簡介
李偉祥,工學博士,助理教授,特聘研究員,博士生導師/碩士生導師,深圳市優(yōu)秀博士后,深圳市高層次引進特聘崗位人才(C類)。2016年獲得西安電子科技大學信息安全工學學士學位,2021年獲得中國科學技術大學網(wǎng)絡空間安全工學博士學位。主要研究興趣為信息隱藏、多媒體取證與安全,在國內外重要期刊和會議上發(fā)表學術論文近30篇(含IEEE Trans/CCF-A論文近20篇),獲得ACM IH&MMSec最佳學生論文獎等國內外優(yōu)秀學術論文獎5項。主持國家自然科學基金面上項目等國家及省部級項目4項,參與國家自然科學基金聯(lián)合基金重點項目2項。擔任中國圖象圖形學學會(CSIG)數(shù)字媒體取證與安全專委會委員,以及十余個IEEE Trans/CCF-A期刊與會議審稿人。指導學生獲中國研究生網(wǎng)絡安全創(chuàng)新大賽全國二等獎、全國信息隱藏及檢測對抗競賽圖像組冠軍。
聯(lián)系方式
郵箱:liweixiang_AT_szu.edu.cn
地址:深圳大學滄海校區(qū)電子與信息工程學院致信樓N801
研究興趣
信息隱藏、多媒體取證與安全
招生方向
信息與通信工程(學術型博士/碩士)、新一代電子信息技術(專業(yè)型碩士)
科研平臺
廣東省智能信息處理重點實驗室、深圳市媒體信息內容安全重點實驗室
主持/參與科研項目
·國家自然科學基金面上項目(625***28),2026.01-2029.12,主持.
·國家自然科學基金青年科學基金項目C類(622***10),2023.01-2025.12,主持
·中國博士后科學基金面上項目(2022M7***92),2022.11-2024.04,主持
·廣東省自然科學基金面上項目(2025A15150***92),2025.01-2027.12,主持
·深圳市新引進高精尖缺人才科研啟動項目,2026.01-2028.12,主持
·深圳大學青年教師科研啟動項目,2024.05-2026.12,主持
·國家自然科學基金聯(lián)合基金重點項目(U22B***7),2023.01-2026.12,參與
·國家自然科學基金聯(lián)合基金重點項目(U23B***2),2024.01-2027.12,參與
獲得獎勵
·2025年:深圳大學電子與信息工程學院優(yōu)秀共產(chǎn)黨員、2025年度廣東省計算機學會優(yōu)秀論文獎二等獎(第一作者)
·2024年:2024年度廣東網(wǎng)絡空間安全優(yōu)秀論文一等獎(通訊作者)、2024年深圳市第四屆優(yōu)秀科技學術論文獎(通訊作者)、隱者聯(lián)盟2024年度杰出論文獎
·2023年:深圳市優(yōu)秀博士后(全市50人)、全國信息隱藏及檢測對抗競賽CIHC2023圖像賽道冠軍(指導老師)
·2022年:中國研究生網(wǎng)絡安全創(chuàng)新大賽全國二等獎(指導老師)
·2021年:中國科學技術大學“優(yōu)秀畢業(yè)生”
·2020年:國家獎學金(博士研究生)、“王小謨網(wǎng)絡空間科技英才”優(yōu)秀學生獎學金
·2019年:中國互聯(lián)網(wǎng)發(fā)展基金會網(wǎng)絡安全獎學金
·2018年:國際信息隱藏及多媒體安全領域旗艦學術會議2018 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec) 唯一“最佳學生論文獎”(第一作者)
代表性論文(帶*為通訊作者)
[1]Weixiang Li, Bin Li*, Weiming Zhang and Shengli Zhang. Quaternary Quantized Gaussian Modulation with Optimal Polarity Map Selection for JPEG Steganography[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2023, 18: 5026-5040.
[2]Weixiang Li, Shihang Wu, Bin Li*, Weixuan Tang and Xinpeng Zhang. Payload-Independent Direct Cost Learning for Image Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2024, 34(3): 1970-1975.
[3]Weixiang Li, Weiminig Zhang*, Li Li, Hang Zhou and Nenghai Yu. Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes[J]. IEEE Transactions on Communications (TCOM), 2020, 68(7): 3948-3962.
[4]Weixiang Li, Wenbo Zhou, Weiming Zhang*, Chuan Qin, Huanhuan Hu and Nenghai Yu. Shortening the Cover for Fast JPEG Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(6): 1745-1757.
[5]Weixiang Li, Kejiang Chen, Weiming Zhang*, Hang Zhou, Yaofei Wang and Nenghai Yu. JPEG Steganography with Estimated Side-Information[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(7): 2288-2294.
[6]Weixiang Li, Weiming Zhang*, Kejiang Chen, Wenbo Zhou and Nenghai Yu. Defining Joint Distortion for JPEG Steganography[C]. Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2018), 2018: 5-16. (Best Student Paper Award)
[7]Weixiang Li, Bin Li*, Kengtao Zheng, Songze Li, and Haodong Li. Document Image Forgery Detection and Localization in Desensitization Scenarios[J]. Signal Processing, 2026, 238: 110123.
[8]Bin Li, Jincheng Chen, Yuxiong Xu, Weixiang Li* and Zhenghui Liu. DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 6529-6544.
[9]Bin Li, Jian Shi, Weixiang Li* and Haodong Li. WebP-JPEG Transcoding Detection by Spotting Re-compression Artifacts with CNN-ViT for Processing Dual-domain Features[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2024, 34(12): 12535-12549.
[10]Xulong Liu, Weixiang Li*, Kaiqing Lin and Bin Li. Spatial-frequency Feature Fusion Network for Lightweight and Arbitrary-sized JPEG Steganalysis[J]. IEEE Signal Processing Letters (SPL), 2024, 31: 2585-2589.
[11]Kaiqing Lin, Bin Li*, Weixiang Li, Mauro Barni, Benedetta Tondi, and Xulong Liu. Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 9390-9405.
[12]Yaofei Wang, Weiming Zhang*, Weixiang Li, and Nenghai Yu. Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2021, 16: 1117-1130.
[13]Yaofei Wang, Weiming Zhang*, Weixiang Li, Xinzhi Yu, and Nenghai Yu. Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2020, 15: 2081-2095.
[14]Yaofei Wang, Weixiang Li, Weiming Zhang*, Xinzhi Yu, Kunlin Liu, and Nenghai Yu. BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2021, 31(5): 2082-2088.
[15]Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang*, and Nenghai Yu. Derivative-based Steganographic Distortion and Its Non-additive Extensions for Audio[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(7): 2027-2032.
[16]Jiansong Zhang, Kejiang Chen*, Weixiang Li, Weiming Zhang, and Nenghai Yu. Steganography With Generated Images: Leveraging Volatility to Enhance Security[J]. IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21(4): 3994-4005.
[17]Hang Zhou, Kejiang Chen*, Weiming Zhang*, Weixiang Li, and Nenghai Yu. Three-Dimensional Mesh Steganography and Steganalysis: A Review[J]. IEEE Transactions on Visualization and Computer Graphics (TVCG), 2021, 28(12): 5006-5025.
[18]Kaiqing Lin, Yuzhen Lin, Weixiang Li, Taiping Yao, and Bin Li*. Standing on The Shoulders of Giants: Reprogramming Visual-language Model for General Deepfake Detection[C]. Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), 2025, 39(5): 5262-5270.
[19]Yuxiong Xu, Bin Li*, Weixiang Li, Sara Mandelli, Viola Negroni, and Sheng Li. ALDEN: Dual-Level Disentanglement with Meta-learning for Generalizable Audio Deepfake Detection[C]. Proceedings of the 33rd ACM International Conference on Multimedia (ACM MM), 2025: 7277-7286.
[20]Kaiqing Lin, Zhiyuan Yan, Ke-Yue Zhang, Li Hao, Yue Zhou, Yuzhen Lin, Weixiang Li, Taiping Yao, Shouhong Ding, and Bin Li*. Guard Me If You Know Me: Protecting Specific Face-Identity from Deepfakes[C]. Advances in Neural Information Processing Systems (NeurIPS), 2025.
發(fā)明專利
[1]張衛(wèi)明, 俞能海, 李偉祥, 李莉. 隱寫編解碼方法、裝置及設備(ZL201910360912.2)
[2]李斌, 鄭鏗濤, 李偉祥. 基于對比學習的文檔圖像篡改定位和脫敏定位方法及終端(ZL202310970608.6)
[3]李偉祥, 陳金城, 王功華, 李斌. 基于嵌入強度預測網(wǎng)絡的音頻魯棒水印生成方法及終端(CN202410937431.4)
[4]李偉祥, 李斌, 施簡.一種解壓后WebP圖像量化參數(shù)估計方法、裝置及終端(CN202511077831.3)
[5]李斌, 肖鑫甜, 李偉祥.一種面向WebP有損壓縮圖像的自適應隱寫方法及系統(tǒng)(CN202511142790.1)
[6]李斌, 施簡, 李偉祥. 一種融合高頻空域和DCT域的有損壓縮檢測方法及終端(CN202310830562.8)
[7]李斌, 許裕雄, 李偉祥.一種音頻深度偽造檢測方法、裝置、終端及存儲介質(CN202511075784.9)