Yuanman Li 李元滿

Postdoc.

1         Experience

  • Postdoc Fellow, University of Macau, Macau, Dec. 2018 – present
  • Research Assistant, University of Macau, Macau, Sept. 2018 – Dec. 2018

2         Education

  • D. in Computer and Information Science, University of Macau, Macau, Aug. 2015 – Sept. 2018
  • S. in Software Engineering, University of Macau, Macau, Aug. 2018 – Aug. 2015
  • E. in Software Engineering, Chongqing University, China, Sept. 2008 – Jul. 2012

3         Award

  • Scientific and Technological R&D Award for Postgraduates of Macao Science and Technology
    Awards, FDCT, Macau (2018)
  • Full Postgraduate Scholarship, University of Macau (2012-2015)
  • Outstanding Graduates, Chongqing University (2012)
  • National Scholarship, Ministry of Education, China (2011)

4         Research Interests

  • Multimedia security and forensics
  • Machine learning
  • Subspace representation

5         Publication

5.1        Journal paper

  1. Duan, J. T. Zhou, and Y. M. Li, “Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF)”, Accepted in IEEE Trans. on Services Computing (T-SC), 2019.
  2. M. Li and J. T. Zhou, “Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 14, no. 5, pp. 1307-1322, 2019.
  3. M. Li, J. T. Zhou, and A. Cheng, “SIFT Keypoint Removal via Directed Graph Construction for Color Images”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 12, no. 12, pp. 2971-2985, 2017.
  4. M. Li, J. T. Zhou, A. Cheng, X. M. Liu, and Y. Y. Tang, “SIFT Keypoint Removal and Injection via Convex Relaxation”, IEEE Trans. on Inf. Forensics and Security (T-IFS), vol. 11, no. 8, pp. 1722-1735, 2016.
  5. M. Li and J. T. Zhou, “Anti-Forensics of Lossy Predictive Image Compression”, IEEE Signal Processing Letters (SPL), vol. 22, no. 12, pp. 2219-2223, 2015.

5.2        Conference paper

  1. M. Li, J. T. Zhou, X. W. Zheng, J. Y. Tian and Y. Y. Tang, “Robust Subspace Clustering with
    Independent and Piecewise Identically Distributed (i.p.i.d.) Noise Modeling”, IEEE Conf. Comput.Vis. and Pattern Recogn. (CVPR), 2019 (Oral, top 5.6% paper).
  2. M. Li and J. T. Zhou, “Image Copy-Move Forgery Detection Using Hierarchical Feature Point Matching”, In Proceedings of APSIPA Annual Summit and Conference (ASC-2016), 2016 (Oral)
  3. Duan, J. T. Zhou, and Y. M. Li, “Secure and Verifiable Outsourcing of Nonnegative Matrix
    Factorization (NMF)”, In Proceedings of ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec-16), 2016.
  4. Cheng, Y. M. Li, and J. T. Zhou, “SIFT Keypoint Removal via Convex Relaxation”, In
    Proceedings of IEEE International Conference on Multimedia and Expo (ICME-15), 2015 (Oral,
    top 15% paper)
  5. Y. Li, J. T. Zhou, Y. M. Li, and O. C. Au, “Reducing the Ciphertext Expansion in Image
    Homomorphic Encryption via Linear Interpolation Technique”, In Proceedings of IEEE Global
    Conference on Signal and Information Processing (GlobalSIP-15), 2015.
  6. M. Li and J. T. Zhou, “Sparsity-driven reconstruction of L_{\infty}-decoded images”, In Proceedings of IEEE International Conference on Image Processing (ICIP-14), 2014.
  7. Dong, J. Wang, Y. M. Li and Y. Y. Tang, “Sector projection fourier descriptor for Chinese
    character recognition”, In Proceedings of IEEE International Conference on Cybernetics
    (CYBCONF), 2013.

6         Contact Details

Faculty of Science and Technology

University of Macau, E11

Avenida da Universidade, Taipa,

Macau, China

Room: E11-2024

Email: yuanmanx.li@gmail.com