Skip to main content Skip to navigation

Publications

Books

 Book1  Book 2 Book 3 Book 4 ACM_MMSEC12 Book 5

  1. C.-T. Li (Ed), "Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security," IGI Global, Hershey, PA. USA, May 2013 pdf_logo.jpg
  2. C.-T. Li, J. Dittmann, S. Katzenbeisser and S. Craver, "Multimedia and Security Workshop, MM&Sec 2012," Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6
  3. C.-T. Li and A. Ho (Ed), "Crime Prevention Technologies and Applications for Advancing Criminal Investigation," IGI Global, Hershey, PA. USA, June 2012 pdf_logo.jpg
  4. C.-T. Li and A. Ho (Ed), "New Technologies for Digital Crime and Forensics: Devices, Applications, and Software," IGI Global, Hershey, PA. USA, June 2011 pdf_logo.jpg
  5. C.-T. Li (Ed), "Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions," IGI Global, Hershey, PA. USA, November 2009 pdf_logo.jpg
  6. C.-T. Li (Ed), "Multimedia Forensics and Security," IGI Global, Hershey, PA. USA, April 2008 pdf_logo.jpg

 


Journal Papers

  1. R. Leyva, V. Sanchez and C.-T. Li, "Compact and Low-complexity Binary Feature Descriptor and Fisher Vector for Video Analytics," IEEE Transactions on Image Processing, vol. 28, no. 12, Dec. 2019
  2. G. Storey, A. Bouridane, R. Jiang and C.-T. Li, "3DPalsyNet: A Facial Palsy Grading and Motion Recognition Framework Using Fully 3D Convolutional Neural Networks", IEEE Access, 2019
  3. R. Rouhi, F. Bertini, D. Montesi, X. Lin, Y. Quan, C.-T. Li, "Hybrid Clustering of Shared Images on Social Networks for Digital Forensics", IEEE Access, 2019
  4. C.-C. Chang, C.-T. Li and K. Chen, "Privacy-Preserving Reversible Information Hiding Based on Square Roots of Quadratic Residues,” IEEE Access, 2019
  5. C.-C. Chang, C.-T. Li, “Algebraic secret sharing based on privacy homomorphisms for IoT-aware healthcare system,” Mathematical Biosciences and Engineering (accepted) 2019
  6. I. Amerini, C.-T. Li, R. Caldelli, "Social Network Identification through Image Classification with CNN", IEEE Access, 2019
  7. S. Ren, L. He, J. Li, Z. Chen, P. Jiang, and C.-T. Li, "Contention-aware Prediction for Performance Impact of Task Co-running in Multicore Computers," Wireless Networks, pp 1–8, Feb 2019
  8. C.-C. Chang, C.-T. Li and Y. Shi, “Privacy-Aware Reversible Watermarking in Cloud Computing Environments,” IEEE Access, 2018 (DOI: 10.1109/ACCESS.2018.2880904)
  9. N. Jia, V. Sanchez, C.-T. Li, "View-invariant Gait Recognition: A Feature Selection Solution," IET Biometrics, vol. 7, no. 4, pp. 287 – 295, July 2018, DOI: 10.1049/iet-bmt.2017.0151
  10. R. Li, C.-T. Li and Y. Guan "Inference of a Compact Representation of Sensor Fingerprint for Source Camera Identification," Pattern Recognition, vol. 74, no. 2, pp. 556 -567, 2018

  11. F. Calderon, S. Bravo-Solorio, C.-T. Li, an A. K. Nandi, "Fast Fragile Watermark Embedding and Iterative Mechanism with High Self-Restoration Performance,” Digital Signal Processing, vol. 73, pp. 83-92, Feb 2018, doi.org/10.1016/j.dsp.2017.11.005

  12. H. Zhu, Z. Gu, H. Zhao, K. Chen, C.-T. Li, L. He, “Developing a pattern discovery method in time series data and its GPU acceleration,” Big Data Mining and Analytics, vol. 1, no. 4, December 2018, DOI: 10.26599/BDMA.2018.9020021

  13. X. Guan, C.-T. Li, and Y. Guan, "Matrix Factorization with Rating Completion: an Enhanced SVD Model for Collaborative Filtering Recommender Systems,” IEEE Access, vol. 5, pp. 27668 – 27678, Nov 2017

  14. B. Wang, C. Chen, L. He, B. Gao, J Ren, Z. Fu, S. Fu, Y. Hu, C.-T. Li, "Modelling and developing conflict-aware scheduling on large-scale data centres," Future Generation Computer Systems, DOI: https://doi.org/10.1016/j.future.2017.07.043 (accepted)

  15. H. Zhu, L. He, S. Fu, R. Li, Z. Fu, X. Han, Y. Hu, C.-T. Li, "WolfPath: Accelerating iterative traversing-based graph processing algorithms on GPU," International Journal of Parallel Programming, (accepted)

  16. C.-T. Li and X. Lin, “A Fast Source-Oriented Image Clustering Method for Digital Forensics,” EURASIP Journal on Image and Video Processing, 2017:69, Dec 2017

  17. A Khadidos, V. Sanchez, and C-T Li, “Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation,” IEEE Transactions on Image Processing, vol. 26, no. 4, pp. 1979 - 1991, April 2017

  18. R. Leyva, V. Sanchez and C.-T. Li, "Anomaly Detection with Compact Feature Sets for Online Performance," IEEE Transactions on Image Processing, vol. 26, no. 7, pp. 3463 – 3478, July 2017

  19. X. Lin and C.-T. Li, "Large-Scale Image Clustering based on Camera Fingerprint,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 793-1808, April 2017 pdf_logo.jpg
  20. F. Azhar and C.-T. Li, "Hierarchical Relaxed Partitioning System for Activity Recognition," IEEE Transactions on Cybernetics, vol. 47, no. 3, pp. 784 - 795, March 2017 pdf_logo.jpg
  21. Y. Liang, C.-T. Li, Y. Guan and Y. Hu, "Gait Recognition based on the Golden Ratio, EURASIP Journal on Image and Video Processing, (2016) 2016: 22. doi:10.1186/s13640-016-0126-5, Dec 2016 pdf_logo.jpg
  22. X. Lin and C.-T. Li, "Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization," IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 126-140, Jan 2016 pdf_logo.jpg
  23. X. Lin and C.-T. Li, "Enhancing Sensor Pattern Noise via Filtering Distortion Removal," IEEE Signal Processing Letter, vol. 23, no. 3, pp. 381 - 385, March 2016 pdf_logo.jpg
  24. Y Guan, C.-T. Li and F. Roli, "On Reducing the Effect of Covariate Factors in Gait Recognition: a Classifier Ensemble Method," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 37, no. 7, pp 1521 - 1528, July 2015 Paperpdf_logo.jpg, Supplementpdf_logo.jpg
  25. Y. Hu, C.-T. Li and Z. Lai, "Fast source camera identification using matching signs between query and reference fingerprints," Multimedia Tools and Applications, vol. 74, no. 18, pp. 7405–7428, 2015, DOI 10.1007/s11042-014-1985-3
  26. X. Wei, C.-T. Li, Z. Lei, D. Yi and S. Z. Li, "Dynamic Image-to-Class Warping for Occluded Face Recognition," IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2035-2050, Dec 2014 pdf_logo.jpg
  27. Y. Guan, Y. Sun, C.-T. Li and M. Tistarelli, "Human Gait Identification from Extremely Low Quality Videos: an Enhanced Classier Ensemble Method," IET Biometrics, vol. 3, no. 2, pp. 84 - 93, April 2014 pdf_logo.jpg
  28. Y. Guan, X. Wei and C.-T Li, "On the Generalization Power of Face and Gait in Gender Recognition," International Journal of Digital Crime and Forensics, vol. 6, no. 1, pp. 1-8, Jan 2014 (Winner of the IGI Global Seventh Annual Excellence in Research Journal Awards) pdf_logo.jpg
  29. A. Mouhtaropoulos and C.-T. Li, "Digital Forensic Readiness: Are we there yet?" Journal of International Commercial Law and Technology, vol. 9, no. 3, 2014
  30. C.-T. Li and R. Satta, "Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise," IET Computer Vision, vol. 6, no. 6 pp. 560 - 566, Nov. 2012 pdf_logo.jpg
  31. C.-T. Li and Y. Li, "Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics," IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 2, pp. 260-271, Feb 2012 pdf_logo.jpg
  32. Y. Yuan , C.-T. Li, O. Windram, "Directed Partial Correlation: Inferring Large-Scale Gene Regulatory Network through Induced Topology Disruptions" PLoS ONE, vol. 6, no. 4, e16835, 2011 pdf_logo.jpg
  33. C.-T Li and Y. Li, "Progressive Exponential Clustering-Based Steganography," EURASIP Journal of Advances in Signal Processing, vol. 2010, Article ID 212517, 14 pages, doi:10.1155/2010/212517 pdf_logo.jpg
  34. C.-T Li, "A Conditional Random Field Approach to Unsupervised Texture Image Segmentation," EURASIP Journal of Advances in Signal Processing, vol. 2010, Article ID: 167942, 12 pages, doi:10.1155/2010/167942 pdf_logo.jpg
  35. F. Peng, R-S. Guo, C-T. Li and M. Long, "A Semi-Fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation," Computer Aided Design, vol. 42, no. 12, pp. 1207-1216, December 2010
  36. C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280 - 287, June 2010 pdf_logo.jpg
  37. R. Krishna, C.-T Li and V. Buchanan-Wollaston, "A Temporal Precedence Based Clustering Method for Gene Expression Microarray Data," BMC Bioinformatics 2010, 11:68 pdf_logo.jpg
  38. Y. Yang, X.Sun, H. Yang, C.-T. Li and R. Xiao, "A Contrast-Sensitive Reversible Visible Image Watermarking Technique," IEEE Transactions on Circuits and Systems for Video Technology,vol. 19, no. 5, pp. 656 - 667, May 2009 pdf_logo.jpg
  39. C.-H. Wei, Y. Li, W. Y. Chau, and C.-T. Li, "Trademark Image Retrieval Using Synthetic Features for Describing Global Shape and Interior Structure," Pattern Recognition, vol. 42, no. 3, pp. 386-394, 2009 pdf_logo.jpg
  40. C.-T. Li, Y. Li and C.-H. Wei "Protection of Digital Mammograms on PACSs Using Data Hiding Techniques" International Journal of Digital Crime and Forensics, vol. 1, no. 1, pp. 75 - 88, January 2009pdf_logo.jpg
  41. C.-T. Li, Y. Yuan, and R. Wilson, "An Unsupervised Conditional Random Fields Approach for Clustering Gene Expression Time Series," Bioinformatics, vol. 24, no. 21, pp. 2467-2473, August 2008 (doi: 10.1093/bioinformatics/btn375) pdf_logo.jpg
  42. Y. Yuan, C.-T. Li and R. Wilson, "Partial Mixture Model for Gene Expression Tight Clustering," BMC Bioinformatics, 2008, 9:287. (doi:10.1186/1471-2105-9-287) pdf_logo.jpg
  43. Y. Yuan and C.-T. Li, " Bayesian Random Field Approach for Integrative Large-Scale Regulatory Network Analysis", Journal of Integrative Bioinformatics, 5(2):99, 2008 pdf_logo.jpg
  44. Y. Yang, X. Sun, H. Yang, and C.-T. Li, "A Removable Visible Image Watermarking Algorithm in DCT Domain," Journal of Electronic Imaging, Vol. 17, No. 3, pp. 033008-1 ~ 033008 -11, July - September, 2008 (DOI:10.1117/1.2954128) pdf_logo.jpg
  45. C.-T. Li and H. Si, "Wavelet-based Fragile Watermarking Scheme for Image Authentication," Journal of Electronic Imaging, vol. 16, no. 1, pp. 013009-1 ~ 013009-9, Jan-March 2007 pdf_logo.jpg
  46. C.-T. Li and Y. Yuan, "Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication," Optical Engineering, vol. 45, no. 12, pp. 127001-1 ~ 127001-6, Dec. 2006 pdf_logo.jpg
  47. C.-T. Li, "Reversible Watermarking Scheme with Image-independent Embedding Capacity" IEE Proceedings - Vision, Image, and Signal Processing, vol. 152, no. 6, pp. 779 - 786, 2005 pdf_logo.jpg
  48. C.-T. Li, "Digital Fragile Watermarking Scheme for Authentication of JPEG Images," IEE Proceedings - Vision, Image, and Signal Processing, vol. 151, no. 6, pp. 460 - 466, 2004 pdf_logo.jpg
  49. C.-T. Li and R. Chiao, "Multiresolution Genetic Clustering Algorithm for Texture Segmentation," Image and Vision Computing, vol. 21, no. 11, pp. 955-966, October 2003 pdf_logo.jpg
  50. R. Wilson and C.-T. Li, "A Class of Discrete Multiresolution Random Fields and its Application to Image Segmentation," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 1, pp. 42-56, 2003 pdf_logo.jpg
  51. C.-T. Li and F. M. Yang, "One-dimensional Neighbourhood Forming Strategy for Fragile Watermarking," Journal of Electronic Imaging, vol. 12, no 2, pp. 284-291, April 2003 pdf_logo.jpg
  52. C.-T. Li, D. C. Lou, and J. L. Liu, "Image Integrity and Authenticity Verification Via Content-based Watermarks and a Public Key Cryptosystem," Journal of Chinese Institute of Electrical Engineering, vol. 10, no. 1, pp. 99-106, February 2003 pdf_logo.jpg
  53. C.-T. Li, "Multiresolution Image Segmentation Integrating Gibbs Sampler and Region Merging Algorithm," Signal Processing, vol. 83, no. 1, pp. 67-78, 2003 pdf_logo.jpg
  54. C.-T. Li, "An Approach to Reducing the Labeling Cost of Markov Random Fields within an Infinite Label Space," Signal Processing, vol. 81, no. 3, pp. 609-620, 2001 pdf_logo.jpg

 


Book Chapters

  1. Xufeng Lin and Chang-Tsun Li, "Image Provenance Inference Through Content-Based Device Fingerprint Analysis", in Computational Methods in Information Security: Algorithms, Technologies and Applications, ed. by A. I. Awad, N. Yen, and M. Fairhurst, Institution of Engineering and Technology (IET), 2017.(PDF Document)
  2. X. Wei and C.-T. Li, “Face Recognition Technologies for Evidential Evaluation of Video Traces,” in Biometrics in Forensic Science, ed. by M. Tistarelli and C. Champod, Springer, 2016 (in press)
  3. B. Arbab-Zavar, X. Wei, J.D. Bustard, M.S. Nixon and C.-T. Li, "On Forensic Use of Biometrics with Face and Ear Recognition," in Handbook of Digital Forensics of Multimedia Data and Devices, ed. by A. T. S. Ho and S Li, John Wiley & Sons, Inc. 2014
  4. Y. Hu, C.-T. Li, Y. Wang and B.-B. Liu, "An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery," in Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, ed. by C.-T. Li, IGI Global, 2013
  5. C.-H. Wei and C.-T. Li, " Content Analysis from User's Relevance Feedback for Content-Based Image Retrieval," in Artificial Intelligence for Maximizing Content Based Image Retrieval, ed. by Z. Ma, IGI Global, 2008
  6. C.-H. Wei and C.-T. Li, " Content-Based Retrieval for Mammograms," in Artificial Intelligence for Maximizing Content Based Image Retrieval, ed. by Z. Ma, IGI Global, 2008
  7. H.-F. Shih and C.-T. Li, "Information Security Management in Digital Government," in Encyclopedia of Digital Government, ed. by A.-V. Anttiroiko and M. Mälkiä, Vol. III, pp. 1054 - 1057, Idea Group Publishing, 2006.
  8. H. Si and C.-T. Li, "Maintaining Information Security in E-Government through Steganology," in Encyclopedia of Digital Government, ed. by A.-V. Anttiroiko and M. Mälkiä, Vol. III, pp. 1180 - 1184, Idea Group Publishing, 2006.
  9. C.-H. Wei, C.-T. Li, and R. Wilson, "A Content-based Approach to Medical Image Database Retrieval," in Database Modeling for Industrial Data Management: Emerging Technologies and Applications, ed. by Z. Ma, pp. 258 - 291, Idea Group Publishing, 2006.
  10. C.-T. Li, "Digital Watermarking Schemes for Multimedia Authentication," in Digital Watermarking for Digital Media, ed. by J. Seitz, pp. 30-51, Idea Group Publishing, March 2005.
  11. C.-T. Li, "The Role of Biometrics in Virtual Communities and Digital Governments," in Encyclopedia of Virtual Communities and Technologies, ed. by S. Dasgupta, Part B, pp. 1 - 3, Idea Group Publishing, July 2005.
  12. H. Si and C.-T. Li, " Copyright Protection in Virtual Communities through Digital Watermarking," in Encyclopedia of Virtual Communities and Technologies, ed. by S. Dasgupta, Part C, pp. 61 - 65, Idea Group Publishing, July 2005.
  13. C.-T. Li, "Digital Watermarking for Multimedia Security Management," in Encyclopedia of Multimedia Technology and Networking, ed. by Margherita Pagani, pp. 213-218, Idea Group Publishing, April 2005.
  14. C.-H. Wei and C.-T. Li, "Design of Content-based Multimedia Retrieval," in Encyclopedia of Multimedia Technology and Networking, ed. by Margherita Pagani, pp. 116-122, Idea Group Publishing, April 2005.
  15. D. C. Lou, J. L. Liu, and C.-T Li, "Digital Signature-Based Image Authentication," in Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, ed. by C. S. Lu, pp. 207-230, Idea Group Publishing, 2004.

Conference Papers

  1. A. Algamdi, V. Sanchez, and C-T. Li, “Learning temporal Information from Spatial Information Using CAPSNETS for Human Action Recognition," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, May 2019

  2. C.-C. Chang and C.-T. Li, "Privacy-Preserving reversible watermarking for data exfiltration prevention through lexicographic permutations," in Proc. 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, 26-28 Nov 2018

  3. X. Yu, H. Tan, H. Liang, C.-T. Li, G. Liao, "A Multi-Task Learning CNN for Image Steganalysis," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 11 -13 Dec 2018

  4. Y. Guo, S. Lin, and C.-T. Li, “Homogeneous Feature Transfer and Heterogeneous Location Fine-tuning for Cross-City Property Appraisal Framework,” in Proc. 16th Australian Data Mining Conference, Bathurst, Australia, 28-30 November, 2018

  5. Y. Quan, X. Lin, and C.-T.Li, “Provenance Analysis for Instagram Photos,” in Proc. 16th Australian Data Mining Conference, Bathurst, Australia, 28-30 November, 2018

  6. X. Lin and C.-T. Li, “Rotation-invariant Binary Representation of Sensor Pattern Noise for Source-Oriented Image and Video Clustering,” in Proc. 15th IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS), Auckland, New Zealand, 27-30 November 2018 (Best Paper Award)

  7. C.-C. Chang and C.-T. Li, "Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention through Lexicographic Permutations,” in Proc. 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Sendai, Japan, 26 – 28 November 2018

  8. R. Leyva, V. Sanchez, and C.-T. Li, " 'Detecting Small Objects in High resolution Images with Integral Fisher Score,"" in Proc. IEEE International Conference on Image Processing (ICIP), Athens, Greece, 7 - 10 October 2018

  9. H. Wang, X. Wei, V. Sanchez, C.-T. Li, "Fusion Network for Face-based Age Estimation," in Proc. IEEE International Conference on Image Processing (ICIP), Athens, Greece, 7 - 10 October 2018
  10. S. Ren, L. He, J. Li, Z. Chen, P. Jiang, and C.-T. Li, “Contention-aware Prediction for Performance Impact of Task Co-running in Multicore Computers,” in Proc. The 9th EAI International Conference on Big Data Technologies and Applications, Exeter, UK, 4-5 Sep 2018
  11. S. Lin, C.-T. Li and A. Kot, “Multi-task Mid-level Feature Alignment Network for Unsupervised Cross-Dataset Person Re-Identification”, in Proc. The 29th British Machine Vision Conference, Newcastle, UK, 3 - 6 September 2018
  12. R. Caldelli, I. Amerini, C.-T. Li, "PRNU-based image classification of the origin social network with CNN," in Proc. The 26th European Signal Processing Conference (EUSIPCO 2018), Rome, Italy, 3 – 7 September 2018
  13. R. Leyva, V. Sanchez, and C.-T. Li, "Fast Detection of Abnormal Events in Video with Binary Features," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, Canada, 15–20 April 2018
  14. X. Guan and C.-T. Li, "Active Learning in Multi-Domain Collaborative Filtering Recommender Systems," in Proc. The 33rd ACM Symposium on Applied Computing, Pau, France, 9 – 13 April 2018
  15. C.-C. Chang and C,-T. Li, "Reversible Data Hiding in JPEG Images Based on Adjustable Padding," in Proc. 5th International Workshop on Biometrics and Forensics, Coventry, UK, April 2017
  16. N. Jia, V. Sanchez, C.-T. Li, A. Liew , "Fast and Robust Framework on View-invariant Gait Recognition," in Proc. 5th International Workshop on Biometrics and Forensics, Coventry, UK, April 2017
  17. R. Leyva, V. Sanchez, and C.-T. Li, "The LV Dataset: a Realistic Surveillance Video Dataset for Abnormal Event Detection," in Proc. 5th International Workshop on Biometrics and Forensics, Coventry, UK, April 2017
  18. R. Leyva, V. Sanchez, and C.-T. Li, “Detecting Realistic Abnormal Events with Fast Binary Features,” in Proc. IEEE International Conference on Image Processing (ICIP'17), Beijing, China, 17-20 September 2017
  19. A. Khadidos, V. Sanchez and C.-T. Li, "Patch-based Segmentation of Overlapping Cervical Cells Using Active Contour with Local Edge Information," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, New Orleans, USA, 5 - 9 March 2017
  20. R. Leyva, V. Sanchez, and C.-T. Li, “Fast Binary-Based Video Descriptors for Action Recognition,” in Proc. The International Conference on Digital Image Computing: Techniques and Applications (DICTA'16), Gold Coast, Australia, 30 November - 2 December, 2016
  21. T. T. T. Nguyen, T. T. Nguyen, X. C. Pham, A. W.-C. Liew, Y. Hu, T. Liang, and C.-T. Li, "A Novel Online Bayes Classifier," in Proc. The International Conference on Digital Image Computing: Techniques and Applications (DICTA'16), Gold Coast, Australia, 30 November - 2 December, 2016

  22. R. Leyva, V. Sanchez, and C.-T. Li, “A Fast Binary Pair-based Video Descriptor for Action Recognition,” in Proc. IEEE International Conference on Image Processing (ICIP'16), Phoenix, Arizona, USA, 25 - 28 September, 2016
  23. X. Lin and C.-T. Li, “Refining PRNU-Based Detection of Image Forgeries,” in Proc. The 1st IEEE Digital Media & Academic Forum, Santorini, Greece, 4 -6 July, 2016
  24. X. Guan and C.-T. Li, “Enhanced SVD for Collaborative Filtering,” in Proc. The 20th Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Auckland, New Zealand, 19-22 April, 2016pdf_logo.jpg
  25. N. Jia, V. Sanchez, C.-T. Li and H. Mansour, "On Reducing the Effect of Gait Silhouette Quality On Individual Gait Recognition", in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 16-19 November, 2015
  26. Y. Yao and C.-T. Li, "Hand Gesture Recognition and Spotting in Uncontrolled Environments based on Classifier Weighting", in Proc. IEEE International Conference on Image Processing (ICIP'15), Quebec City, Canada, 27 - 30 Sep. 2015
  27. R. Li, C.-T. Li and Y. Guan, "Incremental Updating Feature Extracion for Camera Identification", in Proc. IEEE International Conference on Image Processing (ICIP'15), Quebec City, Canada, 27 - 30 Sep. 2015
  28. R. Li, C. Kotropoulos and C.-T. Li, "Random Subspace Method for Source Camera Identification," in Proc. IEEE International Workshop on Machine Learning for Signal Processing (MLSP'15), Boston, USA, 17 - 20 Sep. 2015
  29. N. Jia, V. Sanchez, C.-T. Li and H. Mansour, "On Reducing the Effect of Silhouette Quality on Individual Gait Recognition: a Feature Fusion Approach," in Proc. IEEE International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 09 - 11 Sep. 2015
  30. R. Li, C.-T. Li, and Y. Guan, “A Compact Representation of Sensor Fingerprint for Camera Identification and Fingerprint Matching, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Brisbane, Australia, 19 – 24 April, 2015pdf_logo.jpg
  31. R. Leyva, V. Sanchez and C.-T. Li, "Video Anomaly Detection based on Wake Motion Descriptors and Perspective Grids", in Proc. IEEE International Workshop on Information Forensics and Security (WIFS'14), Atlanta, Georgia, USA, 3 - 5 Dec. 2014
  32. A. Khadidos, V. Sanchez and C.-T. Li, "Contours Based on Weighted Gradient Vector Flow and Balloon Forces for Medical Image Segmentation," in Proc. IEEE International Conference on Image Processing, Paris, France, 27 - 30 Oct 2014
  33. A. Khadidos, V. Sanchez and C.-T. Li, "Active Contours with Weighted External Forces for Medical Image Segmentation," in Proc. 18th Annual Conference in Medical Image Understanding and Analysis (MIUA), London, UK, 9 - 11 Jul 2014
  34. R. Li, Y. Guan and C.-T. Li, "PCA-based denoising of Sensor Pattern Noise for Source Camera Identification," in Proc. IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), Xi’an, China, 9 - 13 July 2014
  35. Y. Guan, X. Wei, C.-T. Li, and Y. Keller, "People Identification and Tracking through Fusion of Facial and Gait Features," Int. Workshop on Biometrics (BIOMET), Bulgaria, 23 - 24 June 2014
  36. S. D. Choudhury, Y. Guan and C.-T. Li, "Gait Recognition using Low Spatial and Temporal Resolution Videos," in Proc. 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, 27-28 March 2014
  37. Y. Wang, W. Chen, Y. Li, W. Wang and C.-T. Li, "HPS: Histogram Preserving Steganography in Spatial Domain," in Proc. 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, 27-28 March 2014
  38. X. Lin, C.-T. Li and X. Wei, "Two improved forensic methods of detecting contrast enhancement in digital images," in Proc. IS&T/SPIE Conference on Media Watermarking, Security, and Forensics, San Francisco, USA, 2 - 6 February 2014
  39. R. Li, C.-T. Li and Y. Guan, "A Reference Estimator based on Composite Sensor Pattern Noise for Source Device Identification," in Proc. IS&T/SPIE Conference on Media Watermarking, Security, and Forensics, San Francisco, USA, 2 - 6 February 2014
  40. A. Mouhtaropoulos, C.-T. Li and P. Dimotikalis, "Applying a Digital Forensic Readiness Framework: Three Case Studies," in Proc. IEEE Conference on Technologies for Homeland Security (HST ’13), Boston, Massachusetts, USA, 12 - 14 November, 2013

  41. Y. Yao and C.-T. Li, “Hand Gesture Segmentation in Uncontrolled Environments with Partition Matrix and a Spotting Scheme based on Hidden Conditional Random Fields,” in Proc. IAPR ACPR2013 Workshop on Recent Advances in Computer Vision and Pattern Recognition, Okinawa, Japan, 5 November, 2013

  42. Y. Yao and C.-T. Li, “A Framework for Real-Time Hand Gesture Recognition in Uncontrolled Environments with Partition Matrix Model based on Hidden Conditional Random Fields,” in Proc. IEEE International Conference on Systems, Man, and Cybernetics (SMC 2013), Manchester, UK, 13 – 16, October 2013
  43. Y.Guan, X. Wei, C.-T. Li, G.L.Marcialis, F. Roli and M.Tistarelli, "Combining Gait and Face for Tackling the Elapsed Time Challenges" in Proc. the 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS'13), Washington DC, USA, 29 Sep. - 2 Oct, 2013
  44. Y. Yao and C.-T. Li, "Real-Time Hand Gesture Recognition for Uncontrolled Environments using Adaptive SURF Tracking and Hidden Conditional Random Fields," in Proc. 9th International Symposium on Visual Computing (ISVC), Rethymnon, Crete, Greece, 29 - 31, July 2013pdf_logo.jpg
  45. X. Lin, C.-T. Li and Y. Hu, "Exposing Image Forgery through the Detection of Contrast Enhancement," in Proc. IEEE International Conference on Image Processing, Melbourne, Australia, 15 - 18 Sep 2013pdf_logo.jpg
  46. Z. Lv, Y. Hu, C.-T. Li, B.-B. Liu, "Audio Forensic Authentication Based on MOCC between ENF and Reference Signals," IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), Beijing, China, 6 - 10 July 2013pdf_logo.jpg
  47. X. Wei and C.-T. Li, "Fixation and Saccade based Face Recognition from Single Image per Person with Various Occlusions and Expressions," CVPR 2013 Biometrics Workshop, Portland, Oregon, USA, 13 June 2013 pdf_logo.jpg
  48. Y. Guan and C.-T. Li, "A Robust Speed-Invariant Gait Recognition System for Walker and Runner Identification" in Proc. of the 6th IAPR International Conference on Biometrics (ICB'13), Madrid, Spain, 4-7, Jun. 2013 pdf_logo.jpg
  49. X. Wei, C.-T. Li and Y. Hu, "Face Recognition with Occlusion Using Dynamic Image-to-Class Warping (DICW)," in Proc. IEEE Conference on Automatic Face and Gesture Recognition, ShangHai, China, 22-26 April 2013 pdf_logo.jpg
  50. Y. Guan and C.-T. Li, "Robust Gait Recognition from Extremely Low Frame-Rate Videos," in Proc. International Workshop on Biometrics and Forensics, Lisbon, Portugal, 4-5 April 2013pdf_logo.jpg
  51. X. Wei and C.-T. Li, "Robust Face Recognition with Occlusions in both Reference and Query Images," in Proc. International Workshop on Biometrics and Forensics, Lisbon, Portugal, 4-5 April 2013 pdf_logo.jpg
  52. S. Bravo-Solorio, C.-T. Li, A. K. Nandi, "Watermarking Method with Exact Self-propagating Restoration," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS'12), Tenerife, Spain, December 2-5, 2012 pdf_logo.jpg
  53. X. Wei, C.-T. Li and Y. Hu, "Robust Face Recognition under Varying Illumination and Occlusion considering Structured Sparsity," Proc. The International Conference on Digital Image Computing: Techniques and Applications (DICTA'12), Perth, Australia, 3-5 December 2012pdf_logo.jpg
  54. Y. Hu, C.-T. Li, Z. Lv and B.-B Liu, "Audio Forgery Detection based on Max Offsets for Cross Correlation between ENF and Reference Signal," in Proc. 11th International Workshop on Digital Watermarking (IWDW'12), Shanghai, China, 31 October - 3 November, 2012
  55. A. Mouhtaropoulos and C-T. Li, "Forensic Readiness Framework Components: a Preliminary Approach," in Proc. 7th International Conference on Legal, Security and Privacy Issues in IT Law (LSPI), Athens, Greece, 2-4 October, 2012
  56. S. Bravo-Solorio, C.-T. Li, A. K. Nandi, "Watermarking with Low Embedding Distortion and Self-Propagating Restoration Capabilities," in Proc. IEEE International Conference on Image Processing, Orlando, Florida, USA, 30 Sep ¡V 3 Oct 2012 pdf_logo.jpg
  57. Y. Guan, C.-T. Li and Y. Hu,"An Adaptive System for Gait Recognition in Multi-View Environments," in Proc. the 14th ACM Multimedia and Security Workshop (MM&Sec'12), Coventry, UK, 6-7, Sep. 2012pdf_logo.jpg
  58. Y, Yao, C.-T. Li and Y. Hu, "Hand Posture Recognition Using SURF with Adaptive Boosting," British Machine Vision Conference, Guildford, UK, 3-7 September 2012
  59. A. Mouhtaropoulos, C.-T. Li and M. Grobler, "Proactive Digital Forensics: The Ever-increasing Need for Standardization," European Conference in Intelligence Security Informatics, Odense, Denmark, 22-24 August, 2012

  60. Y. Guan, C.-T. Li and Y. Hu, "Random Subspace Method for Gait Recognition," in Proc. The First International Workshop on Social Multimedia Computing (in conjunction with IEEE ICME), Melbourne, Australia, 9 - 13, July 2012
  61. X. Lin, Y. Hu, and C.-T. Li, "An Improved Algorithm for Camera Model Identification Using Inter-Channel Demosaicking Traces,¡¨ in Proc. Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 18 - 20, Piraeus-Athens, Greece, July, 2012
  62. Y. Guan, C.-T. Li and Y. Hu, "Robust Clothing-Invariant Gait Recognition,¡¨ in Proc. Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 18 - 20, Piraeus-Athens, Greece, July, 2012
  63. Y. Hu, C.-T. Li, Z. Lai and Shangfan Zhang, "Fast Camera Fingerprint Search Algorithm For Source Camera Identification," in Proc. 5th International Symposium on Communications, Control, and Signal Processing, Rome, Italy, 2-4 May, 2012
  64. Y. Guan, C.-T. Li and Y. Hu, "Gait Recognition under Carrying Condition: a Static Dynamic Fusion Method," in Proc. SPIE Optics, Photonics and Digital Technologies for Multimedia Applications, Brussels, Belgium, 16-19 April 2012
  65. C.-T. Li and R. Satta, "On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics," in Proc. the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011
  66. Y-C Chen, C.-T. Li and Y. Hu, "Further Studies on Forensic Features for Camera Source Identification," in Proc. the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011
  67. A. Mouhtaropoulos, M. Grobler and C.-T. Li, "Digital Forensic Readiness: An insight into Governmental and Academic Initiatives," European Conference in Intelligence Security Informatics, Athens, Greece, 12-14 September 2011
  68. Y. Li and C.-T. Li, "Optimized Digital Library for Digital Forensics Based on Decomposed PRNU," in Proc. The 2nd International Conference on Multimedia Technology (ICMT2011), pp. 610-613, Hangzhou China, 26-28 July 2011
  69. Y. Hu, C.-T. Li, C. Zhou and X. Lin, "Issues on Selecting Image Features for Robust Source Camera Identification," 6th International Annual Workshop on Digital Forensics and Incident Analysis, London, UK, 7- 8 July 2011
  70. Y. Hu, C.-T. Li and C. Zhou, "Selecting Forensic Features for Robust Source Camera Identification," International Computer Symposium, Tainan, Taiwan, 16-18 December 2010.
  71. Y. Hu, C.-T. Li and C. Jian, "Building Fingerprints with Information from Three Color Bands for Source Camera Identification," ACM Multimedia 2010, Firenze, Italy 25-29 October 2010.
  72. Y. Hu, C. Jian and C.-T. Li, "Using Improved Imaging Sensor Pattern Noise for Source Camera Identification," IEEE International Conference on Multimedia & Expo (ICME10), Singapore, 19 - 23 July, 2010.
  73. C.-T. Li and Y. Li, "Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity," IEEE International Symposium on Circuits and Systems (ISCAS'10) , Paris, France, 30 May - 2 June 2010.
  74. C.-T. Li, "Unsupervised Classification of Digital Images Using Enhanced Sensor Pattern Noise," IEEE International Symposium on Circuits and Systems (ISCAS'10) , Paris, France, 30 May - 2 June 2010.
  75. C.-T. Li, "Source Camera Linking Using Enhanced Sensor Pattern Noise Extracted from Images," in Proc. the 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, 3 December, 2009.
  76. F. Peng, Y.-Z. Lei, C.-T. Li, "A Reversible Watermarking Scheme for 2D Engineering Graphics Based on Improved Quantization Index Modulation," in Proc. the 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, 3 December, 2009.
  77. C.-T. Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," in Proc. IEEE International Conference on Image Processing, Cairo, Egypt, 7-11 November, 2009.
  78. C.-T. Li, C.-Y. Chang and Y. Li, "On the Repudiability of Device Identification and Image Verification Using Sensor Pattern Noise," in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7-8 September, 2009.
  79. F. Peng, R.-S. Guo, C.-T. Li and M. Long, "A Semi-Fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation," in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7-8 September, 2009.
  80. R. Krishna, C.-T.Li and V. Buchanan-Wollaston, "Interaction Based Functional Clustering of Genomic Data," in Proc. IEEE International Conference on Bioinformatics and Bioengineering, Taichung, Taiwan, 22-24 June, 2009.
  81. Y. Yuan and C.-T. Li, "Inferring Causal Relations from Multivariate Time Series: A Fast Method for Large-Scale Gene Expression Datae," in IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, Nashville, Tennessee, USA, 30 March - 2 April, 2009.
  82. Rafiullah Chamlawi, Chang-Tsun Li, Imran Usman, and Asifullah Khan,"Authentication and Recovery of Digital Images: Potential Application in Video Surveillance and Remote Sensing," in Proc. IEEE International Conference on Consumer Electronics, Las Vegas, USA, January, 2009.
  83. C.-T. Li, "Detection of Block Artifacts for Digital Forensic Analysis," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009.
  84. Y. Li and C.-T. Li, "Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009.
  85. C.-T. Li and Y. Li, "Authenticating Medical Images through Repetitive Index Modulation Based Watermarking," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009.
  86. C.-T. Li and Y. Li, "Random Index Modulation based Fragile Watermarking Scheme for Authenticating Colour Images," in Proc. Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, 15-17 August, 2008.
  87. Y. Yuan and C.-T. Li, "Probabilistic Framework for Gene Expression Clustering Validation Based on Gene Ontology and Graph Theory," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, USA, 30 March - 4 April, 2008.
  88. X. Yuan and C.-T. Li, "CBIR Approach to Building Image Retrieval Based on Invariant Characteristics in Hough Domain," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, USA, 30 March - 4 April, 2008.
  89. Y. Yuan and C.-T. Li, "Partial Mixture Model for Tight Clustering in Exploratory Gene Expression Analysis", in Proc. IEEE International Symposium on BioInformatics and BioEngineering (BIBE), Boston, USA, 14 - 17 October, 2007.
  90. Y. Zhu and C.-T. Li, "Structural Digital Signature and Semi-Fragile Watermarking for Image Authentication in Wavelet Domain," in Proc. The Third International Symposium on Information Assurance and Security (IAS'07), Manchester, UK, 29 - 31 August, 2007.
  91. Y. Li, C.-T. Li and C.-H. Wei, "Protection of Mammograms using Blind Staganography and Watermarking," in Proc. The Third International Symposium on Information Assurance and Security (IAS'07), Manchester, UK, 29 - 31 August, 2007.
  92. C.-H. Wei, Y. Li and C.-T. Li, "Effective Extraction of Gabor Features for Adaptive Mammogram Retrieval," in Proc. IEEE International Conference on Multimedia and Expo, Beijin, China, 2 - 5 July, 2007.
  93. C.-T. Li and Y. Li, "Steganographic Method for Colour Image Using Expandable Progressive Exponential Clustering," in Proc. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, 21 - 23 February, 2007.
  94. C.-T. Li, "Unsupervised Clustering of Gene Expression Time Series with Conditional Random Field," in Proc. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, 21 - 23 February 2007.
  95. C.-H. Wei and C.-T. Li, "Learning Pathological Characteristics from User's Relevance Feedback for Content-Based Mammogram Retrieval," in Proc. IEEE International Symposium on Multimedia, San Diego, USA, 11- 13 December, 2006.
  96. Y. Li and C.-T. Li, "Steganographic scheme for VQ compressed images using progressive exponential clustering," in Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, Sydney, Australia, 22 - 24 November, 2006.
  97. X. Yuan and C.-T. Li, "CBIR approach to building image retrieval based on linear edge distribution," in Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, Sydney, Australia, 22 - 24 November, 2006.
  98. W.-H. Lai and C.-T. Li, "Skin colour-based face detection in colour images," in Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, Sydney, Australia, 22 - 24 November, 2006.
  99. C.-H. Wei and C.-T. Li, "Calcification Descriptor and Relevance Feedback Learning Algorithms for Content-Based Mammogram Retrieval," in Proc. International Workshop on Digital Mammography (LNCS, vol. 4046), pp. 307 - 314, Manchester, UK, 18 - 21 June, 2006.
  100. C.-T. Li and R. Wilson, "A random field approach to unsupervised textureran image segmentation," in Proc. IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP 2005) , pp. 406 - 411, Benidorm, Spain, 7 - 9 September, 2005.
  101. X. Wang, Z. Yao, and C.-T. Li, "A palette-based image steganographic method using colour quantization," in Proc. IEEE International Conference on Image Processing, vol. II, pp. 1000-1003, Genova, Italy, 11 - 14 September, 2005.
  102. C.-H. Wei, C.-T. Li, and R. Wilson, "A general framework for content-based medical image retrieval with its application to mammogram retrieval," in Proc. SPIE International Symposium on Medical Imaging, pp. 134 - 143, San Diego, 12 - 17 February, 2005.
  103. C.-T. Li, "Unsupervised image segmentation using Gibbs sampler within a multiresolution framework," in Proc. IASTED International Conference on Internet and Multimedia Systems and Applications (EuroIMSA 2005) , pp. 516 - 520, Grindelwald, Switzerland, 21 -23 February, 2005.
  104. H. Si and C.-T. Li, "Fragile Watermarking Scheme Based on the Block-wise Dependency in the Wavelet Domain," in Proc. ACM Multimedia and Security Workshop, pp. 214-219, Magdeburg, Germany, September 2004.
  105. Y. Yuan and C.-T. Li, "Fragile Watermarking Scheme Exploiting Non-deterministic Block-wise Dependency," in Proc. IAPR International Conference on Pattern Recognition, vol. 4, pp. 23-26, Cambridge, UK, August 2004.
  106. C.-K. Ho and C.-T. Li, "Semi-fragile Watermarking Scheme for Authentication of JPEG Images," in Proc. IEEE International Conference on Information Technology: Coding and Computing, vol. 1, pp. 7-11, Las Vegas, USA, April 2004.
  107. C.-T. Li and Randy Chiao, "Unsupervised Texture Segmentation Using Multiresolution Hybrid Genetic Algorithm," in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 1033 - 1036, Barcelona, Spain, 14 - 17, September 2003.
  108. T.-H. Hsieh, C.-T. Li, and S. Wang, "Watermarking Scheme for Authentication of Compressed Image," in Proc. SPIE International Conference on Multimedia Systems and Applications VI, pp. 1-9, 8 - 9 Orlando, Florida, USA, September 2003.
  109. C.-T. Li, "Image Segmentation Using Multiresolution Gibbs Sampler," in Proc. 15th IPPR Conference on Computer Vision, Graphics and Image Processing, Hsin-Chu, Taiwan, August 2002, pp 654-659.
  110. C.-T. Li, F. M. Yang, and C. S. Lee, "Oblivious Fragile Watermarking Scheme for Image Authentication," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol IV, pp. 3445 - 3448, Orlando, FL, USA, May 2002, pp 3445-3448.
  111. C.-T. Li, F. M. Yang, "A Fragile Digital Watermarking Scheme for Image Authentication," in Proc. 11th National Conf. on Information Security, Taiwan, 2001.
  112. C.-T. Li and R. Chiao, "Multiresolution Hybrid Genetic Algorithm for Texture Segmentation," in Proc. 14th IPPR Conference on Computer Vision, Graphics and Image Processing, Kaoshung, Taiwan, August 2001.
  113. C.-T. Li, D. C. Lou, and T. H. Chen, "Image Authentication and Integrity Verification via Content-based Watermarks and a Public Key Cryptosystem," In Proc. IEEE International Conference on Image Processing, Vancouver, Canada, September 2000, pp. 694-697.
  114. C.-T. Li, "Image Segmentation Based On A Multiresolution MRF Framework And Stochastic Relaxation," in Proc. 4th Asian Conference on Computer Vision, Taipei, Taiwan, January 2000.
  115. C.-T. Li and D.-C. Lou, "Edge Detection Based on the Multiresolution Fourier Transform," in Proc. IEEE Workshop on Signal Processing Systems , Taipei, Taiwan,1999.
  116. C.-T. Li and R. Wilson, "Texture Segmentation Using Multiresolution Markov Random Fields," in Proc. IEE Colloquium Applied Statistical Pattern recognition, pp. 39 - 44, Birmingham, UK, 1999.
  117. R. Wilson and C.-T. Li, "Hidden Multiresolution Markov Random Fields and Their Application to Image Segmentation," In Proc. IEEE 10th International Conference on Image Analysis and Processing, Venice, Italy, 1999.
  118. C.-T. Li, "In Search of an Appropriate Energy Function for Texture Segmentation within a Markov Random Fields Framework," In Proc. 12th IPPR Conference on Computer Vision, Graphics and Image Processing, Taipei, Taiwan, August, 1999.
  119. C.-T. Li, "Reducing the Computational Complexity of Markov Random Fields within an Arbitrarily Large Texture Label Space" In Proc. National Computer Symposium, Taipei, Taiwan, 1999.
  120. C.-T. Li, D. C. Lou, T.L. Yin, and C, L, Liu, "Image Authentication via Image-Dependent Watermarks," in Proc. 9th National Conf. on Information Security, Taiwan, 1999.
  121. C.-T. Li and R. Wilson, "Image Segmentation Based on a Multiresolution Bayesian Framework," In Proc. IEEE International Conference on Image Processing, vol. 3, pp. 761 - 765, Chicago, USA, 1998.
  122. C.-T. Li and R. Wilson, "MRF Approach to Texture Segmentation Integrating Region and Boundary Information," In Proc. IASTED International Conference on Signal and Image Processing, New Orleans, USA, 1997.
  123. C.-T. Li and R. Wilson, "Textured Image Segmentation Using Multiresolution Markov Random Fields and a Two-component Texture Model," In Proc. 10th Scandinavian Conference on Image Analysis, Lappeenranta, Finland, 1997.

PhD Thesis

  1. Unsupervised Texture Segmentation Using Multiresolution Markov Random Fields, Department of Computer Science, University of Warwick, Coventry, UK, 1998 (Supervisor: Professor Roland Wilson)

MSc Dissertation

  1. User Interface of Data Flow Query Language: An Object-Oriented Approach, Department of Computer Science, US Naval Postgraduate School, Monterey, CA, USA, 1992 (Advisor: Professor Thomas Otani)