u00a0FDCT\/022\/2022\/A1,\u00a0Sept. 2022-Sept. 2025.\u00a0(Total: 1.50M MOP)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Alibaba Innovative Research Program,\u00a0<\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><span style=\"font-weight: bold\">PI<\/span><\/span><span style=\"color: #000000;font-family: times new roman, times, serif\">, \u201c\u57fa\u4e8e\u8868\u5f81\u5b66\u4e60\u7684\u9ad8\u6cdb\u5316\u76f8\u673a\u6a21\u578b\u8bc6\u522b\u4e0e\u5206\u7c7b\u7814\u7a76\u201d, Dec. 2021 \u2013 Sept. 2022. (Total: 500K RMB)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: times new roman, times, serif\">FDCT-MOST Joint Program,\u00a0<\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-weight: bold\">PI<\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201c<\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Phenotype based ASD Diagnosis using Artificial Intelligence Technology<\/span><span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d,\u00a0\u00a0FDCT\/0072\/2020\/AMJ,\u00a0Oct. 2021 \u2013 Oct. 2024. (Total: 1.58M MOP)\u00a0<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Alibaba Innovative Research Program, <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201c\u6297\u5a92\u4f53\u4f20\u8f93\u7684\u9ad8\u9c81\u68d2\u4f2a\u9020\u56fe\u8c61\u68c0\u6d4b\u4e0e\u5b9a\u4f4d\u7814\u7a76\u201d, Mar. 2021 \u2013 Mar. 2022. (Total: 500K RMB) <span style=\"color: #ff0000\"><strong> \u963f\u91cc\u5df4\u5df4\u4f18\u79c0\u5b66\u672f\u5408\u4f5c\u9879\u76ee\u59562023\u00a0<\/strong><\/span><\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Natural Science Foundation of China, <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201c\u57fa\u4e8e\u72ec\u7acb\u5206\u6bb5\u540c\u5206\u5e03\u566a\u58f0\u6a21\u578b\u7684\u9c81\u68d2\u5b50\u7a7a\u95f4\u8868\u793a\u7814\u7a76\u201d, 61971476, Jan. 2020 \u2013 Dec. 2023. (Total: 650K RMB)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Macau Science and Technology Development Fund (FDCT), <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI of sub-project<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201cResearch on key technologies and platforms for collaborative intelligence driven auto-driving cars\u201d, FDCT\/0015\/2019\/AKP, 2019-2022. (Total: 12M MOP)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Macau Science and Technology Development Fund (FDCT), <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201cCross-channel Image Noise Modeling, Fast Algorithms, and Applications\u201d, FDCT\/077\/2018\/A2, 2019 \u2013 2022. (Total: 1.059M MOP).<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Macau Science and Technology Development Fund (FDCT), <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201cPrivacy-preserving deep learning and its applications in collaborative big data analytics\u201d, FDCT\/022\/2017\/A1, Aug. 2017-Aug. 2020. (Total: 1.488M MOP).<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Macau Science and Technology Development Fund (FDCT), <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201cInvestigation of passive techniques for digital image Forgery detection\u201d, FDCT\/046\/2014\/A1, Jan. 2015-Jan. 2018. UM matching grant: MRG007\/ZJT\/2015\/FST. (Total: 1.412M MOP)<\/span><\/span><\/li><li><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Natural Science Foundation of China, <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><b>PI<\/b><\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">, \u201c\u52a0\u5bc6\u57df\u56fe\u50cf\u9ad8\u6027\u80fd\u538b\u7f29\u6280\u672f\u7814\u7a76\u201d, 61402547, Jan. 2015 \u2013 Dec. 2017. (Total: 260K RMB)<\/span><\/span><\/li><li data-border-width=\"2px\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Natural Science Foundation of China, <b>Co-PI<\/b>, \u201c\u201c\u4e0d\u53ef\u5206\u201d\u4e8c\u7ef4\u53d8\u6362\u7684\u4f18\u5316\u8bbe\u8ba1\u53ca\u5176\u5728\u89c6\u9891\u7f16\u7801\u548c\u52a0\u5bc6\u4e2d\u7684\u5e94\u7528\u201d, 61370148, Jan. 2014 \u2013 Dec. 2016. (Total: 790K RMB)<\/span><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><br \/><\/span><\/li><li data-border-width=\"2px\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Macau Science and Technology Development Fund (FDCT), <b>PI<\/b>, \u201cHigh-fidelity image and video compression technology for resource-constrained mobile devices\u201d, FDCT\/009\/2013\/A1, Oct. 2013-Oct. 2016. UM matching grant: MRG021\/ZJT\/2013\/FST. (Total: 2.409M MOP)<\/span><\/li><\/ul><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-17940cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17940cf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d170dc\" data-id=\"6d170dc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a5c582 block elementor-widget elementor-widget-text-editor\" data-id=\"4a5c582\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Journal Papers<\/span><\/strong><\/span><\/p><ol><li style=\"list-style-type: none\"><ol><li style=\"color: #000000;font-family: 'times new roman', times, serif\"><span style=\"font-size: 10pt\">H. Miao, Y. F. Guo, L. Y. Zhang, J. T. Zhou, and Y. H. Wang, \u201cA Multi-Grained Parallel Spatio-Temporal Learning Architecture for Deepfake Video Detection\u201d, Accepted in <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif\"><span style=\"font-size: 10pt\">X. Y. Yang, Y. M. Li, B. Li, Y. S. Li, J. T. Zhou, and X. Li, \u201cFast and Effective Video Inpainting via Implicit Motion-Guided Propagation and Sparse Attention\u201d,\u00a0<b><i><span style=\"font-style: normal;font-weight: 400\">Accepted in\u00a0<\/span>IEEE Trans. Circuits and Systems for Video Technology (T-CSVT),<\/i><\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif\"><span style=\"font-size: 10pt\">H. Q. Peng, Y. H. Wang, H. Miao, J. T. Zhou, and Y. F. Guo, \u201cContinual Adversarial Example Detection via Incremental Attack Configuration within a Knowledge Distillation Framework\u201d,\u00a0<i><span style=\"font-style: normal\">Accepted in\u00a0<\/span>IEEE Signal Processing Letters,<\/i> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">X. Y. Chen, X. T. Wang, W. L. Zhang, X. T. Kong, Y. Qiao, J. T. Zhou, and C. Dong, \u201cHAT: Hybrid Attention Transformer for Image Restoration\u201d,\u00a0<b><i>IEEE Trans. on Pattern Analysis and Machine Intelligence (T-PAMI)<\/i><\/b>,\u00a0<\/span><\/span><span style=\"font-size: 13.3333px\">vol. 48, pp. 2676-2694, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">H. W. Wu, J. T. Zhou, and S. L. Zhang, \u201cGeneralizable Synthetic Image Detection via Language-guided Contrastive Learning\u201d,\u00a0<b><i><span style=\"font-style: normal;font-weight: 400\">Accepted in\u00a0<\/span>IEEE Trans. on Artificial Intelligence (T-AI)<\/i><\/b>, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. S. Zhao, G. P. Zhu, J. T. Zhou, X. L. Li, H. L. Zhang and X. P. Zhang, \u201cCL-DRW: Curriculum Learning-Based Deep Robust Watermarking for Social Networks\u201d,\u00a0<b><i><span style=\"font-style: normal;font-weight: 400\">Accepted in\u00a0<\/span>IEEE Trans. Circuits and Systems for Video Technology (T-CSVT)<\/i><\/b>, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\"><span style=\"font-size: 13.3333px\">W. D. Chen, Z. Y. Zha, S. G. Wang, L. Ali, B. H. Wen, X. Yuan, J. T. Zhou, and C. Zhu, \u201cTexture-Consistent 3D Scene Style Transfer via Transformer-Guided Neural Radiance Fields\u201d, <i><b>IEEE Trans. on Image Processing (T-IP)<\/b><\/i>, vol. 34, pp. 7193-7208, 2025.<\/span><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">R. J. Yang, Y. F. Guo, R. K. Wang, J. T. Zhou, and Y. H. Wang, \u201cA Perceptual Distortion Reduction Framework: Towards Generating Adversarial Examples with High Perceptual Quality and Attack Success Rate\u201d, <i><b>IEEE Trans. Dependable and Secure Computing (T-DSC)<\/b><\/i>, vol. 23, pp. 622 &#8211; 636, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">J. L. Chen, L. Dong, W. Wang, R. D. Wang, W. W. Sun, Y. S. Zhang, and J. T. Zhou, \u201cMixed-Bit Sampling Watermarking: Towards Unifying Stochastic Anti-Counterfeiting and Authentication in Copy-Sensitive Graphical Code\u201d, <b style=\"font-style: italic\">IEEE Trans. Information Forensics and Security (T-IFS)<\/b>, vol. 20, pp. 10620 &#8211; 10635, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">S. C. Xie, T. Qiao, S. Li, X. P. Zhang, J. T. Zhou, and G. R. Feng, \u201cDeepfake Detection in the AIGC Era: A Survey, Benchmarks, and Future Perspectives\u201d, Information Fusion,\u00a0<\/span><\/span><span style=\"font-size: 13.3333px\">vol. 127, pp. 103740, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">B. X. Lai, W. K. Su, Y. Y. Liang, Y. G. Wang, M. J. Li, and J. T. Zhou, \u201cEnhancing Cross-domain Correspondence for Unsupervised Image-to-Image Translation\u201d, Accepted in <i><b>IEEE Trans. Multimedia (T-MM)<\/b><\/i><\/span><\/span><span style=\"font-size: 10pt\">,\u00a0<\/span><span style=\"font-size: 13.3333px\">2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">F. P. Li, K. M. Li, Q. Z. Wang, B. Han. J. Y. Tian, and J. T. Zhou, &#8220;RML++: Regroup Median Loss for Combating Label Noise&#8221;,\u00a0\u00a0<em><strong>International Journal of Computer Vision (IJCV)<\/strong><\/em>,\u00a0<\/span><\/span><span style=\"font-size: 13.3333px\">vol. 133, pp. 6400-6421, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">F. P. Li, K. M. Li, H. W.. Wu, J. Y. Tian, and J. T. Zhou, \u201cToward Robust Learning via Core Feature-aware Adversarial Training\u201d, <strong><em>\u00a0IEEE Trans. Information Forensics and Security (T-IFS)<\/em><\/strong>,\u00a0<\/span><\/span><span style=\"font-size: 13.3333px\">vol. 20, pp. 6236-6251, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">B, B. Song, J. T. Zhou, X. Y. Chen, and S. N. Xu, &#8220;Modeling Scattering Effect for Under-Display Camera Image Restoration&#8221;,\u00a0\u00a0<em><strong>International Journal of Computer Vision (IJCV)<\/strong><\/em>, vol. 133, pp. 6088-6107, 2025.<br \/><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">H. W. Wu, Y. M. Chen, J. T. Zhou, and Y. M. Li, \u201c Rethinking Image Forgery Detection via Soft Contrastive Learning and Unsupervised Clustering\u201d,\u00a0\u00a0<\/span><\/span><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-weight: bold\"><i>IEEE Trans. on Dependable and Secure Computing (T-DSC)<\/i><\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">,\u00a0<\/span><\/span><span style=\"font-size: 13.3333px\">vol. 22, pp. 6296-6308, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">K. H. Wong, J. C. Zhou, K. M. Li, Y. W. Si, X. W. Wu, J. T. Zhou, \u201cFontGuard: A Robust Font Watermarking Approach Leveraging Deep Font Knowledge\u201d, <em><strong>IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em>, vol. 27, pp. 7876-7890, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">X.\u00a0<\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. Chen, Z. Y. Li, Z. W. Zhang, J. S. Ren, Y. H. Liu, J. W. He, Y. Qiao, J. T. Zhou, C. Dong, \u201cTowards Efficient SDRTV-to-HDRTV by Learning from Image Formation\u201d, <em><strong>IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em>, vol. 27, pp. 8340-8354, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">R. J. Yang, Y. F. Guo, J. F. Wang, J. T. Zhou, Y. H. Wang, &#8220;Common knowledge learning for generating transferable adversarial examples&#8221;, <em>Frontiers of Computer Science<\/em>, vol. 19, no. 10, 1910359, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">R. Liang, Y. M. Li, Y. Yi, J. T. Zhou, X. Li, \u201cA memory-augmented multi-task collaborative framework for unsupervised traffic anomaly detection in driving videos\u201d, <em>Pattern Recognition<\/em>, vol. 168, 111789, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. M. Li, Y. J. He, C. S. Chen, L. Dong, B. Li, J. T. Zhou, and X. Li, &#8220;Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning&#8221;, <strong><em>IEEE Trans. Image Processing <i>(T-IP)<\/i><\/em><\/strong>, vol. 34, pp. 425-440, 2024.<br \/><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. J. Chen, X. W. Zheng, Z. L. Yang, X. T. Li, J. T. Zhou, and Y. M. Li &#8220;DuPMAM: An Efficient Dual Perception Framework Equipped with a Sharp Testing Strategy for Point Cloud Analysis&#8221;, <em><strong>IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em>, vol. 27, pp. 1760-1771,\u00a02024.<br \/><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\"><span style=\"font-size: 10pt\">R. Q. Liang, Y.M. Li, J. T. Zhou, and X. Li,\u201cText-Driven Traffic Anomaly De<\/span>tection with Temporal High-Frequency Modeling in Driving Videos\u201d, <\/span><span style=\"font-family: 'times new roman', times, serif\"><strong><em>IEEE Trans. Circuits and Systems for Video Technology\u00a0<i>(T-CSVT)<\/i><\/em><\/strong>,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">vol. 9, pp. 8864-8697, 2024<\/span><span style=\"font-family: 'times new roman', times, serif\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">H. W. Wu, J. T. Zhou, X. Y. Zhang, J. Y. Tian, and W. W. Sun, \u201cRobust Camera Model Identification over Online Social Network Shared Images via Multi-Scenario Learning\u201d, <span style=\"font-weight: bolder\"><em>IEEE Trans. Information Forensics and Security (T-IFS)<\/em><span style=\"font-weight: var( --e-global-typography-text-font-weight )\">, <\/span><\/span><\/span><span style=\"font-family: 'times new roman', times, serif\">vol. 19, pp. 148-162, 2024.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\">W. C. Zou and J. T. Zhou, \u201cA Novel Neural-Network-Based Consensus Protocol of Nonlinear Multiagent Systems\u201d, <strong><em>IEEE Trans. Automatic Control (T-AC)<\/em><\/strong><span style=\"font-weight: var( --e-global-typography-text-font-weight )\">, <\/span><span style=\"font-family: 'times new roman', times, serif\">vol. 69, no. 3, pp. 1713-1720, 2024.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">W. J. Li, J. C. Li, G. W. Gao, W. H. Deng, J. T. Zhou, J. Yang, and G. J. Qi, \u201cCross-receptive Focused Inference Network for Lightweight Image Super-Resolution<span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d<\/span>, <span style=\"font-family: 'times new roman', times, serif\"><em><strong>IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em><\/span>, vol. 26, pp. 864-877, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li, J. X. You, J. T. Zhou, W. Wang, X. Liao, and X. Li, \u201cImage Operation Chain Detection with Machine Translation Framework<span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d<\/span>, <span style=\"font-family: 'times new roman', times, serif\"><em><strong>IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em><\/span>,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 25, pp. 6852-6867, 2024<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y.M. Li, L. P., Hu, L. Dong, H. W. Wu, J. Y. Tian, J. T. Zhou, and X. Li,\u201cTransformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training\u201d, <strong><em>IEEE Trans. Circuits and Systems for Video Technology\u00a0<i>(T-CSVT)<\/i><\/em><\/strong>,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">vol. 34, no. 3, pp. 1857-1872, 2024<\/span><span style=\"font-family: 'times new roman', times, serif\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">J. Liu, J. T. Zhou, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">J. Y. Tian<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">, and W. W. Sun, \u201cRecoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 20, no. 7, Article 216, 2024.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Z.Y. Zha, B. H. Wen, X. Yuan, J. C. Zhang, J. T. Zhou, X. D. Jiang, and C. Zhu, \u201cMultiple Complementary Priors for Multispectral Image Compressive Sensing Reconstruction\u201d, <em><strong>IEEE Trans. Cybernetics<\/strong><\/em>, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 54, no. 5, pp. 3338-3351, 2024<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">G.Y.M. Fu, F. C. Xiong, J. F. Lu, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">J. Zhou, <\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou, and Y. T. Qian, \u201cHyperspectral Image Denoising via Spatial\u2013Spectral Recurrent Transformer<span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d<\/span>, <span style=\"font-family: 'times new roman', times, serif\"><em><strong>IEEE Trans. Geoscience and Remote Sensing (T-GRS)<\/strong><\/em>, <\/span><\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 62, pp. 5511214, 2024<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y.M. Li, C. Xie, R. Q. Liang, J. Du, J. T. Zhou, and X. Li, \u201cA Synchronous Bi-Directional Framework With Temporally Dependent Interaction Modeling for Pedestrian Trajectory Prediction\u201d, <b><i>IEEE Trans. on Network Science and Engineering (T-NSE)<\/i><\/b>, vol. 11, no. 1, pp.793-806, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">S. N. Xu, X. Y. Chen, B B. Song, C. S. Huang, and J. T. Zhou, \u201cCNN Injected transformer for image exposure correction\u201d, <i>Neurocomputing<\/i>, vol. 587, pp. 127688, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">\u00a0Z. Y. Zha, B. H. Wen, X. Yuan, J. C. Zhang, J. T. Zhou, and C. Zhu, \u201cStructured residual sparsity for video compressive sensing reconstruction\u201d, <i>Signal Processing<\/i>, vol. 222, pp. 109513, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. Liu, J. T. Zhou, H. W. Wu, W. W. Sun, and J. Y. Tian, \u201cGenerating Robust Adversarial Examples against Online Social Networks (OSNs)\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 20, no. 4, Article 98, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\">R. Q. Liang, Y. M. Li, J. T. Zhou, and X. Li, \u201cSTGlow: A Flow-Based Generative Framework With Dual-Graphormer for Pedestrian Trajectory Prediction\u201d, Accepted in <b><i>IEEE Trans. on Neural Networks and Learning Systems (T-NNLS)<\/i><\/b>, 2023.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: times new roman, times, serif\">J. D. Zeng, J. T. Zhou, and T. Y. Liu, \u201cRobust Multimodal Sentiment Analysis via Tag Encoding of Uncertain Missing Modalities\u201d,<em><strong> IEEE Trans. Multimedia <b>(T-MM)<\/b><\/strong><\/em>,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 25, pp. 6301-6314, 2023<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\">Z. Y. Zha, B. H. Wen, X. Yuan, J. T. Zhou, C. Zhu, and A. Kot, \u201cLow-Rankness Guided Group Sparse Representation for Image Restoration\u201d, <b><i>IEEE Trans. on Neural Networks and Learning Systems (T-NNLS)<\/i><\/b>, <span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 34, no. 10, pp. 7593-7607, 2023<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">F. C. Xiong, J. T. Zhou, J. Zhou, J. F. Liu, and Y. T. Qian, \u201cMultitask Sparse Representation Model-Inspired Network for Hyperspectral Image Denoising<span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d<\/span>, <span style=\"font-family: 'times new roman', times, serif\"><em><strong>IEEE Trans. Geoscience and Remote Sensing (T-GRS)<\/strong><\/em>, <\/span><\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 61, pp. 5518515, 2023<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, B. H. Wen, X. Yuan, J. C. Zhang, J. T. Zhou, Y. L. Lu, and C. Zhu, \u201cNonlocal Structured Sparsity Regularization Modeling for Hyperspectral Image Denoising<span style=\"color: #000000;font-family: times new roman, times, serif\">\u201d<\/span>, <span style=\"font-family: 'times new roman', times, serif\"><em><strong>IEEE Trans. Geoscience and Remote Sensing (T-GRS)<\/strong><\/em>,\u00a0<\/span><\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\">vol. 61, pp. 5510316, 2023<\/span><span style=\"font-family: 'times new roman', times, serif;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">.<\/span><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">S. R. Qi, Y. S. Zhang, C. Wang, J. T. Zhou, and X. C. Cao, \u201cA Principled Design of Image Representation: Towards Forensic Tasks\u201d, <em><strong>IEEE Transactions on Pattern Analysis and Machine Intelligence <b>(T-PAMI)<\/b><\/strong><\/em>, vol. 45, no. 5, pp. 5337-5354, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\">J. D. Zeng, J. T. Zhou, and C. S. Huang, <span style=\"font-family: 'times new roman', times, serif\">\u201cExploring Semantic Relations for Social Media Sentiment Analysis\u201d, <strong><em>IEEE\/ACM Trans. Audio, Speech, and Language Processing (T-ASLP)<\/em><\/strong>, vol. 31, pp. 2382-2394, 2023. <\/span>\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">B. B. Song, J. T. Zhou, X. Y. Chen, and S. L. Zhang, \u201cReal-Scene Reflection Removal with RAW-RGB Image Pairs\u201d, <strong><em>IEEE Trans. Circuits and Systems for Video Technology\u00a0<i>(T-CSVT)<\/i><\/em><\/strong>, vol. 33, no. 8, pp. 3759-3773, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. C. Zhu, X. K. Min, D. D. Zhu, G. T. Zhai, X. K. Yang, W. J. Zhang, K. Gu, and J. T. Zhou, \u201cToward Visual Behavior and Attention Understanding for Augmented 360 Degree Videos&#8221;, <em><strong>ACM Trans. Multimedia Computing, Communications, and Applications<\/strong><\/em>, vol. 19, no. 2s, pp. 99:1-24, 2023.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. Y. Tian, J. T. Zhou, and J. Duan, \u201cHierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption\u201d, <b><i>IEEE Trans. on Services Computing (T-SC)<\/i><\/b>, vol. 16, no. 1-2, pp. 343-355, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">W. C. Zou, J. T. Zhou, Y. L. Yang, and Z. R. Xiang, \u201cFully Distributed Optimal Consensus for A Class of Second-Order Nonlinear Multiagent Systems with Switching Topologies\u201d, <strong><em>IEEE Systems Journal<\/em><\/strong>, vol. 17, no. 1, pp. 1548-1558, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, B. H. Wen, X. Yuan, S. Ravishankar, J. T. Zhou, and C. Zhu, \u201cLearning Nonlocal Sparse and Low-Rank Models for Image Compressive Sensing&#8221;, <em><strong>IEEE Signal Processing Magazine<\/strong><\/em>, vol. 40, pp. 32-44, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">M. Cheung, W. W. Sun, J. She, and J. T. Zhou, \u201cSocial Network Analytic-based Online Counterfeit Seller Detection using User Shared Images\u201d, <strong><em>ACM Trans. Multimedia Computing, Communications, and Applications<\/em><\/strong>, vol. 19, pp. 1-18, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">J. H. Hou, Z. Y. Zhu, J. H. Hou, H. Q. Zeng, J. J. Wu, and J. T. Zhou, \u201cDeep Posterior Distribution-based Embedding for Hyperspectral Image Superresolution\u201d, <strong><em>IEEE Trans. Image Processing (T-IP)<\/em><\/strong>, vol. 31, pp. 5720-5732, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-size: 10pt\">B. B. Song, J. T. Zhou, and H. W. Wu, \u201cMulti-stage Curvature-guided Network for Progressive Single Image Reflection Removal\u201d, <strong><em>IEEE Trans. Circuits and Systems for Video Technology <span style=\"font-weight: bold\"><i>(T-CSVT)<\/i><\/span><\/em><\/strong>, <span style=\"font-family: 'times new roman', times, serif\">vol. 32, pp. 6515-6529, <\/span>2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">Y. M. Li, J. T. Zhou, J. Y. Chen, J. Y. Tian, L. Dong and X. Li, \u201cRobust Matrix Factorization via Minimum Weighted Error Entropy Criterion\u201d, <em><strong><b style=\"font-style: italic\">IEEE Transactions on Computational Social Systems (T-CSS)<\/b><\/strong><\/em>, vol. 9, pp. 1830-1841, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">Y. C. Su, J. Du, Y. M. Li, X. Li, Z. Y. Hua and J. T Zhou, \u201cTrajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network\u201d, <b><i>IEEE Transactions on Intelligent Transportation Systems (T-ITS)<\/i><\/b>, vol. 23, pp. 16773-16785, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li, J. T. Zhou, J. Y. Tian, X. W. Zheng, and Y. Y. Tang, \u201cWeighted Error Entropy-Based Information Theoretic Learning for Robust Subspace Representation\u201d, <b><i>IEEE Trans. on Neural Networks and Learning Systems (T-NNLS)<\/i><\/b>, vol. 33, pp. 4228-4242, 2022.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, B. H. Wen, X. Yuan, J. T. Zhou, C. Zhu, and A. Kot, \u201cA Hybrid Structural Sparsification Error Model for Image Restoration\u201d, <b><i>IEEE Trans. on Neural Networks and Learning Systems (T-NNLS)<\/i><\/b>, vol. 33, pp. 4451-4465, 2022.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">F. C. Xiong, J. Zhou, S. Y. Tao, J. F. Lu, J. T. Zhou and Y. T. Qian, \u201cSMDSNet: Model Guided Spectral-Spatial Network for Hyperspectral Image Denoising\u201d, <strong><em>IEEE Trans. Image Processing (T-IP)<\/em><\/strong>, vol. 31, pp. 5469-5483, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">H. W. Wu, J. T. Zhou, and Y. M. Li, \u201cDeep Generative Model for Image Inpainting with Local Binary Pattern Learning and Spatial Attention\u201d, <b style=\"font-style: italic\">IEEE Trans. on Multimedia (T-MM)<\/b>, vol. 24, pp. 4016-4027, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, and Xiaochun Cao, \u201cA survey of orthogonal moments for image representation: Theory, implementation, and evaluation\u201d, <b><i>ACM Computing Surveys (CSUR)<\/i><\/b>, vol. 55, no. 1, Article 1, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">H. W. Wu, J. T. Zhou, J. Y. Tian, J. Liu, and Y. Qiao, \u201cRobust Image Forgery Detection against Transmission over Online Social Networks\u201d, <strong><em>IEEE Trans. Information Forensics and Security<\/em><\/strong>, vol. 17, pp. 443-456, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">H. Wu and J. Zhou, &#8220;IID-Net: Image Inpainting Detection Network via Neural Architecture Search and Attention,&#8221;\u00a0<span style=\"font-weight: bold\"><i>IEEE Trans. on Circuits and Systems for Video Technology (T-CSVT)<\/i><\/span>, vol. 32, no. 3, pp. 1172-1185, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">J. D. Zeng, T. Y. Liu, W. J. Jia, and J. T. Zhou, \u201cRelation construction for aspect-level sentiment classification\u201d, <i>Information Sciences<\/i>, vol. 586, pp. 209-223, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">J. Duan, J. T. Zhou, Y. M. Li, and C. S. Huang, \u201cPrivacy-preserving and verifiable deep learning inference based on secret sharing\u201d, <i>Neurocomputing<\/i>, vol. 483, pp. 221-234, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li, R. Q. Liang, W. Wei, W. Wang, J. T. Zhou, and X. Li, \u201cTemporal Pyramid Network with Spatial-Temporal Attention for Pedestrian Trajectory Prediction\u201d, <b><i>IEEE Trans. on Network Science and Engineering (T-NSE)<\/i><\/b>, vol. 9, no. 3, pp.1006-1019, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. H. Zhang, X. K. Min, Y. C. Zhu,\u00a0 G. T. Zhai, J. T. Zhou, X. K. Yang, and W. J. Zhang, \u201cHazDesNet: An End-to-End Network for Haze Density Prediction\u201d,\u00a0 <b><i>IEEE Trans. on Intelligent Transportation Systems (T-ITS)<\/i><\/b>, vol. 23, pp. 3087-3102, 2022.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">G. T. Zhai, W. Sun, X. K. Min, and J. T. Zhou, \u201cPerceptual Quality Assessment of Low-light Image Enhancement\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 17, no. 4, Article 130, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">H. W. Wu and J. T. Zhou, \u201cPrivacy Leakage of SIFT Features via Deep Generative Model based Image Reconstruction\u201d,\u00a0<span style=\"font-weight: bold\"><i>IEEE Trans. on Information Forensics &amp; Security (T-IFS)<\/i><\/span>, vol. 16, pp. 2973-2985, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">W. W. Sun, J. T. Zhou, Y. M. Li, M. Cheng, and J. She, \u201cRobust High-Capacity Watermarking Over Online Social Network Shared Images\u201d,\u00a0<span style=\"font-weight: bold\"><i>IEEE Trans. on Circuits and Systems for Video Technology (T-CSVT)<\/i><\/span>, vol. 31, no. 3, pp. 1208-1221, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zhu, J. H. Hou, J. Chen, H. Q. Zeng, and J. T. Zhou, \u201cHyperspectral Image Super-Resolution via Deep Progressive Zero-Centric Residual Learning\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 30, pp. 1423-1438, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Zha, B. Wen, X. Yuan, J. T. Zhou, J. Zhou and C. Zhu, &#8220;Triply Complementary Priors for Image Restoration,&#8221; <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 30, pp. 5819-5834, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">W. W. Sun, J. T. Zhou, L. Dong, J. Y. Tian and J. Liu, &#8220;Optimal Pre-Filtering for Improving Facebook Shared Images,&#8221; <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 30, pp. 6292-6306, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. Duan, J. T. Zhou, and Y. M. Li, \u201cSecure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF)\u201d, <b><i>IEEE Trans. on Services Computing (T-SC)<\/i><\/b>, vol. 14, no. 6, pp. 1940-1953, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. C. Zhu, G. T. Zhai, X. K. Min, and J. T. Zhou, \u201cLearning a Deep Agent to Predict Head Movement in 360-Degree Images\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 16, no. 4, Article 130, pp. 1-23, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. F. Zheng, H. Y. Duan, X. T. Tang, C. Wang, and J. T. Zhou, \u201cDenoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising\u201d, <span style=\"font-weight: bold\"><i>IEEE Trans. on Dependable and Secure Computing (T-DSC)<\/i><\/span>, vol. 18, no. 3, pp. 1267-1275, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, J. T. Zhou, Y. Xiang, Y. Zhang, F. Chen, S. N. Pang, and X. F. Liao, \u201cComputation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds,\u201d <b><i>IEEE Trans. on Big Data (T-BD)<\/i><\/b>, vol. 7, no. 4, pp. 717-728, 2021.\u00a0\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. W. Zheng, C. M. Zou, L. Dong, and J. T. Zhou, \u201cMulti-windowed vertex-frequency analysis for signals on undirected graphs\u201d, <i>Computer Communications<\/i>, vol. 172, pp. 35-44, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. D. Zeng, T. Y. Liu, W. J. Jia, J. T. Zhou, \u201cFine-grained Question-Answer sentiment classification with hierarchical graph attention network\u201d,\u00a0<i>Neurocomputing<\/i>, vol. 457, pp. 214-224, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, X. Yuan, J. T. Zhou, C. Zhu, and B. H. Wen, \u201cImage Restoration via Simultaneous Nonlocal Self-Similarity Priors\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 8561-8576, 2020.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, X. Yuan, B. H. Wen, J. T. Zhou, and C. Zhu, \u201cGroup Sparsity Residual Constraint With Non-Local Priors for Image Restoration\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 8960-8975, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. K. Min, G. T. Zhai, J. T. Zhou, M.C. Q. Farias, and A.C. Bovik, \u201cStudy of Subjective and Objective Quality Assessment of Audio-Visual Signals\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 29, pp. 6054-6068, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, X. Yuan, B. H. Wen, J. C. Zhang, J. T. Zhou, and C. Zhu, \u201cImage Restoration Using Joint Patch-Group Based Sparse Representation\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 7735-7750, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">S.Y. Zhu, Z.Y. He, X.D. Meng, J.T. Zhou, Y.F. Guo, and B. Zeng, \u201cA New Polyphase Down-Sampling-Based Multiple Description Image Coding\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 5596-5611, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, X. Yuan, B. H. Wen, J. T. Zhou, J. C. Zhang, and C. Zhu, \u201cFrom Rank Estimation to Rank Approximation: Rank Residual Constraint for Image Restoration\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 3254-3269, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. Y. Zha, X. Yuan, B. H. Wen, J. T. Zhou, J. C. Zhang, and C. Zhu, \u201cA Benchmark for Sparse Coding: When Group Sparsity Meets Rank Minimization\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b> , vol. 29, pp. 5094-5109, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. C. Zhu, G. T. Zhai, X. K. Min, and J. T. Zhou \u201cThe Prediction of Saliency Map for Head and Eye Movements in 360 Degree Images\u201d, <b><i>IEEE Trans. on Multimedia (T-MM)<\/i><\/b>, vol. 22, no. 9, pp. 2331-2344, 2020.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">L. Dong, J. T. Zhou, D. Q. Yan, and R. D. Wang, \u201cFirst Steps Toward Concealing the Traces Left by Reversible Image Data Hiding\u201d, <b><i>IEEE Trans. on Circuits and Systems II: Express Briefs (T-CASII)<\/i><\/b>, vol. 67, no. 5, pp. 951-955, 2020.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. Duan, J. T. Zhou, and Y. M. Li, \u201cPrivacy-Preserving distributed deep learning based on secret sharing\u201d, Information Sciences, vol. 527, pp. 108-127, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. K. Min, J. T. Zhou, G. T. Zhai, P. L. Callet, X. K. Yang, X. P. Guan, \u201cA Metric for Light Field Reconstruction, Compression, and Display Quality Evaluation\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 29, pp. 3790-3804, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. K. Min, G. T. Zhai, J. T. Zhou, X. P. Zhang, X. K. Yang, X. P. Guan, \u201cA Multimodal Saliency Model for Videos With High Audio-Visual Correspondence\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 29, pp. 3805-3819, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">L. Dong, J. T. Zhou, and Y. Y. Tang, \u201cContent-Adaptive Noise Estimation for Color Images with Cross-Channel Noise Modeling\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 28, no. 8, pp. 4161-4176, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li and J. T. Zhou, \u201cFast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 14, no. 5, pp. 1307-1322, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">M. Cheung, J. She, W.W. Sun, and J. T. Zhou, \u201cDetecting Online Counterfeit-goods Seller using Connection Discovery\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 15, no. 2, 35:1-35:16, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. W. Zheng, Y. Y. Tang, and J. T. Zhou, \u201cA Framework of Adaptive Multiscale Wavelet Decomposition for Signals on Undirected Graphs\u201d, <b><i>IEEE Trans. on Signal Proc. (T-SP)<\/i><\/b>, vol. 67, no. 7, pp. 1696-1711, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. K. Min, G. T. Zhai, K. Gu, Y. C. Zhu, J. T. Zhou, G. D. Guo, X. K. Yang, X. P. Guan, W. J. Zhang, \u201cQuality Evaluation of Image Dehazing Methods Using Synthetic Hazy Images\u201d, <b><i>IEEE Trans. on Multimedia (T-MM)<\/i><\/b>, vol. 21, no. 9, pp. 2319-2333, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, Y. Xiang, Y. Zhang, L.X. Yang, J. T. Zhou, \u201cEfficiently and securely outsourcing compressed sensing reconstruction to a cloud\u201d, <i>Inf. Sci.,<\/i> vol. 496, pp. 150-160, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">S. Y. Zhu, Z. Y. He, C. Chen, S. C. Liu, J. T. Zhou, Y. F. Guo, and B. Zeng, \u201cHigh-Quality Color Image Compression by Quantization Crossing Color Spaces\u201d, <b><i>IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT)<\/i><\/b>, vol. 29, no. 5, pp.1474-1487, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. W. Zheng, Y. Y. Tang, J. T. Zhou, J. J. Pan, S. Z. Yang, Y. F. Li, and P. Wang, \u201cMulti-level Downsampling of Graph Signals via Improved Maximum Spanning Trees\u201d, <i>Int. J. of Pattern Recognition and Artificial Intelligence<\/i>, vol. 33, no. 3, pp. 1958005, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">L. Dong, J. T. Zhou, and Y. Y. Tang, \u201cEffective and Fast Estimation for Image Sensor Noise via Constrained Weighted Least Squares\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 27, no. 6, pp. 2715-2730, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">W. W. Sun, J. T. Zhou, S. Y. Zhu, and Y. Y. Tang, \u201cRobust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)\u201d, <b><i>ACM Trans. on Multimedia Computing, Communications, and Applications (TOMM)<\/i><\/b>, vol. 14, no. 1, pp. 14:1-14:22, 2018. [codes]<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">S. Y. Zhu, Z. Y. He, X. D. Meng, J. T. Zhou, and B. Zeng, \u201cCompression-Dependent Transform-Domain Downward Conversion for Block-Based Image Coding\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 27, no. 6, pp. 2635-2649, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. Zhang, Y. S. Liu, C. Wang, J. T. Zhou, Y. S. Zhang, G. R. Chen, \u201cImproved known-plaintext attack to permutation-only multimedia ciphers\u201d, <i>Information Sciences<\/i>, vol. 430, pp. 228-239, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">L. Dong, J. T. Zhou, and Y. Y. Tang, \u201cNoise Level Estimation for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 26, no. 2, pp. 1017-1039, 2017.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li, J. T. Zhou, and A. Cheng, \u201cSIFT Keypoint Removal via Directed Graph Construction for Color Images\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 12, no. 12, pp. 2971-2985, 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. F. Zheng, H. L. Cui, C. Wang, and J. T. Zhou, \u201cPrivacy-Preserving Image Denoising from External Cloud Databases\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 12, no. 6, pp. 1285-1298, 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. M. Liu, D. M. Zhai, J. T. Zhou, S. Q. Wang, D. B. Zhao, and H.J. Gao, \u201cSparsity-based Image Error Concealment via Adaptive Dual Dictionary Learning and Regularization\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 26, no. 2, pp. 782-796, 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li, J. T. Zhou, A. Cheng, X. M. Liu, and Y. Y. Tang, \u201cSIFT Keypoint Removal and Injection via Convex Relaxation\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 11, no. 8, pp. 1722-1735, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou, W. W. Sun, L. Dong, X. M. Liu, O. C. Au, and Y. Y. Tang, \u201cSecure Reversible Image Data Hiding over Encrypted Domain via Key Modulation\u201d, <b><i>IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT)<\/i><\/b>, vol. 26, no. 3, pp. 441-452, 2016. [codes]<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. W. Zheng, Y. Y. Tang, J. J. Pan, and J. T. Zhou, \u201cAdaptive Multiscale Decomposition of Graph Signals\u201d, <b><i>IEEE Signal Processing Letters (SPL)<\/i><\/b>, vol. 23, no. 10, pp. 1389-1393, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. Zhang, K.W Wong, Y.S. Zhang, and J. T. Zhou, \u201cBi-level protected compressive sampling,\u201d <b><i>IEEE Trans. on Multimedia (T-MM)<\/i><\/b>, vol. 18, no. 9, pp. 1720-1732, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Z. P. Gao, G. T. Zhai, and J. T. Zhou, \u201cFactorization Algorithms for Temporal Psychovisual Modulation Display\u201d, <b><i>IEEE Trans. on Multimedia (T-MM)<\/i><\/b>, vol. 18, no. 4, pp. 614-626, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. M. Liu, D. M. Zhai, J. T. Zhou, D. B. Zhao, and W. Gao, \u201cCompressive Sampling based Image Coding for Resource-deficient Visual Communication\u201d, <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, vol. 25, no. 6, pp. 2844-2855, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. M. Liu, X. L. Wu, J. T. Zhou, and D. B. Zhao, \u201cData-driven soft decoding of compressed images in dual transform-pixel domain\u201d, <b><i>IEEE Trans. on Image Processing. (T-IP)<\/i><\/b>, vol. 25, no. 4, pp. 1649-1659, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">A. M. Zheng, Y. Yuan, J. T. Zhou, Y. F. Guo, H. T. Yang, and O. C. Au, \u201cAdaptive block coding order for Intra prediction in HEVC\u201d, <b><i>IEEE Trans. on Circuits and Syst. for Video Technology (T-CSVT)<\/i><\/b>, vol. 26, no. 11, pp. 2152-2158, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, Y. Zhang, J. T. Zhou, L.C. Liu, F. Chen, and X. He, \u201cA Review of Compressive Sensing in Information Security Field\u201d, <i>IEEE Access<\/i>, vol. 4, pp. 2507\u20132519, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. H. Wang, L. J. Chen, J. T. Zhou, W. K. Ng, R. Schober, and and C. M. Zhao, \u201cDistributed User-Centric Scheduling for Visible Light Communication Networks\u201d, <i>Optics Express<\/i>, vol. 24, no. 4, pp. 15570-15589, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, J. T. Zhou, F. Chen, Y. Zhang, D. Xiao, B. Chen, and X. Liao, \u201cA Block compressible Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions\u201d, <i>Int. J. of Bifurcation and Chaos (IJBC)<\/i>, vol. 26, no. 11, pp. 1650191, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y.S. Zhang, J. T. Zhou, F. Chen, Y. Zhang, K.W Wong, X. He, and D. Xiao, \u201cEmbedding Cryptographic Features in Compressive Sensing,\u201d <i>Neurocomputing<\/i>, vol. 40, no. 12, pp. 472-480, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. F. Guo, O. C. Au, J. T. Zhou, K. T. Tang and X. P. Fan, \u201cHalftone image watermarking via optimization\u201d, <i>Sig. Proc.: Image Comm.<\/i>, vol. 41, pp. 85-100, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, D. Xiao, K. W. Wong, J. T. Zhou, S. Bai, and M.T. Su, \u201cPerturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization\u201d, <i>Security and Comm. Networks<\/i>, vol. 9, no. 1, pp.43-53, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. M. Li and J. T. Zhou, \u201cAnti-Forensics of Lossy Predictive Image Compression\u201d, <i><b>IEEE Signal Processing Letters (SPL)<\/b><\/i>, vol. 22, no. 12, pp. 2219-2223, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">Y. S. Zhang, K. W. Wong, Y. Zhang, W.Y. Wen, J. T. Zhou, and X. He, \u201cRobust coding of encrypted images via structural matrix\u201d, <i>Sig. Proc.: Image Comm<\/i>, vol. 39, pp. 202-211, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X. M. Liu, X. W. Gao, D. B. Zhao, J. T. Zhou, G. T. Zhai, and W. Gao, \u201cModel-based low bit-rate video coding for resource-deficient wireless visual communication\u201d, <i>Neurocomputing<\/i>, vol. 162, pp. 180-190, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. H. Wang, Y. M. Huang, J. T. Zhou, and L. Sun, \u201cOn imperfect pricing in globally constrained noncooperative games for cognitive radio networks\u201d, <i>Signal Processing<\/i>, vol. 117, pp. 96-101, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou, O. C. Au, G. T. Zhai, Y. Y. Tang, and X. M. Liu, \u201cScalable Compression of Stream Cipher Encrypted Images through Context-Adaptive Sampling\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 9, no.11, pp. 1857-1868, 2014<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou,\u00a0 X. M. Liu, O. C. Au, and Y. Y. Tang, \u201cDesigning an Efficient Image Encryption-then-Compression System via Prediction Error Clustering and Random Permutation\u201d, <b><i>IEEE Trans. on Inf. Forensics and Security (T-IFS)<\/i><\/b>, vol. 9, no. 2, pp. 39-50, 2014.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X.M. Liu, D.B. Zhao, J. T. Zhou, W. Gao and H.F. Sun, \u201cImage Interpolation via Graph-based Bayesian Label Propagation,\u201d <b><i>IEEE Trans. on Image Process. (T-IP)<\/i><\/b>, Vol. 23, No. 3, pp. 1084-1096, March 2014.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and X. Wu, \u201cL2 restoration of L\u221e-decoded images via soft-decision estimation\u201d, <b><i>IEEE Trans. on Image Processing (T-IP)<\/i><\/b>, vol. 21, no. 12, pp. 4797-4807, 2012.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cDetermining the Capacity Parameters in PEE-based Reversible Watermarking,\u201d <b><i>IEEE Signal Processing Letters (SPL)<\/i><\/b>, vol. 19, no. 5, pp. 287-290, 2012.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cOn the Security of Chaotic Convolutional Coder\u201d, <b><i>IEEE Trans. on Circuits and Systems-I (T-CASI)<\/i><\/b>, vol. 58, no.3, pp. 595-606, March 2011.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">K. Wang, W. J. Pei, J. T. Zhou, Y. F. Zhang, and S. Y. Zhou, \u201cSecurity of chaos-based secure communications in a large community\u201d, <i>Acta Phys. Sin.<\/i>, vol. 60, no. 7, 070503.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cError Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability\u201d, <b><i>IEEE Trans. on Comm.(T-COM)<\/i><\/b>, vol. 58, pp. 1654-1666, 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">X.P. Fan, O.C. Au, N.M. Cheung, Y. Chen and J. T. Zhou, \u201cSuccessive Refinement based Wyner-Ziv Video Compression\u201d\uff0c <i>Signal Processing: Image Communications<\/i>, vol. 25, no. 1, pp. 47-63, January 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cAdaptive Chosen-ciphertext Attack on Secure Arithmetic Coding\u201d, <b><i>IEEE Trans. on Signal Proc. (T-SP)<\/i><\/b>, vol. 57, pp. 1825-1838, May 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">X. P. Fan, O. C. Au, Y. Chen, J. T. Zhou, M. Y. Ma, and P. H. W. Wong, \u201cWyner-Ziv-based Bidirectionally Decodable Video Coding\u201d, <em>Journal of Visual Communication and Image Representation<\/em>, vol. 20, no. 6, pp. 365\u2013376, 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cComments on \u201cA Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System\u201d\u201d, <b><i>IEEE Trans. on Circuits and Systems-I (T-CASI)<\/i><\/b>, vol. 55, pp. 3368-3369, Nov. 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou and O. C. Au, \u201cSecurity Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table\u201d, <b><i>IEEE Signal Proc. Letters (SPL)<\/i><\/b>, vol. 14, pp. 201-204, 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou, W. J. Pei, K. Wang, J. Huang, and Z. Y. He, \u201cSecure Communication Scheme Based on Asymptotic Model of Deterministic Randomness\u201d, <i>Physics Letters A<\/i>, vol. 358, pp. 283-288, 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">H. H. Szu, C. Hsu, M. K. Hsu and J. T. Zhou, \u201cIntelligent Network Computing Augmented by Chaotic Neural Networks, Blind Sources Separation, Digital Watermarks\u201d, <i>International Journal of Information Acquisition<\/i>, vol. 1, no. 4, pp 295\u2013320, April 2005.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;font-family: 'times new roman', times, serif;color: #000000\">J. T. Zhou, Q. Z. Xu, W. J. Pei, Z. Y. He, and H. H. Szu, \u201cStep to Improve Neural Cryptography against Flipping Attacks\u201d, <i>Int. J. of Neural Systems<\/i>, vol. 14, no. 6, pp. 393-405, 2004. 78766308133<\/span><\/li><\/ol><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3d13737 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d13737\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e20fbc0\" data-id=\"e20fbc0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c26adb8 block elementor-widget elementor-widget-text-editor\" data-id=\"c26adb8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p style=\"padding-left: 40px\"><span style=\"color: #000080;font-family: 'times new roman', times, serif;font-size: 12pt;font-weight: bolder\">Conference Papers\u00a0<\/span><\/p><\/div><ol><li style=\"list-style-type: none\"><ol><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">H. W. Wu, K. M. Li, Y. M. Li, and J. T. Zhou, \u201cEditprint: General Digital Image Forensics via Editing Fingerprint with Self-Augmentation Training\u201d, In <b><i>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-26),<\/i><\/b> 2026. <strong>(<span style=\"color: #ff0000\">Highlight<\/span>)<\/strong><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">H. W. Wu, F. P. Li, Z. L. Tu, Y. M. Li, X. Li, and J. T. Zhou, \u201cZero-shot Detection of AI-Generated Image via RAW-RGB Alignment\u201d, In <b><i>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-26),<\/i><\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">H. Y. Chen, H. W. Wu, J. Y. Tian, J. Q. Li, and J. T. Zhou, \u201cForensic-Friendly Image Manipulation via Controllable Latent Diffusion\u201d, In <b><i>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-26),<\/i><\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">L. B. Xie, Y. Li, S. Du, M. Xia, X. T. Wang, F. H. Yu, Z. Y. Chen, P. F. Wan, J. T. Zhou, and C. Dong, \u201cSimpleGVR: A Simple Baseline for Latent-Cascaded Generative Video Super-Resolution\u201d, In <b style=\"font-style: italic\">Proceedings of International Conference on Learning Representations (ICLR-26),<\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">F. P. Li, K. M. Li, Q. Z. Wang, B. Han, and J. T. Zhou, \u201cAEGIS: Adversarial Target-Guided Retention-Data-Free Robust Concept Erasure from Diffusion Models\u201d, In <b style=\"font-style: italic\">Proceedings of International Conference on Learning Representations (ICLR-26),<\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">K. M. Li, Q. Z. Wang, Y. Wang, F. P. Li, J. Liu, B. Han, and J. T. Zhou, \u201cLLM Unlearning with LLM Beliefs\u201d, In <b style=\"font-style: italic\">Proceedings of International Conference on Learning Representations (ICLR-26),<\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Z. Q. Sheng, J. Y. Wu, W. Lu, and J. T. Zhou, \u201cWeakly-Supervised Image Forgery Localization via Vision-Language Collaborative Reasoning Framework\u201d, In <i style=\"font-weight: bold\">Proceedings of AAAI Conference on Artificial Intelligence (AAAI-26),<\/i> 2026\u00a0\u00a0(<span style=\"font-weight: bolder\"><span style=\"color: #ff0000\">Oral<\/span><\/span>).\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Y. H. He, J. Y. Tian, X. W. Zheng, L. Dong, Y. M. Li, and J. T. Zhou, \u201cDeferred Poisoning: Making the Model More Vulnerable via Hessian Singularization\u201d, In <b style=\"font-style: italic\">Proceedings of AAAI Conference on Artificial Intelligence (AAAI-26),<\/b> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Z. Li, L. B. Xie, Y. M. He, and J. T. Zhou, \u201cUniversal Adversarial Purification with DDIM Metric Loss for Stable Diffusion\u201d, In <i style=\"font-weight: bold\">Proceedings of AAAI Conference on Artificial Intelligence (AAAI-26),<\/i> 2026.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">W. D. Chen, Z. Y. Zha, S. G. Wang, B. H. Wen, X. Yuan, J. T. Zhou, Z. P. Fan, G. Yan, and C. Zhu, \u201cKaRF: Weakly-Supervised Kolmogorov\u2013Arnold Networks-based Radiance Fields for Local Color Editing\u201d, In\u00a0<\/span><span style=\"font-size: 13.3333px;font-weight: bold\"><i>Proceedings of Annual Conference on Neural Information Processing Systems (NeurIPS-25)<\/i><\/span><span style=\"font-size: 13.3333px\">, 2025.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">J. W<\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">. Fei, Y. S. Dai, P. P. Yu, Z. Kong, <\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">J. T. Zhou, and Z. H. Xia, <\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">\u201cScalable Dual Fingerprinting for Hierarchical Attribution of Text-to-Image Models<\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">\u201d, <\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICCV-25)<\/i><\/b><\/span><\/em><\/strong>, 2025 <strong>(<span style=\"color: #ff0000\">Highlight<\/span>).<\/strong><\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">K.\u00a0<\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">H. Wong, J. C. Zhou, H. W. Wu,\u00a0<\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. W. Si, and J. T. Zhou,\u00a0<\/span><\/span><span style=\"font-size: 10pt\"> <span style=\"font-family: 'times new roman', times, serif\">\u201c<\/span><\/span><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">ADCD-Net: Robust Document Image Forgery Localization via Adaptive DCT Feature and Hierarchical Content Disentanglement<\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">\u201d,\u00a0<\/span><\/span><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICCV-25)<\/i><\/b><\/span><\/em><\/strong>, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">K. H. Wong, J. C. Zhou, J. T. Zhou, and Y. W. Si, <\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cAn End-to-End Model For Logits Based Large Language Models Watermarking\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of\u00a0 International\u00a0Conference on Machine Learning <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICML-25)<\/i><\/b><\/span><\/em><\/strong>, 2025.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Z. Li, L. B. Xie, J. T. Zhou, X. T. Wang, H. W. Wu, H. Y. Tian, &#8220;Anti-Diffusion: Preventing Abuse of Modifications of Diffusion-Based Models&#8221;, In <strong><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-25)<\/i><\/strong>, 2025 (<strong><span style=\"color: #ff0000\">Oral<\/span><\/strong>).<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"> J. W. Fei, Y. S. Dai, Z. H. Xia, F. J. Huang, J. T. Zhou, &#8220;OmniMark: Efficient and Scalable Latent Diffusion Model Fingerprinting&#8221;, In\u00a0<strong><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-25)<\/i><\/strong>, 2025 (<span style=\"color: #ff0000\"><strong>Oral<\/strong><\/span>).<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">X. Q. Yu, Z. Q. Sheng, W. Lu, X. Y. Luo, J. T. Zhou, &#8220;RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection&#8221;, In\u00a0<strong><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-25)<\/i><\/strong>, 2025 (<span style=\"color: #ff0000\"><strong>Oral<\/strong><\/span>).<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Z. Q. Sheng, W. Lu, X. Y. Luo, J. T. Zhou, X. C. Cao, &#8220;SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints&#8221;, In\u00a0<strong><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-25)<\/i><\/strong>, 2025 (<span style=\"color: #ff0000\"><strong>Oral<\/strong><\/span>).<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">X. C. Chen, Q. L. Yin, J. R. Liu, W. Lu, X. Y. Luo, J. T. Zhou , &#8220;GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection&#8221;, In <strong><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-25)<\/i><\/strong>, 2025 (<span style=\"color: #ff0000\"><strong>Oral<\/strong><\/span>).<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">L. B. Xie, D. Pakhomov, Z. H. Wang, Z. Z. Wu, Z. Y. Chen, Y. Q. Zhou, H. T. Zheng, Z. F. Zhang, Z. Lin, J. T. Zhou, C. Dong, \u201cTurboFill: Adapting Few-step Text-to-image Model for Fast Image Inpainting\u201d, In <strong><em>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition <b><i>(CVPR-25)<\/i><\/b><\/em><\/strong>, 2025<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Y. J. Li, Z. L. Zhou, R. H. Meng, B. W. Wang, X. J. Wang, C. Qiao, and J. T. Zhou, &#8220;Zero Matrix-guided Adaptive Image Vaccine against Diffusion Model-based Multitask&#8221;, In\u00a0<strong><i>Proceedings of ACM Multimedia (ACM MM-25)<\/i><\/strong>, 2025.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">F. P. Li, K. M. Li, J. Y. Tian and J. T. Zhou, &#8220;DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency Domain&#8221;, In <b><i>Proceedings of Annual Conference on Neural Information Processing Systems (NeurIPS-24)<\/i><\/b>, 2024.<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">S. N. Xu, B. B. Song, X. Y. Chen, X. N. Liu, and J. T. Zhou, \u201cImage Demoireing in RAW and sRGB Domains\u201d, In <b><i>Proceedings of European Conference on Computer Vision (ECCV-24)<\/i><\/b>, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: times new roman, times, serif\">X. Y. Chen, <\/span><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Z. Y. Li, Y. D. Pu, Y. H. Liu, J. T. Zhou, Y. Qiao, and C. Dong, \u201cA Comparative Study of Image Restoration Networks for General Backbone Network Design\u201d, In <b><i>Proceedings of European Conference on Computer Vision (ECCV-24)<\/i><\/b>, 2024.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\">F. P. Li, K. M. Li, J. Y. Tian and J. T. Zhou, \u201cRegroup Median Loss for Combating Label Noise\u201d, In\u00a0<span style=\"font-weight: bold\"><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-24)<\/i><\/span>, 2024 (<span style=\"font-weight: bold;color: #ff0000\">Oral<\/span>).<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">J. Liu, J. T. Zhou, J. D. Zeng, and J. Y. Tian, \u201cDifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-24)<\/i><\/b>, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">S. N. Xu, B. B. Song, X. Y. Chen and J. T. Zhou, \u201cDirection-aware Video Demoir\u00e9ing with Temporal-guided Bilateral Learning\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-24)<\/i><\/b>, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\"><span style=\"font-family: 'times new roman', times, serif\">Y. M. Chen, H. W. Wu, and J. T. Zhou<\/span>, \u201cProgressive Poisoned Data Isolation for Training-time Backdoor Defense\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-24)<\/i><\/b>, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt;color: #000000;font-family: 'times new roman', times, serif\">Y. C. Su, Y. M. Li, W. Wang, J. T. Zhou, and X. Li, \u201cA Unified Environmental Network for Pedestrian Trajectory Prediction\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-24)<\/i><\/b>, 2024.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. H. Liu, X. Y. Chen, X. Z. Ma, X. T. Wang, J. T. Zhou, Y. Qiao, and C. Dong, <\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cUnifying Image Processing as Visual Prompting Question Answering \u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of\u00a0 International\u00a0Conference on Machine Learning <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICML-24)<\/i><\/b><\/span><\/em><\/strong>, 2024.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\">Y. Z. Huang, L. B. Xie, X. T. Wang, Z. Y. Yuan, X. D. Cun, Y. X. Ge, J. T. Zhou, C. Dong, R. Huang, R. M. Zhang, and Y. Shan, <\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cSmartEdit: Exploring Complex Instruction-based Image Editing with Multimodal Large Language Models\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision and Pattern Recognition <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(CVPR-24)<\/i><\/b><\/span><\/em><\/strong>, 2024 <\/span>(<span style=\"font-weight: bold;color: #ff0000\">Highlight<\/span>).<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. Y. Chen, Y. H. Liu, Y. D. Pu, W. L. Zhang, J. T. Zhou, Y. Qiao, and C. Dong, \u201cLearning A Low-Level Vision Generalist via Visual Task Prompt\u201d, In\u00a0<span style=\"font-weight: bold\"><i>Proceedings of ACM Multimedia (ACM MM-24)<\/i><\/span>, 2024.<br \/><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">X. Y. Chen, X. T. Wang, J. T. Zhou, Y. Qiao, and C. Dong,\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cActivating More Pixels in Image Super-Resolution Transformer\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision and Pattern Recognition <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(CVPR-23)<\/i><\/b><\/span><\/em><\/strong>, 2023.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">Y. M. Chen, J. Y. Tian, X. Y. Chen, and J. T. Zhou, \u201cEffective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision and Pattern Recognition <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(CVPR-23)<\/i><\/b><\/span><\/em><\/strong>, 2023.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">B. B. Song, X. Y. Chen, S. N. Xu, and J. T. Zhou, <\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cUnder-Display Camera Image Restoration with Scattering Effect\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICCV-23)<\/i><\/b><\/span><\/em><\/strong>, 2023.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-size: 10pt\"><span style=\"font-family: 'times new roman', times, serif\">L. B. Xie, X. T. Wang, X. Y. Chen, G. Li, Y. Shan, J. T. Zhou, and C. Dong, <\/span><span style=\"font-family: 'times new roman', times, serif\">\u201cDeSRA: Detect and Delete the Artifacts of GAN-based Real-World Super-Resolution Models\u201d,<\/span> <span style=\"font-family: 'times new roman', times, serif\">In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of International\u00a0Conference on Machine Learning <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(ICML-23)<\/i><\/b><\/span><\/em><\/strong>, 2023.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt\">H. W. Wu, J. T. Zhou, J. Y. Tian, and J. Liu, \u201cRobust Image Forgery Detection over Online Social Network Shared Images\u201d, In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings<\/span> of IEEE Conference on Computer Vision and Pattern Recognition <span style=\"font-family: 'times new roman', times, serif;color: #000000\"><b><i>(CVPR-22)<\/i><\/b><\/span><\/em><\/strong>, 2022 <span style=\"font-family: 'times new roman', times, serif;color: #000000\">(<b><span style=\"color: #ff0000\">Oral<\/span>, AR 5%<\/b>)<\/span>.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">J. D. Zeng, T. Y. Liu, and J. T. Zhou, \u201cTag-assisted Multimodal Sentiment Analysis under Uncertain Missing Modalities\u201d, In <strong><em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings <\/span> of ACM SIGIR Conference on Research and Development in Information Retrieval<\/em><\/strong>, 2022.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. D. Zeng, T. Y. Liu, and J. T. Zhou, \u201cMitigating Inconsistencies in Multimodal Sentiment Analysis under Uncertain Missing Modalities&#8221;, In <em><strong>Proceedings<\/strong> <strong>of Conference on Empirical Methods in Natural Language Processing<\/strong><\/em>, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. Y. Tian, J. T. Zhou, and J. Duan, \u201cProbabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services\u201d, \u201d, In <i><b>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-21)<\/b><\/i>, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. Y. Tian, J. T. Zhou, Y.M. Li and J. Duan, \u201cDetecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-21)<\/i><\/b>, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">R. Q. Liang, Y.M. Li , X. Li, Y. Tang, J. T. Zhou and W. B. Zou, \u201cTemporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision\u201d, In <b><i>Proceedings of AAAI Conference on Artificial Intelligence (AAAI-21)<\/i><\/b>, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. X. You Y. M. Li, J. T. Zhou, Z. Y. Hua W. W. Sun, and X. Li, \u201cA Transformer based Approach for Image Manipulation Chain Detection\u201d, In\u00a0<span style=\"font-weight: bold\"><i>Proceedings of ACM Multimedia (ACM MM-21)<\/i><\/span>, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. M. Li, J. T. Zhou, X. W. Zheng, J. Y. Tian, and Y. Y. Tang, <span style=\"font-family: 'times new roman', times, serif\">\u201c<\/span>Robust Subspace Clustering With Independent and Piecewise Identically Distributed Noise Modeling<span style=\"font-family: 'times new roman', times, serif\">\u201d<\/span>, In <span style=\"font-family: 'times new roman', times, serif\"><strong><em>Proceedings <\/em><\/strong><\/span> <em><strong>of IEEE Conference on Computer Vision and Pattern Recognition <span style=\"font-family: 'times new roman', times, serif\"><b><i>(CVPR-19)<\/i><\/b><\/span><\/strong><\/em>, 2019 <span style=\"font-family: 'times new roman', times, serif\">(<b><span style=\"color: #ff0000\">Oral<\/span>, AR 5.6%<\/b>).<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">W. W. Sun, J. T. Zhou, R. Lyu, and S. Y. Zhu, \u201cProcessing-Aware Privacy-Preserving Photo Sharing over Online Social Networks\u201d, In <b><i>Proceedings of ACM Multimedia (ACM MM-16)<\/i><\/b>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. Y. Li, J. T. Zhou, and Y. M. Li, \u201cCiphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion\u201d, In <b><i>Proceedings of ACM Multimedia (ACM MM-15)<\/i><\/b>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. M. Liu, X. L. Wu, and J. T. Zhou, \u201cData-driven Sparsity-based Restoration of JPEG-compressed Images in Dual Transform-Pixel Domain\u201d, In <b><i>Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR-15),<\/i><\/b> 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. X. You, Y. M. Li, R. Q. Liang, Y. X. Tan, J. T. Zhou, and X. Li, \u201cImage Sharing Chain Detection VIA Sequence-To-Sequence Model&#8221;, In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, B. H.Wen, X. Yuan, J. T. Zhou, and C. Zhu, \u201cHyperspectral Image Denoising Via Nonlocal Rank Residual Modeling&#8221;, In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2023.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, B. H.Wen, X. Yuan, J. T. Zhou, and C. Zhu, \u201cSimultaneous Nonlocal Low-Rank And Deep Priors For Poisson Denoising&#8221;, In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. X. Zhang, Y. L. Zhang, X. F. Zheng, J. Y. Tian, and J. T. Zhou, \u201cSelf-Supervised Adversarial Example Detection by Disentangled Representation&#8221;, In Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, X. Yuan, J. T. Zhou, C. Zhu, and B. H. Wen, \u201cA Hybrid Structural Sparse Error Model for Image Deblocking\u201d, In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-20), 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, X. Yuan, J. T. Zhou, C. Zhu, and B. H. Wen, \u201cReconciliation of Group Sparsity and Low-rank models for Image Restoration\u201d, In Proceedings of IEEE International Conference on Multimedia &amp; Expo (ICME-20), 2020. <strong>(Oral)<\/strong><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong and J. T. Zhou, \u201cColor Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling\u201d, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-18), 2018. <strong>(Oral)<\/strong><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. F. Zheng, C. Wang, and J. T. Zhou, \u201cToward Secure Image Denoising: A Machine Learning based Realization\u201d, In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-18), 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong and J. T. Zhou, \u201cEfficient Image Sensor Noise Estimation via Iterative Re-weighted Least Squares\u201d, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17), 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">W. Sun, G. T. Zhai, X. K. Min, Y. T. Liu, S. W. Ma, J. Liu, J. T. Zhou, and X. M. Liu \u201cDynamic Backlight Scaling Considering Ambient Luminance for Mobile Energy Saving,\u201d In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-17), 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. K. Min, G. T. Zhai, K. Gu, Y. M. Fang, X. K. Yang, X. L. Wu, J. T. Zhou, and X. M. Liu, \u201cBlind Quality Assessment of Compressed Images via Pseudo Structural Similarity\u201d, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-16), 2016 <strong>(Best Student Paper).<\/strong><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">A. Cheng, Y. M. Li, and J. T. Zhou, \u201cSIFT Keypoint Removal via Convex Relaxation\u201d, In Proceedings of IEEE International Conference on Multimedia and Expo (ICME-15), 2015 <strong>(top 15% paper).<\/strong><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong and J. T. Zhou, \u201cEstimation of Capacity Parameters for Dynamic Histogram Shifting (DHS)-based Reversible Image Watermarking, \u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-14)<\/i>, 2014.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">W. Dai, O. C. Au, W. J. Zhu, P. F. Wan, W. Hu, and J. T. Zhou, \u201cSSIM-based rate-distortion optimization in H.264,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-14)<\/i>, 2014.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou, X. M. Liu and O. C. Au, \u201cOn the Design of An Efficient Encryption-then-Compression System,\u201d In\u00a0 <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-13)<\/i>, 2013.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">D. M. Zhai, X. M. Liu, J. T. Zhou, D.B. Zhao, and W. Gao, \u201cSpatial Error Concealment via model based coupled sparse representation, \u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-13)<\/i>, 2013.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and X. L. Wu, \u201cContext Modeling and Correction of Quantization Errors in Prediction Loop,\u201d In <i>Proceedings of Data Compression Conference (DCC-12)<\/i>, 2012.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cOn the Determination of Capacity Parameters in PEE-based Reversible Image Watermarking,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-12)<\/i>, 2012.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cSecurity Evaluation of a Perceptual Image Hashing Scheme Based on Virtual Watermark Detection,\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-11)<\/i>, pp. 1-6, July, 2011.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. L. Wu, J. T. Zhou, and Heng Wang, \u201cHigh-\ufb01delity Image Compression for High-throughput and Energy-e\ufb03cient Cameras,\u201d In <i>Proceedings of Data Compression Conference (DCC-11)<\/i>, pp. 433\u2013442, March 2011.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cSecurity and E\ufb03ciency Analysis of Progressive Audio Scrambling in Compressed Domain,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10)<\/i>, pp. 1802\u20131805, March 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">John S. Ho, Oscar C. Au, J. T. Zhou, and Yuanfang Guo, \u201cInter-channel Demo-saicking Traces for Digital Image Forensics,\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-10)<\/i>, pp. 1475\u20131480, July 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. P. Fan, O. C. Au, and J. T. Zhou, \u201cBackward error concealment of redundantly coded video,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-10)<\/i>, July 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cSecure Exp-Golomb Coding using Stream Cipher,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)<\/i>, pp. 1457\u20131460, April 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. P. Fan, O. C. Au, M. Y. Ma, L. Hou, J. T. Zhou and N. M. Cheung, \u201cTranscoding based Robust Streaming of Compressed Video,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)<\/i>, pp.909\u2013912, April 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. P. Fan, O. C. Au, M. Y. Ma, L. Hou, J. T. Zhou and N. M. Cheung, \u201cOn Improving the Robustness of Compressed Video by Slepian-Wolf based Lossless Transcoding,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-09)<\/i>, pp. 884\u2013887, May 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cSecure Lempel-Ziv-Welch (LZW) Algorithm with Random Dictionary Insertion and Permutation,\u201d In <i>Proceedings of IEEE Inter-national Conference on Multimedia and Expo (ICME-08)<\/i>, pp. 245\u2013248, June 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">Xiaopeng Fan, Oscar C. Au, J. T. Zhou, Mengyao Ma and Liwei Guo, \u201cImproved Bidirectionally Decodable Wyner-Ziv Video Coding\u201d, In <em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings <\/span>of IEEE International Conference on Multimedia and Expo<\/em>, 2008.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cCryptanalysis of Secure Arithmetic Coding,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-08)<\/i>, pp. 1769\u20131772, April 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou, X. P. Fan, Z. Q. Liang and O. C. Au, \u201cExact Symbol Error Rate for Variable Length Codes over Binary Symmetric Channel,\u201d In <i>Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-07)<\/i>, pp.641\u2013644, April 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Q. Liang, J. T. Zhou, L. W. Guo, M. Y. Ma and O. C. Au, \u201cJoint Decoding of Multiple Video Streams,\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07)<\/i>, 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. P. Fan, O. C. Au, Y. Chen, J. T. Zhou, and P. H. W. Wong, \u201cWyner-Ziv Successive Refinement of Video and Rate Distortion Analysis,\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-07)<\/i>, 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou, Z. Q. Liang, Y. Chen and O. C. Au, \u201cOn the Security of Multimedia Encryption Schemes Based on Multiple Hu\ufb00man Table (MHT),\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06)<\/i>, pp. 2185\u20132188, July 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. Chen, O. C. Au, J. T. Zhou and C. W. Ho, \u201cAdaptive Switching Between Directional Interpolation and Region Matching For Spatial Error Concealment Based on DCT Coe\ufb03cients,\u201d In <i>Proceedings of IEEE International Conference on Multimedia and Expo (ICME-06)<\/i>, pp. 805\u2013808, July 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. H. Che, G. T. Zhai, J. Liu, K. Gu, P. L. Callet, J. T. Zhou, X. M. Liu, \u201cA Blind Quality Measure for Industrial 2D Matrix Symbols Using Shallow Convolutional Neural Network\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-18)<\/i>, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">M. Cheung, W. W. Sun, and J. T. Zhou, \u201cDiscovering Social Connections using Event Images\u201d, In <i>Proceedings of ACM Multimedia Asia (ACM MM Asian-21)<\/i>, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">H. W. Wu and J. T. Zhou, \u201cGIID-NET: Generalizable Image Inpainting Detection Network\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-21)<\/i>, 2021.\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, B. H. Wen, X. Yuan, J. T. Zhou, and C. Zhu,\u00a0\u201cLow-Rank Regularized Joint Sparsity for Image Denoising\u201d,\u00a0In\u00a0<i>Proceedings of IEEE International Conference on Image Processing (ICIP-21)<\/i>, 2021.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, X. Yuan, T. Y. Zhou, J. T. Zhou, B. H. Wen, and C. Zhu, \u201cThe Power Of Triply Complementary Priors For Image Compressive Sensing\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-20)<\/i>, 2020.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, B. H. Wen, J. C. Zhang, J. T. Zhou, C. Zhu, \u201cA Comparative Study for the Nuclear Norms Minimization Methods\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-19)<\/i>, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Y. Zha, X. Yuan, B. H. Wen, J. C. Zhang, J. T. Zhou, C. Zhu, \u201cSimultaneous Nonlocal Self-Similarity Prior for Image Denoising\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-19)<\/i>, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">H. W. Wu, J. T. Zhou, and Y. M. Li, \u201cImage Reconstruction from Local Descriptors Using Conditional Adversarial Networks\u201d, In <i>Proceedings of APSIPA Annual Summit and Conference (ASC-19)<\/i>, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong, J. T. Zhou, C. M. Zou, and Y.L. Wang, \u201cIterative first-order reverse image filtering\u201d, In <i>Proceedings of the ACM Turing Celebration Conference \u2013 China (TUR-C-2019)<\/i>, 2019.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Zha, X. Yuan, B. H. Wen, J. T. Zhou, C. Zhu, \u201cJoint Patch-Group Based Sparse Representation for Image Inpainting\u201d, In <i>Proceedings of Asian Conference on Machine Learning (ACML-18)<\/i>, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. Zhang, J. Duan, and J. T. Zhou, \u201cA Robust Secret Sharing QR Code via Texture Pattern Design\u201d, In <i>Proceedings of APSIPA Annual Summit and Conference (ASC-18)<\/i>, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. C. Zhu, G. T, Zhai, W. H. Zhu, and J. T. Zhou, \u201cAn Image Augmentation Method for Quality Assessment Database\u201d,In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-18)<\/i>, 2018.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">W. W. Sun and J. T. Zhou, \u201cImage Origin Identification for Online Social Networks (OSNs)\u201d, In <em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings <\/span> of APSIPA Annual Summit and Conference<\/em>, 2017.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. C. Chen, G. T. Zhai, K. Gu, X. F. Zhang, W. S. Lin, and J. T. Zhou, \u201cBenchmarking Screen Content Image Quality Evaluation in Spatial Psychovisual Modulation Display System\u201d, In <i>Proceedings of IEEE Pacific-Rim Conference on Multimedia (PCM-17)<\/i>, 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. C. Chen, G. T. Zhai, and J. T. Zhou, \u201cGlobal Quality of Assessment and Optimization for the Backward-compatible Stereoscopic Display System,\u201d In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-17)<\/i>, 2017.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">W. B. Zhao, X. M. Liu, J. T. Zhou, D. B. Zhao, and W. Gao \u201cMesh Denoising with Local Guided Normal Filtering and Non-local Similarity\u201d, In <em>International Forum of Digital TV and Wireless Multimedia Communication<\/em>, 2016.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\"><span style=\"font-family: 'times new roman', times, serif\">X. W. Zheng, Y. Y. Tang, J. T. Zhou, H. L. Yuan, Y. L. Wang, L. N. Yang, and J. J. Pan \u201cMulti-windowed Graph Fourier Frames\u201d, In <em><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Proceedings <\/span> of IEEE International Conference on Machine Learning and Cybernetics<\/em>, 2016.<\/span><\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong and J. T. Zhou, \u201cNoise-Robust SLIC Superpixel for Natural Images\u201d, In <i>Proceedings of IEEE International Conference on Cloud Computing and Big Data (CCBD-2016)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. M. Li and J. T. Zhou, \u201cImage Copy-Move Forgery Detection Using Hierarchical Feature Point Matching\u201d, In <i>Proceedings of APSIPA Annual Summit and Conference (ASC-2016)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. H. Che, G. T. Zhai, and K. Gu, and Y. C. Zhu, and J. T. Zhou, \u201cPerceptually meaningful quadtree decomposition using dual-homogeneous criteria\u201d, In <i>Proceedings of IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB-2016)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X.W. Zheng, Y. Y. Tang, J. T. Zhou, and P. Wang, \u201cMaximal Level Estimation and Unbalance Reduction for Graph Signal Downsampling\u201d, In <i>Proceedings of IEEE International Conference on Pattern Recognition (ICPR-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. Duan, J. T. Zhou, and Y. M. Li, \u201cSecure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)\u201d, In <i>Proceedings of ACM Workshop on Information Hiding and Multimedia Security (IH&amp;MMSec-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">S. Y. Zhu, L. Y. Zeng, B. Zeng, and J. T. Zhou, \u201cConstrained Quantization Based Transform Domain Down-Conversion for Image Compression\u201d, In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">M. Liu, K. Gu, G. T. Zhai, J. T. Zhou, W.S. Lin, \u201cQuality Assessment of Contrast-Altered Images\u201d, In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Dong and J. T. Zhou, \u201cEstimating Noise Level for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity\u201d, In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. W. Zheng, Y. Y. Tang, and J. T. Zhou, \u201cImproving Unbalanced Downsampling via Maximum Spanning Trees for Graph Signals\u201d, In <i>Proceedings of IEEE International Conference on Systems, Man, and Cybernetics (SMC-16)<\/i>, 2016.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. S. Zhang, J. T. Zhou, Y. Zhang, F. Chen, and X.Y. Lei, \u201cSupport-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-Clouds\u201d, In <i>Proceedings of International Workshop on Social Computing and Security (SocialSec-15)<\/i>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. Y. Li, J. T. Zhou, Y. M. Li, and O. C. Au, \u201cReducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique\u201d, In<i> Proceedings of IEEE Global Conference on Signal and Information Processing (GlobalSIP-15)<\/i>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. P. Gao, G. T. Zhai, X. Gu, and J. T. Zhou, \u201cAdapting Hierarchical ALS Algorithms for Temporal Psychovisual Modulation\u201d, In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15)<\/i>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">K. Gu, G. T. Zhai, S. Wang, M. Liu, J. T. Zhou, and W. S. Lin, \u201cA general histogram modification framework for efficient contrast enhancement\u201d, In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-15)<\/i>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. W. Zheng, Y. Y. Tang, J. T. Zhou, L. N. Yang, H. L. Yuan, Y. L. Wang, C. L. Li, \u201cRedundant graph Fourier transform\u201d, In <i>Proceedings of IEEE International Conference on Cybernetics (CYBCONF-15)<\/i>, 2015.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. P. Gao, G. T. Zhai, J. T. Zhou, X. K. Min, and C. J. Hu, \u201cInformation Security Display via Uncrowded Window\u201d, In <i>Proceedings of IEEE\u00a0 Visual Communications and Image Processing (VCIP-14)<\/i>, 2014.\u00a0\u00a0<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cScalable coding of stream cipher encrypted images via adaptive sampling, \u201d In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-14)<\/i>, 2014.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. M. Li and J. T. Zhou, \u201cSparsity-driven reconstruction of L\u221e -decoded images,\u201d In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-14)<\/i>, 2014.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and X. L. Wu, \u201cL2 Restoration of L\u221e-decoded Images with Context Modeling,\u201d In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-11)<\/i>, pp. 1989-1992, 2011.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cCryptanalysis of Chaotic Convolutional Coder,\u201d In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-10)<\/i>, pp.145\u2013148, May 2010.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">L. Hou, O. C. Au, X. P. Fan and J. T. Zhou, \u201cMaximum-likelihood versus maximum a posteriori based local illumination and color correction algorithm for multi-view video,\u201d In <i>Proceedings of IEEE Workshop on Multimedia Signal Processing (MMSP-09)<\/i>, 2009.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cJoint Security and Performance Enhancement for Secure Arithmetic Coding,\u201d In <i>Proceedings of IEEE International Conference on Image Processing (ICIP-08)<\/i>, pp. 3120\u20133123, October 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cError Recovery of Variable Length Codes over BSC with Arbitrary Crossover Probability,\u201d In <i>Proceedings of IEEE International Symposium on Information Theory (ISIT-08)<\/i>, pp. 1188\u20131192, June 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Xiaopeng Fan, Oscar C. Au, Yan Chen, J. T. Zhou and Mengyao Ma, \u201cBidirectionally Decodable Wyner-Ziv Video Coding,\u201d In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-08)<\/i>, pp. 1404\u20131407, May 2008.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou and O. C. Au, \u201cOn a Conjecture on Error Recovery for Variable Length Codes,\u201d In <i>Proceedings of IEEE Information Theory Workshop (ITW-07)<\/i>, pp. 529\u2013534, September 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Q. Liang, J. T. Zhou, Liwei Guo, Mengyao Ma and O. C. Au, \u201cA Novel Multiple Description Approach to Predictive Video Coding,\u201d In <i>Proceedings of Pacific-Rim Conference on Multimedia (PCM-07)<\/i>, pp. 603\u2013612, December 2007.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">X. P. Fan, O. C. Au, Y. Chen and J. T. Zhou, \u201cHeegard-Berger Video Coding Using LMMSE Estimator,\u201d <i>Lecture Notes in Computer Science (LNCS)<\/i>, vol. 4261, no. 1, pp. 122\u2013130, October 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. Chen, O. C. Au, C. W. Ho and J. T. Zhou, \u201cSpatio-Temporal Boundary Matching Algorithm for Temporal Error Concealment,\u201d In <i>Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS-06)<\/i>, pp. 686\u2013689, May 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Y. Chen, O. C. Au, J. T. Zhou, H. M. Wong, and C. W. Ho \u201cPriority-driven extended boundary matching algorithm for temporal error concealment,\u201d In <i>Proceedings of IEEE Picture Coding Symposium (PCS-06)<\/i>, 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">Z. Q. Liang, J. T. Zhou, O. C. Au and L. W. Guo, \u201cContent-adaptive Temporal Search Range Control Based on Frame Bu\ufb00er Utilization,\u201d In <i>Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP-06)<\/i>, pp. 399\u2013402, October, 2006.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. T. Zhou, Q. Z. Xu, W. J. Pei, Z. Y. He and H. H. Szu, \u201cA Novel Neural Cryptography Scheme Against Flipping Attack,\u201d In <i>Proceedings of the 14th National Conference on Neural Networks and Signal Processing (ICNNSP-04)<\/i>, pp. 1654\u20131657, 2004.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">F. Zhu and J. T. Zhou, \u201cAn Implementation of Access Control in Public Wireless Local Area Network,\u201d In <i>Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03)<\/i>, pp. 1654\u20131657, 2003.<\/span><\/li><li style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: left\"><span style=\"font-family: 'times new roman', times, serif;font-size: 10pt;color: #000000\">J. Y. Yuan, J. T. Zhou and W. J. Pei, \u201cAn Application of Network Address Translation on Gateway,\u201d In <i>Proceedings of IEEE International Conference on Neural Networks and Signal Processing (ICNNSP-03)<\/i>, pp. 1658\u20131661, 2003.<\/span><\/li><\/ol><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbf4426 block elementor-widget elementor-widget-text-editor\" data-id=\"bbf4426\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"color: #154dc4\"><span style=\"font-size: 12pt\"><strong><span style=\"color: #000080;font-family: 'times new roman', times, serif\">Teaching<\/span><\/strong><\/span><\/p><div data-border-width=\"2px\"><ul><li style=\"list-style-type: none\"><ul style=\"list-style-type: disc\"><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-size: 10pt\">Digital Image Processing<\/span><\/li><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;font-size: 10pt\">Multimedia Forensics and Security<\/span><\/li><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: justify;font-size: 10pt\">Programming Language\u00a0<\/span><\/li><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: justify;font-size: 10pt\">Program Design for Engineers\u00a0<\/span><\/li><li><span style=\"color: #000000;font-family: 'times new roman', times, serif;text-align: justify;font-size: 10pt\">Special Topics in Computer and Information Science\u00a0<\/span><\/li><\/ul><\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d176f6 block elementor-widget elementor-widget-text-editor\" data-id=\"6d176f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-size: 12pt;font-family: times new roman, times, serif;color: #000080\"><strong>Patents<\/strong><\/span>\n<div data-border-width=\"2px\">\n<ul>\n \t<li style=\"list-style-type: none\">\n<ul style=\"list-style-type: disc\">\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">J. T. Zhou, W. W. Sun, and L. Dong, \u201cMethod for reversible image data hiding\u201d, US Patent, Granted, US9639912 B2, May 2017.<\/span><\/li>\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">Oscar C. Au and J. T. Zhou, \u201cEfficient encoding processes and apparatus\u201d, US Patent, Granted, No. 8,457,304 B2 , June 2013.<\/span><\/li>\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">Oscar C. Au and J. T. Zhou, \u201cMethod and System for Encoding Multimedia Content based on Secure Coding Schemes using Stream Cipher\u201d, US Patent, Granted, No. 8,189,776, May 2012.<\/span><\/li>\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">Oscar C. Au and J. T. Zhou, \u201cSystem and Method for Encoding Data based on a Compression Technique with Security Features\u201d, US Patent, Granted, No. 7,868,788, Jan. 2011.<\/span><\/li>\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">\u533a\u5b50\u5ec9\uff0c\u5468\u5efa\u6d9b\uff0c\u201c\u57fa\u4e8e\u5177\u6709\u5b89\u5168\u7279\u6027\u7684\u538b\u7f29\u6280\u672f\u6765\u7f16\u7801\u6570\u636e\u7684\u7cfb\u7edf\u548c\u65b9\u6cd5\u201d\uff0c\u4e2d\u56fd\u53d1\u660e\u4e13\u5229\uff0c\u6388\u6743\u53f7\uff1aZL 200910203696.7\uff0c2013\u5e747\u6708\u3002<\/span><\/li>\n \t<li><span style=\"font-size: 10pt;font-family: times new roman, times, serif;color: #000000\">\u5468\u5efa\u6d9b\uff0c\u533a\u5b50\u5ec9\uff0c\u201c\u57fa\u4e8e\u6d41\u5bc6\u7801\u7684\u5b89\u5168\u7f16\u7801\u65b9\u6848\u7684\u591a\u5a92\u4f53\u5185\u5bb9\u7f16\u7801\u65b9\u6cd5\u548c\u7cfb\u7edf\u201d\uff0c\u4e2d\u56fd\u53d1\u660e\u4e13\u5229\uff0c\u6388\u6743\u53f7\uff1aZL200910176001.0\uff0c2014\u5e747\u6708<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"hl2\" data-border-width=\"2px\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Jiantao ZHOU (\u5468\u5efa\u6fe4)Professor,Department of Computer and Information Science,Faculty of Science and Technology, University of Macau (+853) 8822-4495 (+853) 8822-2426\u200b jtzhou@um.edu.mo\u200b E11-4089, University of Macau Research Interests Trustworthy AI Low-level Vision Multimedia Forensics and Security Education PhD in Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong, China, 2005-2009 Fulbright Junior Scholar &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.fst.um.edu.mo\/personal\/jtzhou\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Jiantao Zhou Homepage&#8221;<\/span><\/a><\/p>\n","protected":false},"author":81,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-16334","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/pages\/16334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/comments?post=16334"}],"version-history":[{"count":10,"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/pages\/16334\/revisions"}],"predecessor-version":[{"id":59052,"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/pages\/16334\/revisions\/59052"}],"wp:attachment":[{"href":"https:\/\/www.fst.um.edu.mo\/personal\/wp-json\/wp\/v2\/media?parent=16334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}