Information

  1. Dr. Li Dong, an Associate Professor at Ningbo University's Faculty of Electrical Engineering and Computer Science, also holds the position of Deputy Director in the Department of Computer Science. He completed his Bachelor's degree at Chongqing University in 2012, followed by a Master's degree with honors from the University of Macau in 2014, and a Ph.D. in Computer Science from the same institution in 2018. In November 2018, he was recruited by Ningbo University as part of the Outstanding Ph.D. Talent program. Dr. Dong's academic achievements include the Talent Teacher award from the Ministry of Education and Huawei Joint Foundation in 2023, and the Loctek Innovation Award in 2020. His mentees have been recognized with the Best Student Paper at the 2020 International Conference on Security and Privacy in Digital Economy (SPDE2020), and the Huawei Ascend Gold Quality Award.
  2. His research focuses on Multimedia Forensics and Security, Statistical Image Modeling, and Low-level Vision Processing. Dr. Dong has authored over 30 publications in renowned international journals and conferences. He has led more than 10 research projects funded by the National Natural Science Foundation of China, Zhejiang Provincial Natural Science Foundation, Zhejiang University's National Key Laboratory, and Ningbo Natural Science Foundation. He has also led industry-funded initiatives such as the Alibaba Innovation Research Program, Huawei's Ascend AI Project, and the CCF-Huawei Trusted Computing Fund. Dr. Dong is the holder of six patents and serves as a regular reviewer for international journals including IEEE TIP, TIFS, TCSVT, SPL.


Working Experience

  • Associate Professor, Department of Computer Science, School of Information Science and Technology, Ningbo University, China (December 2023 – present)
  • Deputy Director, Department of Computer Science, School of Information Science and Technology, Ningbo University, China (June 2023 – present)
  • Specially Appointed Associate Researcher, Department of Computer Science, School of Information Science and Technology, Ningbo University, China (January 2023 – December 2023)
  • Lecturer, Department of Computer Science, School of Information Science and Technology, Ningbo University, China (November 2018 – December 2022)


  • Education

  • Ph.D. in Computer Science, Faculty of Science and Technology, University of Macau, Macau (January 2015 – September 2018)
  • Master in Software Engineering, Faculty of Science and Technology, University of Macau, Macau (August 2012 – December 2014)
  • Bachelor in Software Engineering, School of Software Engineering, Chongqing University, China (August 2008 – June 2012)


  • Interest

  • Multimedia Security and Forensics
  • Statistical Image Modeling and Processing


  • Journal

    1. [1] Li Dong, Jiantao Zhou, Yuan Yan Tang, “Content-Adaptive Noise Estimation for Color Images with Cross-Channel Noise Modeling”, IEEE Transactions on Image Processing (T-IP), vol. 28, no. 8, pp. 4161 - 4176, Aug. 2019.

    2. [2] Li Dong, Jiantao Zhou, Yuan Yan Tang, “Effective and Fast Estimation for Image Sensor Noise via Constrained Weighted Least Squares”, IEEE Transactions on Image Processing (T-IP), vol. 27, no. 6, pp. 2715-2730, June 2018.

    3. [3] Li Dong, Jiantao Zhou, Yuan Yan Tang, “Noise Level Estimation for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”, IEEE Transactions on Image Processing (T-IP), vol. 26, no. 2, pp. 1017-1030, Feb. 2017.

    4. [4] Li Dong, Weipeng Liang, Rangding Wang, “Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention”, IEEE Transactions on Consumer Electronics (T-CE), vol. 70, no. 1, pp. 3495-3507, Feb. 2024.

    5. [5] Li Dong, Jiantao Zhou, Weiwei Sun, Diqun Yan, Rangding Wang, “First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding”, IEEE Transactions on Circuits and Systems II: Express Briefs (T-CAS II), vol. 67, no. 5, pp. 951-955, May 2020.

    6. [6] Yuanman Li, Liangpei Hu, Li Dong*, Haiwei Wu, Jinyu Tian, Jiantao Zhou, Xia Li, “Transformer-Based Image Inpainting Detection via Label Decoupling and Constrained Adversarial Training”, IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), vol. 34, no. 3, pp. 1857 – 1872, Mar. 2024.

    7. [7] Yuanman Li, Yingjie He, Changsheng Chen, Li Dong*, Bin Li, Jiantao Zhou, and Xia Li, “Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning”, IEEE Transactions on Image Processing (T-IP), In Press, Nov. 2024.

    8. [8] Linbo Fu, Xin Liao, Jinlin Guo, Li Dong*, and Zheng Qin, “WaveRecovery: Screen-shooting Watermarking based on Wavelet and Recovery”, IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), In Press, Nov. 2024.

    9. [9] Wenying Wen, Minghui Huang, Li Dong*, Yushu Zhang, Yuming Fang, “Multiscale Feature-guided Adversarial Examples Quality Assessment via Hierarchical Perception of Human Visual System”, IEEE Transactions on Big Data (T-BD), In Press, Nov. 2024.

    10. [10] Weiwei Sun, Jiantao Zhou, Li Dong*, Jinyu Tian, Jun Liu, “Optimal Pre-filtering for Improving Facebook Shared Images”, IEEE Transactions on Image Processing (T-IP), vol. 30, pp. 6292-6306, June 2021.

    11. [11] Jiantao Zhou, Weiwei Sun, Li Dong*, Xianming Liu, Oscar C. Au, Yuan Yan Tang, “Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation”, IEEE Transactions on Circuits and Systems for Video Technology (T-CSVT), vol. 26, no. 3, pp. 441–452, Mar. 2016.

    12. [12] Lin Yang, Rangding Wang, Dawen Xu, Li Dong*, Songhan He, “Centralized Error Distribution-Preserving Adaptive Steganography for HEVC”, IEEE Transactions on Multimedia (TMM), vol. 26, pp. 4255 – 4270, 2024.

    13. [13] Yuanman Li, Jiantao Zhou, Junyang Chen, Jinyu Tian, Li Dong*, Xia Li. “Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion”, IEEE Transactions on Computational Social Systems (T-CSS), vol.9, no.6, pp. 1830 - 1841, Dec. 2022.

    14. [14] Yang Tian, Xin Liao, Li Dong*, Yang Xu, Hongbo Jiang, “Amount-based Covert Communication over Blockchain”, IEEE Transactions on Network and Service Management (TNSM), pp. 3095 – 3111, vol. 21, no. 3, Jan. 2024.

    15. [15] Hui Xiao, Yuting Hong, Li Dong*, Diqun Yan, Junjie Xiong, Jiayan Zhuang, Dongtai Liang, Chengbin Peng, “Multi-Level Label Correction by Distilling Proximate Patterns for Semi-Supervised Semantic Segmentation”, IEEE Transactions on Multimedia (TMM), pp. 8077-8087, vol. 26, Mar. 2024.

    16. [16] Baochen Yao, Li Dong*, Xiaojie Qiu, Kangkang Song, Diqun Yan, Chengbin Peng, “Uncertainty-Guided Contrastive Learning for Weakly Supervised Point Cloud Segmentation”, IEEE Transactions on Geoscience and Remote Sensing (TGRS), vol. 62, pp.1-13, June. 2024.

    17. [17] Hui Xiao, Li Dong*, Hao Xu, Shuibo Fu, Diqun Yan, Kangkang Song, Chengbin Peng, “Semi-Supervised Semantic Segmentation with Cross Teacher Training”, Neurocomputing, vol 508, pp. 36-46. Aug. 2022.

    18. [18] Hao Xu, Hui Xiao, Huazheng Hao, Li Dong*, Xiaojie Qiu, Chengbin Peng, “Semi-Supervised Learning with Pseudo-Negative Labels for Image Classification”, Knowledge-Based System (KBS), vol. 260, pp. 110166, Jan. 2023.

    19. [19] Yuting Hong, Li Dong*, Xiaojie Qiu, Hui Xiao, Baochen Yao, Siming Zheng, Chengbin Peng, “A Multi-View Consistency Framework with Semi-Supervised Domain Adaptation”, Engineering Applications of Artificial Intelligence (EAAI), vol. 136, pp. 108886, 2024.

    20. [20] Dongjie Zhang, Yuting Hong, Xiaojie Qiu, Li Dong*, Diqun Yan, Chengbin Peng, “C²F²: Cross-Task Cross-Domain Feature Fusion for Semi-Supervised Change Detection”, IEEE Geoscience and Remote Sensing Letters (GRSL), vol. 21, pp. 1-5, 2024.

    21. [21] Zhe Ye, Diqun Yan, Li Dong*, Jiacheng Deng and Shui Yu, "Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger," IEEE Signal Processing Letters (SPL), vol. 30, pp. 1057-1061, July 2023.

    22. [22] Jiacheng Deng#, Li Dong*, Rangding Wang, Rui Yang, Diqun Yan, "Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation," IEEE Signal Processing Letters (SPL), vol. 29, pp. 1432-1436, June 2022.

    23. [23] Donghua Wang#, Li Dong*, Rangding Wang, Diqun Yan “Fast Speech Adversarial Example Generation for Keyword Spotting System with Conditional GAN”, Computer Communication, vol.179, November 2021.

    24. [24] Yuzhen Lin#, Rangding Wang, Diqun Yan, Li Dong*, “Tackling the Cover Source Mismatch Problem in Audio Steganalysis with Unsupervised Domain Adaptation”, IEEE Signal Processing Letters (SPL), vol. 28, pp. 1475 – 1479, Sep. 2020.

    25. [25] Diqun Yan, Xiaowen Li, Li Dong*, Rangding Wang, “An Antiforensic Method against AMR Compression Detection”, Security and Communication Networks, vol. 2020, 02 Sep, 2020.

    26. [26] Donghua Wang#, Li Dong*, Rangding Wang, Diqun Yan, Jie Wang, “Targeted Speech Adversarial Example Generation with Generative Adversarial Network”, IEEE Access, vol. 8, pp. 124503 – 124513, June. 2020.



    Conference

    1. [1] Li Dong*, Zhe Ye, Diqun Yan, Kailai Shen, “Breaking Speaker Recognition with Paddingback”, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4435-4439, April 14-19, 2024.

    2. [2] Jiacheng Deng#, Li Dong*, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye*, Lingchen Zhao, Jinyu Tian, “Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition”, ACM Multimedia (ACM MM), pp. 7559-7568, 20 Oct. – 3 Nov. 2023.

    3. [3] Liu Ting, Li Dong*, Diqun Yan, Rangding Wang, “Robust Image Steganography Against JPEG Compression Based on Prior Distribution”, 17th National Conference on Information Hiding and Multimedia Security, Nov. 15-17, 2023, Chongqing, China.

    4. [4] Jiale Chen, Xiaojian Ji, Li Dong*, Rangding Wang, Diqun Yan, Jinyu Tian, “Physically Robust Reversible Watermarking”, ACM Multimedia - International Workshop on Advanced Multimedia Computing for Smart Manufacturing and Engineering (ACM MM Workshop), Nov. 2, 2023, Ottawa, ON, Canada.

    5. [5] Xiaojian Ji#, Li Dong*, Rangding Wang, Diqun Yan, Yang Yin, Jinyu Tian, “Gradient Sign Inversion: Making an Adversarial Attack a Good Defense”, IEEE International Joint Conference on Neural Networks (IJCNN 2023), June 18-23, 2023. Oral Presentation.

    6. [6] Huazheng Hao, Hui Xiao, Li Dong*, Diqun Yan, Dongtai Liang, Jiayan Zhuang, Chengbin Peng, “A Pseudo-Dual Self-Rectification Framework for Semantic Segmentation”, IEEE International Conference on Multimedia & Expo (ICME), pp. 408-413, July 10, 2023.

    7. [7] Kailai Shen, Diqun Yan, Li Dong*, Ying Ren, Xiaoxun Wu, Jing Hu, “SQAT-LD: Speech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction”, IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), pp. 1-6, Dec. 16-20, 2023.

    8. [8] Xinmiao Dai, Chong Wang, Haohe Li, Sunqi Lin, Li Dong*, Jiafei Wu, Jun Wang, “Synthetic Feature Assessment for Zero-Shot Object Detection”, IEEE International Conference on Multimedia & Expo (ICME), pp. 444-449, July 10, 2023.

    9. [9] Jiale Chen#, Li Dong*, Rangding Wang, Diqun Yan, Weiwei Sun and Hang-Yu Fan, “Physical Anti-Copying Semi-Robust Random Watermarking for QR Code”, International Workshop on Digital-forensics and Watermarking (IWDW 2022), vol. 13825, pp. 131-1418-19 Nov. 2022. Oral Presentation.

    10. [10] Jiacheng Deng#, Terui Mao, Diqun Yan, Li Dong*, Mingyu Dong, “Detection of Synthetic Speech Based on Spectrum Defects”, ACM Multimedia-International Workshop on Deepfake Detection for Audio Multimedia (ACM MM-Workshop), Oct. 14, 2022. Oral Presentation.

    11. [11] Weipeng Liang#, Li Dong*, Rangding Wang, Diqun Yan, Yuanman Li, “Robust Document Image Forgery Localization Against Image Blending”, International Conferences on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 810-817, Oral Presentation, 2022.

    12. [12] Ce Xie, Yuanman Li, Rongqin Liang, Li Dong*, and Xia Li, “Synchronous Bi-Directional Pedestrian Trajectory Prediction with Error Compensation”, Asian Conference on Computer Vision (ACCV), Poster, Nov. 2022.

    13. [13] Ning Lu#, Li Dong*, Diqun Yan, Xianliang Jiang, “On Attacking Deep Image Quality Evaluator via Spatial Transform”, IEEE International Conference on Systems, Man, and Cybernetics (SMC), vol. 2022, pp. 2876-2881, Oral Presentation, Oct. 2022.

    14. [14] Li Dong*, Jiale Chen#, Chengbin Peng, Yuanman Li, Weiwei Sun, “Watermark-preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking”, IEEE International Conference on Multimedia & Expo (ICME), July 18-22, 2022, Taipei, Taiwan. Oral Presentation (Top 15% Paper).

    15. [15] Li Dong*, Jie Wang#, Rangding Wang, Yuanman Li, Weiwei Sun, “Towards Image Data Hiding via Facial Stego Synthesis with Generative Model”, International Joint Conference on Artificial Intelligence - International Workshop on Safety & Security of Deep Learning (IJCAI - Workshop), August 21-26, 2021. Oral Presentation.

    16. [16] Li Dong*, Jiantao Zhou, Weiwei Sun, Diqun Yan, Rangding Wang, “First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding”, IEEE International Symposium on Circuits & Systems (ISCAS), May 17-20, 2020. Seville, Spain. Lecture Presentation.

    17. [17] Jie Wang#, Rangding Wang, Li Dong*, and Diqun Yan, “Robust, Imperceptible and End-To-End Audio Steganography Based on CNN”, International Conference on Security and Privacy in Digital Economy (SPDE), Quzhou, China, Oct. 30 – Nov. 1, 2020. Best Student Paper Award.

    18. [18] Li Dong*, Jiantao Zhou, Tao Dai, “Color Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling”, IEEE International Conference on Multimedia and Expo (ICME), 23-27 July 2018, San Diego, USA. Oral Presentation (Top 15% Paper).

    19. [19] Li Dong*, Jiantao Zhou, “Locally Adaptive Noise Covariance Estimation for Color Images”, International Forum on Digital TV and Wireless Multimedia Communications (IFTC), pp. 91-105, 20-23 September, Shanghai, China. Oral Presentation.

    20. [20] Li Dong*, Jiantao Zhou, Guangtao Zhai, “Efficient Image Sensor Noise Estimation via Iterative Re-weighted Least Square”, IEEE International Conference on Multimedia and Expo (ICME), 10-15 July 2017, Hong Kong, China.

    21. [21] Li Dong*, Jiantao Zhou, “Estimating Noise Level for Natural Images Based on Scale-Invariant Kurtosis and Piecewise Stationarity”, IEEE International Conference on Image Processing (ICIP), pp. 4393-4397, 25-28 September 2016, Phoenix, U.S.

    22. [22] Li Dong*, Jiantao Zhou, “Noise-Robust SLIC Superpixel for Natural Images”, IEEE International Conference on Cloud Computing and Big Data (CCBD), pp. 335-340, 16-18 November 2016, Macau, China.

    23. [23] Li Dong*, Jiantao Zhou, Yuan Yan Tang, Xianming Liu, “Estimation of Capacity Parameters for Dynamic Histogram Shifting (DHS)-based Reversible Image Watermarking”, IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6, 14-18 July 2014.

    24. [24] Li Dong*, Jian Wang, Yuanman Li, Yuan Yan Tang, “Sector Projection Fourier Descriptor for Character Recognition”, IEEE International Conference on Cybernetics, Oral Presentation, pp.162-167, 13-15 June 2013, Lausanne, Switzerland.



    Patents

    1. [1] Jiantao Zhou, Weiwei Sun, and Li Dong, "Method for Reversible Image Data Hiding", US Patent, granted, Patent number: US 9639912 B2, 2017. (Patent period: 2017.05.02 - 2035.05.20)
    2. [2] Li Dong; Ji Xiaojian; Wang Rangding; Yan Diqun, "Method for Defending Against Gradient-Based Adversarial Attacks", Chinese Invention Patent, granted, Patent number: ZL 2022 1 1146344.4, granted on 2023-09-15.
    3. [3] Li Dong; Wang Donghua; Lu Ning; Xu Zherun, "Method for Image Pre-processing to Resist JPEG Compression Distortion Using Neural Networks", Chinese Invention Patent, granted, Patent number: ZL 2021 1 1112334.4, granted on 2023-08-08.
    4. [4] Li Dong; Lu Ning; Yan Diqun; Wang Rangding, "Method for Generating Adversarial Samples to Resist JPEG Compression", Chinese Invention Patent, granted, Patent number: ZL 2022 1 0463842.5, granted on 2023-08-08.
    5. [5] Li Dong; Deng Jiacheng; Wang Rangding; Wang Donghua; Peng Chengbin, "Method for Quickly Obtaining Speech Adversarial Samples Under Black-box Attacks", Chinese Invention Patent, granted, Patent number: ZL 2022 1 0106435.9, granted on 2023-08-08.


    Software Copyrights

    1. [1] Li Dong, Liang Weipeng, Document Image Tampering Detection System for Real-world Scenarios, Software Copyright Registration No. 11657372, 2023-09-14.
    2. [2] Li Dong, Li Hongbang, Wang Rangding, Wu Sifan, Dynamic Watermark QR Code Payment Software, Software Copyright Registration No. 11248916, 2023-06-14.
    3. [3] Li Dong, Zhang Ran, Liang Hangfeng, Zhao Luoman, Zhang Jingyi, Image Authentication and Self-Repair System Based on Reversible Watermarking, Software Copyright Registration No. 11035350, 2023-04-07.


    Awards and Honors

  • "Teacher of Backbone Talent" from the Ministry of Education and Huawei Smart Foundation, 2023
  • "Advanced Individual" at the 20th China Graduate Mathematical Modeling Competition, 2023
  • Excellent Paper Award at the 25th and 26th Annual Conferences of the Zhejiang Computer Applications and Education Society, 2022
  • Teaching Award from the Ministry of Education and Huawei Smart Foundation for Industry-Education Collaboration, 2022
  • Lege Innovation Teaching Award, Ningbo University, 2020
  • Outstanding Class Advisor, Ningbo University, 2020 and 2022
  • Outstanding Graduate Award, University of Macau, December 2014
  • Outstanding Graduate, Chongqing University, June 2012
  • National Inspirational Scholarship and Qiushi Scholarship, 2010-2012


  • Awards and Honors

  • "Teacher of Backbone Talent" from the Ministry of Education and Huawei Smart Foundation, 2023
  • "Advanced Individual" at the 20th China Graduate Mathematical Modeling Competition, 2023
  • Excellent Paper Award at the 25th and 26th Annual Conferences of the Zhejiang Computer Applications and Education Society, 2022
  • Teaching Award from the Ministry of Education and Huawei Smart Foundation for Industry-Education Collaboration, 2022
  • Lege Innovation Teaching Award, Ningbo University, 2020
  • Outstanding Class Advisor, Ningbo University, 2020 and 2022
  • Outstanding Graduate Award, University of Macau, December 2014
  • Outstanding Graduate, Chongqing University, June 2012
  • National Inspirational Scholarship and Qiushi Scholarship, 2010-2012


  • Supervised Students' Awards

  • 2023, 2nd Prize (1), 3rd Prize (1) in the 20th China Graduate Mathematical Modeling Competition, Supervisor
  • 2022, Huawei Ascend Wisdom Gold Quality Award (3rd batch)
  • 2022, 2nd Prize (2), 3rd Prize (3) in the 19th China Graduate Mathematical Modeling Competition, Supervisor
  • 2022, 15th National College Student Information Security Competition - Merit Award, Supervisor
  • 2022/2023, U.S. Mathematical Modeling Competition (MCM) Meritorious Winner/Honorable Mention, Supervisor (2 M Awards, 2 H Awards)
  • 2022, 1st China Graduate Cybersecurity Innovation Competition - Creative Work Contest 2nd Prize, Supervisor
  • 2021, 18th China Graduate Mathematical Modeling Competition, 2nd Prize, 3rd Prize, Supervisor (one of each)
  • 2020, 17th China Graduate Mathematical Modeling Competition, 1st Prize (1), 3rd Prize (1), Supervisor
  • 2020, International Conference on Security and Privacy in Digital Economy (SPDE), Best Student Paper Award


  • Research Projects Led

    1. [1] 2020/01-2022/12, Fast Estimation and Application Research of Locally Adaptive Multi-Channel Image Noise, National Natural Science Foundation of China Youth Project (61901237)
    2. [2] 2021/12-2022/09, Design and Implementation of Physically Uncloneable QR Code Anti-Counterfeiting Watermark, Alibaba Innovation Research Program
    3. [3] 2023/03-2024/04, Robust Image Watermarking Attack-Defense Research under Adversarial Environments, Alibaba Innovation Research Program
    4. [4] 2025/01-2026/01, Large Capacity Digital Watermarking Technology for AIGC Traceability and Authentication, CCF-Huawei Poplar Forest Fund - Trusted Computing Field Special Project (CCF-HuaweiTC202411)
    5. [5] 2024/06-2026/05, Robust Adversarial Watermark Research for Document Image Content Protection, Ningbo Natural Science Foundation - General Project (2024J210)
    6. [6] 2023/01-2025/12, Semi-Robust Watermark Research for Anti-Counterfeiting of Physical QR Codes, Zhejiang Provincial Natural Science Foundation - Exploration General Project (LY23F020011)
    7. [7] 2020/01-2020/12, Real Image Denoising Research Based on Conditional Generative Adversarial Networks, Zhejiang University CAD&CG National Key Laboratory Open Project (A2006)
    8. [8] 2022/09-2025/08, Image Tampering Detection and Localization for Complex Real-World Scenarios, Ningbo Natural Science Foundation - Youth Doctor Innovation Research Project (2022J080)
    9. [9] 2019/01-2020/12, Image Noise Modeling and Application Research Based on Generative Adversarial Neural Networks, Ningbo Natural Science Foundation - General Project (2019A610103)
    10. [10] 2018/12-2021/11, Image Noise Modeling and Application Research Based on Neural Networks, Ningbo University Excellent Ph.D. D1 Talent Scientific Research Startup Fund
    11. [11] 2022/06-2022/09, AI Model Development Based on AI Framework in Ascend Processor Environment, Huawei Technologies Co., Ltd.
    12. [12] 2022/09-2022/11, Ascend Wisdom CANN PyTorch Training Model, Huawei Technologies Co., Ltd.


    Teaching and Research

    1. [1] 2022/01-2023/12, Research on the Construction and Practice of Blended "Machine Learning" Course (Online and Offline), Ningbo University Teaching Research Project General Project (JYXMXZD2022125)
    2. [2] Li Dong, Chengbin Peng, Diqun Yan, Jiangbo Qian. "Teaching Reform of Undergraduate Machine Learning Course Based on Hierarchical Cognitive Model", Computer Education, 2023(05):91-95. DOI: 10.16512/j.cnki.jsjjy.2023.05.009. CCF Recommended Category C Chinese Journal, Teaching Reform Research Article


    Professional Activities

  • Journal Reviewer:Journal Reviewer: IEEE Transactions on Image Processing (TIP), IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Signal Processing Magazine (SPM), IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), IEEE Transactions on Multimedia (TMM), IEEE Communications Surveys and Tutorials, IEEE Internet of Things Journal (IoTJ), IEEE Signal Processing Letters (SPL), ACM Transactions on Internet Technology, Signal Processing, Expert Systems With Applications, Knowledge-Based Systems, IET Image Processing, Journal of the Audio Engineering Society, SoftwareX, Journal of Software, Computer Engineering, and others.
  • Conference Reviewer:NeurIPS, ICML, ICLR, ICCV, IJCAI, ACM MM, ICME, ACCV, ICIP, ICASSP, ISIT, ISCAS, SMC, IJCNN, ICONIP, IWDW, ICC, CICAI (CAAI International Conference on Artificial Intelligence), and others.
  • 2023 IJCNN Session Chair, 2024 APSIPA ASC Special Session Co-Chair


  • Course Teaching

  • Computer Applications Basics B2, Fall 2019
  • Advanced Programming Languages C1, (Spring 2020 – Present, annually)
  • Machine Learning, (Spring 2020 – Present, annually)
  • Data Mining and Machine Learning (Graduate Course), Fall 2022
  • Computer Applications Basics A1, (Fall 2020 – Present, annually)
  • Frontiers in Computer Science, (Fall 2019 – Present, annually)
  • Advanced Signal Processing (Ph.D. Course), (Spring 2022 – Present, annually)
  • Cloud Computing Technology, Spring 2023


  • Academic Positions

  • IEEE Member, ACM Member
  • Member of China Computer Federation (CCF)
  • Member of China Society of Image and Graphics (CSIG)
  • Member of the CSIG Digital Forensics and Security Committee
  • Member of Zhejiang Signal Processing Society


  • Team Introduction

    1. We warmly welcome students who are interested in multimedia image and audio security to join our research group! 😊🎉
      As a team dedicated to multimedia security research, we focus on the various security challenges brought about by the rapid development of information technology and strive to solve current and future security issues. 👩‍🎓🤝👨‍💻👩‍💻
      In our research group, you will have the opportunity to participate in various interesting research projects such as digital watermarking, digital steganography, image forensics, and adversarial attacks and defenses in deep models, gaining in-depth understanding of the theory and practice of multimedia security. 🔍🤔
      We have a young, energetic, talented, and innovative research team, adhering to the work attitude of unity, diligence, and innovation, to explore the mysteries of the multimedia security field together with you! 💪🤝🔬
      Finally, all members of the research group sincerely welcome you to join us! 🎉🚀🔍

    Contact


  • Email: dongli@nbu.edu.cn
  • Mailing address: Room 505, Yang Yongman Building, Ningbo University