Cyberspace Security Department
Li Wenjie
2026年02月03日 11:38:44


NameLi Wenjie

TitleLecturer

Type of tutorMaster's Supervisor

Emailwenjieli@email.tjut.edu.cn

Address1-305


I am currently a masters supervisor at School of Computer Science and Engineering, Tianjin University of Technology, Tianjin, China. I received the Ph.D. degree from Beijing Jiaotong University, Beijing, China, in 2022. From 2019 to 2020, I was a Visiting Ph.D. Student with the Universit. degli Studi di Siena, Siena, Italy. My research interests include multimedia forensics and AI security.


Deepfake Detection

AI Security

Multimedia Forensics

Data Hiding


National Natural Science Foundation of China (PI), 2025.01-2027.12


[1] Li Wenjie, Li Xiaolong, Ni Rongrong, and Zhao Yao. Extracting High-Discriminative Features for Detecting Double JPEG Compression with the Same Quantization Matrix. IEEE Transactions on Circuits and Systems for Video Technology, 2025, 35(5): 4727-4739.

[2] Sun Chenglong and Li Wenjie. A two-stage interaction approach for enhancing generalization of deepfake detection. Multimedia Systems 31, 359 (2025).

[3] Li Wenjie, Li Xiaolong, Ni Rongrong, and Zhao Yao. Quantization step estimation for JPEG image forensics[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(7): 4816-4827.

[4] Li Wenjie, Li Xiaolong, Ni Rongrong, and Zhao Yao. PVO-based reversible data hiding using adaptive multiple histogram generation and modification[J]. Signal Processing: Image Communication, 2021, 99: 116405.

[5] Li Wenjie, Ni Rongrong, Li Xiaolong, and Zhao Yao. Robust median filtering detection based on the difference of frequency residuals[J]. Multimedia Tools and Applications, 2019, 78 (7): 8363-8381.

[6] Li Wenjie, Tondi Benedetta, Ni Rongrong, and Barni Mauro. Increased-confidence adversarial examples for deep learning counter-forensics[C]//International Conference on Pattern Recognition, 2021: 411-424.

[7] Li Wenjie, Ni Rongrong, and Zhao Yao. JPEG photo privacy-preserving algorithm based on sparse representation and data hiding[C]//International Conference on Image and Graphics, 2017: 575-586. (Best Paper)

[8] Yu Yang, Ni Rongrong, Li Wenjie, and Zhao Yao. Detection of AI-manipulated fake faces via mining generalized features[J]. ACM Transactions on Multimedia Computing, Communications, and Applications. 2022, 18(4): 1-23.

[9] Barni Mauro, Li Wenjie, Tondi Benedetta, and Zhang Bowen. Adversarial examples in image forensics[M]//Multimedia Forensics. Springer, 2022.

[10] Yang Dongdong, Li Wenjie, Ni Rongrong, and Zhao Yao. Enhancing adversarial examples transferability via ensemble feature manifolds[C]//Proceedings of International Workshop on Adversarial Learning for Multimedia, 2021: 49-54.

[11] Wang Xiying, Ni Rongrong, Li Wenjie, and Zhao Yao. Adversarial attack on fake-faces detectors under white and black box scenarios[C]//International Conference on Image Processing, 2021: 3627-3631.


Cryptography

Network Attack and Defense Techniques


Reviewer for TIFS, TDSC, TCSVT, TOMM, and ESWA etc.

Member of CSIG-DMFS.




Previous:Hou Chunyan Next:Lin Shen

Close