Skip to main content Skip to navigation

Publications


2013:

  • A. Mouhtaropoulos and C.-T. Li, "Forensic Readiness Framework: An Extended Approach", Journal of International Commercial Law and Technology (JICLT), 2013 (under review)
  • C.-T. Li (Ed), "Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security,¡¨ IGI Global, Hershey, PA. USA, May 2013
  • Parallel File System Analysis Through Application I/O Tracing. Wright, S.A., Hammond, S.D., Pennycook, S.J., Bird, R.F., Herdman, J.A., Miller, I., Vadgama, A., Bhalerao, A.H. and Jarvis, S.A. The Computer Journal, 56 (2). pp. 141-155, 2013. ISSN 0010-4620
  • Y. Yao and C.-T. Li, "Real-Time Hand Gesture Recognition for Uncontrolled Environments using Adaptive SURF Tracking and Hidden Conditional Random Fields," in Proc. 9th International Symposium on Visual Computing (ISVC), Rethymnon, Crete, Greece, 29 - 31, July 2013
  • X. Lin, C.-T. Li, Y. Hu, "Exposing Image Forgery through the Detection of Contrast Enhancement," in Proc. IEEE International Conference on Image Processing, Melbourne, Australia, 15 - 18 Sep 2013
    Z. Lv, Y. Hu, C.-T. Li, B.-B. Liu, "Audio Forensic Authentication Based on MOCC between ENF and Reference Signals," IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), Beijing, China, 6 - 10 July 2013
  • X. Wei and C.-T. Li, "Fixation and Saccade based Face Recognition from Single Image per Person with Various Occlusions and Expressions," CVPR 2013 Biometrics Workshop, Portland, Oregon, USA, 13 June 2013
  • Y. Guan and C.-T. Li, "A Robust Speed-Invariant Gait Recognition System for Walker and Runner Identification" in Proc. of the 6th IAPR International Conference on Biometrics (ICB'13), Madrid, Spain, 4-7, Jun. 2013
  • X. Wei, C.-T. Li and Y. Hu, "Face Recognition with Occlusion Using Dynamic Image-to-Class Warping (DICW)," in Proc. IEEE Conference on Automatic Face and Gesture Recognition, ShangHai, China, 22-26 April 2013
  • Y. Guan and C.-T. Li, "Robust Gait Recognition from Extremely Low Frame-Rate Videos," in Proc. International Workshop on Biometrics and Forensics, Lisbon, Portugal, 4-5 April 2013
  • X. Wei and C.-T. Li, "Robust Face Recognition with Occlusions in both Reference and Query Images," in Proc. International Workshop on Biometrics and Forensics, Lisbon, Portugal, 4-5 April 2013

2012:

  • C.-T. Li and Y. Li, “Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 2, pp. 260-271, Feb 2012 [PDF]
  • C.-T. Li and R. Satta, "An Empirical Investigation into the Correlation between Vignetting Effect and the Quality of Sensor Pattern Noise," IET Computer Vision, vol. 6, no. 6 pp. 560 - 566, Nov. 2012
  • S. Saginbekov, A. Jhumka, Stabilizing Information Dissemination in Wireless Sensor Networks, To Appear, Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), 2012
  • S. Saginbekov, A. Jhumka, Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks, To Appear, Proceedings of 11th IEEE International Conference on Ubiquitous Computing and Communications, 2012.
  • A. Jhumka, M. Bradbury, M. Leeke, Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources, To Appear, Proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
  • M. Leeke, S. S. Anand, A. Jhumka, Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors, To Appear, The Computer Journal.
  • H. Franks, N. Griffiths and A. Jhumka, Manipulating Convention Emergence using Influencer Agents, Journal of Autonomous Agents and Multi-Agent Systems, 2012, to appear.
  • S. Bravo-Solorio, C.-T. Li, A. K. Nandi, "Watermarking Method with Exact Self-propagating Restoration," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS'12), Tenerife, Spain, December 2-5, 2012
  • C.-T. Li and A. Ho (Ed), "Crime Prevention Technologies and Applications for Advancing Criminal Investigation,” IGI Global, Hershey, PA. USA, June 2012
  • Y. Hu, C.-T. Li, Y. Wang and B.-B. Liu, “An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery,” International Journal of Digital Crime and Forensics, vol. 4, no. 3, July 2012
  • X. Wei, C.-T. Li and Y. Hu, “Robust Face Recognition under Varying Illumination and Occlusion considering Structured Sparsity,” in Proc. The International Conference on Digital Image Computing: Techniques and Applications (DICTA’12), Perth, Australia, 3-5 December 2012
  • Y, Yao, C.-T. Li and Y. Hu “Hand Posture Recognition Using SURF with Adaptive Boosting,” British Machine Vision Conference, Guildford, UK, 3-7 September 2012
  • S. Bravo-Solorio, C.-T. Li, A. K. Nandi, “Watermarking with Low Embedding Distortion and Self-Propagating Restoration Capabilities,” in Proc. IEEE International Conference on Image Processing, Orlando, Florida, USA, 30 Sep – 3 Oct 2012
  • A. Mouhtaropoulos, C.-T. Li and M. Grobler, “Proactive Digital Forensics: The Ever-increasing Need for Standardization,” European Conference in Intelligence Security Informatics, Odense, Denmark, 22-24 August, 2012
  • Y. Guan, C.-T. Li and Y. Hu, “Random Subspace Method for Gait Recognition,” in Proc. The First International Workshop on Social Multimedia Computing (in conjunction with IEEE ICME), Melbourne, Australia, 9 - 13, July 2012
  • X. Lin, Y. Hu, and C.-T. Li, "An Improved Algorithm for Camera Model Identification Using Inter-Channel Demosaicking Traces,” in Proc. Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 18 - 20, Piraeus-Athens, Greece, July, 2012
  • Y. Guan, C.-T. Li and Y. Hu, "Robust Clothing-Invariant Gait Recognition,” in Proc. Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 18 - 20, Piraeus-Athens, Greece, July, 2012
  • Y. Guan, C.-T. Li and Y. Hu, "Gait Recognition under Carrying Condition: a Static Dynamic Fusion Method," in Proc. SPIE Optics, Photonics and Digital Technologies for Multimedia Applications, Brussels, Belgium, 16-19 April 2012
  • Y. Hu, C.-T. Li, Z. Lai and S. Zhang, "Fast Camera Fingerprint Search Algorithm For Source Camera Identification," in Proc. 5th International Symposium on Communications, Control, and Signal Processing, Rome, Italy, 2-4 May, 2012

2011:

  • Y. Yuan , C.-T. Li, O. Windram, "Directed Partial Correlation: Inferring Large-Scale Gene Regulatory Network through Induced Topology Disruptions" PLoS ONE, vol. 6, no. 4, e16835, 2011
  • Y. Hu, C.-T. Li, C. Zhou and X. Lin, "Source Camera Identification Issues: Forensic Features Selection and Robustness," International Journal of Digital Crime and Forensics, vol. 3, no. 4, pp. 1-15, October 2011
  • M. Leeke, A. Jhumka, An Automated Wrapper-Based Approach to the Design of Dependable Software, To Appear Proceedings of International Conference on Dependability (DEPEND), 2011.
  • C.-T. Li and R. Satta, "On the Location-Dependent Quality of the Sensor Pattern Noise and Its Implication in Multimedia Forensics," in Proc. the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011
  • Y-C Chen, C.-T. Li and Y. Hu, "Further Studies on Forensic Features for Camera Source Identification," in Proc. the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011
  • A. Mouhtaropoulos, M. Grobler and C.-T. Li, "Digital Forensic Readiness: An insight into Governmental and Academic Initiatives," European Conference in Intelligence Security Informatics, Athens, Greece, 12-14 September 2011
  • Y. Li and C.-T. Li, "Optimized Digital Library for Digital Forensics Based on Decomposed PRNU," in Proc. The 2nd International Conference on Multimedia Technology (ICMT2011), pp. 610-613, Hangzhou China, 26-28 July 2011
  • A. Chester, M. Leeke, M. AL-Ghamdi, A. Jhumka, S. Jarvis, A Framework for Data Center Scale Dynamic Resource Allocation Algorithms, To Appear, Proceedings of IEEE International Conference on Scalable Computing and Communications (SCALCOM), 2011.
  • A. Jhumka, M. Leeke, S. Shrestha, On the Use of Fake Sources for Source Location Privacy:Trade-Offs Between Energy and Privacy, The Computer Journal (doi: 10.1093/comjnl/bxr010).
  • S.S. Anand, A. Jhumka, C. Levett, "Event Ordering in Digital Forensics", International Journal of Digital Crime and Forensics, vol. 3, no. 1, 2011
  • M. Leeke, S. Arif, A. Jhumka, S.S. Anand. A Methodology for the Generation of Efficient Error Detection Mechanisms, To Appear, Proceedings of the 40th IEEE International Conference on Dependable Systems and Networks, 2011.
  • C.-T. Li and A. Ho (Ed), "New Technologies for Digital Crime and Forensics: Devices, Applications, and Software," IGI Global, Hershey, PA. USA, June 2011.
  • Y. Hu, C.-T. Li and C. Zhou, "Issues on Selecting Image Features for Robust Source Camera Identification," 6th International Annual Workshop on Digital Forensics and Incident Analysis, London, UK, 7- 8 July 2011

2010:

  • C.-T Li, "Source Camera Identification Using Enhanced Sensor Pattern Noise," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 280 ¡V 287, 2010
  • C. Levett, A. Jhumka and S. S. Anand, Towards Event Ordering in Digital Forensics, In Proceedings of the 12th ACM Workshop on Multimedia and Security, September 9th, 2010, Rome, Italy
  • M. Leeke, A. Jhumka, Towards Understanding the Importance of Variables in Dependable Software, In Proceedings of the 8th European Dependable Computing Conference (EDCC10), April 28th, 2010, Valencia, Spain
  • Sambid Shrestha, Matt Leeke, Arshad Jhumka, On the Tradeoffs Between Privacy and Energy in Wireless Sensor Networks. In Proceedings of UKPEW 2010.
  • Neeraj Suri, Arshad Jhumka, Martin Hiller, Andras Pataricza, Shariful Islam, Constantin Sarbu, A Software Integration Approach for Designing and Assessing Dependable Embedded Systems, Journal of Systems and Software, 83(10), pp.1780--1800, 2010
  • Arshad Jhumka, Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks, In Proceedings of 29th International Symposium on Reliable Distributed Systems (SRDS), Delhi, India, 2010.
  • F. Peng, R-S. Guo, C-T. Li and M. Long, "A Semi-Fragile watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation," Computer Aided Design, vol. 42, no. 12, pp. 1207-1216, December 2010
  • C.-T Li and Y. Li, "Progressive Exponential Clustering-Based Steganography," EURASIP Journal of Advances in Signal Processing, vol. 2010, Article ID 212517, 14 pages, doi:10.1155/2010/212517
  • C.-T Li, "A Random Field Approach to Unsupervised Texture Image Segmentation," EURASIP Journal of Advances in Signal Processing, vol. 2010, Article ID: 167942, 12 pages, doi:10.1155/2010/167942
  • C.-T. Li (Edited), "Multimedia Forensics and Security", IGI Global, Hershey, PA. USA, April 2008
  • C.-T. Li (Edited), "Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions", IGI Global, Hershey, PA. USA, November 2009
  • Y. Hu, C.-T. Li and C. Zhou, "Selecting Forensic Features for Robust Source Camera Identification," in Proc. International Computer Symposium, Tainan, Taiwan, 16 ¡V 18 December, 2010
  • Y. Hu, C.-T. Li and C. Jian, "Building Fingerprints with Information from Three Color Bands for Source Camera Identification," in Proc. ACM Multimedia, Firenze, Italy, 25 ¡V 29 October, 2010
  • Y. Hu, C. Jian and C.-T. Li, "Using Improved Imaging Sensor Pattern Noise for Source Camera Identification," in Proc. IEEE International Conference on Multimedia & Expo (IMC10), Singapore, 19 - 23 July, 2010
  • C.-T. Li and Y. Li, "Digital Camera Identification Using Colour-Decoupled Photo Response Non-Uniformity," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS'10), Paris, France, 30 May - 2 June 2010
  • C.-T. Li, "Unsupervised Classification of Digital Images Using Enhanced Sensor pattern Noise," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS'10) , Paris, France, 30 May - 2 June 2010
  • C.-T. Li, Y. Yuan, and R. Wilson. An Unsupervised Conditional Random Fields Approachfor Clustering Gene Expression Time Series. Bioinformatics, 2010
  • C.-T. Li, "A Random Field Approach to Unsupervised Texture Image Segmentation," EURASIP Journal of Advances in Signal Processing, 2010
  • R. Krishna, C.-T. Li and V. Buchanan-Wollaston, "A Temporal Precedence Based Clustering Method for Gene Expression Microarray Data," BMC Bioinformatics, 11(68) 2010
  • Y. Yuan, C.-T. Li and R. Wilson. Partial Mixture Model for Gene Expression Tight Clustering. BMC Bioinformatics, 9(287), 2008
  • Y. Liu, X. Sun, Y. Liu, C.-T. Li. MIMIC-PPT: Mimicking-based Steganography for Microsoft PowerPoint Document. Information Technology Journal, 2010
  • Y. Yang, X. Sun, H. Yang, and C.-T. Li. A Removable Visible Image Watermarking Algorithm in DCT Domain. Journal of Electronic Imaging


2009:

  • A. Jhumka, M. Leeke, Issues on the Design of Efficient Fail-safe Fault Tolerance, In Proceedings IEEE 20th International Symposium on Software Reliability Engineering (ISSRE09), November 18th, 2009, Bengaluru-Mysuru, India
  • C.-T. Li, Y. Li and C.-H. Wei. Protection of Digital Mammograms on PACSs Using Data Hiding Techniques. International Journal of Digital Crime and Forensics, vol. 1, no. 1. January 2009
  • N. Landia and S. S. Anand. Personalised Tag Recommendation. RecSys09 Workshop on Recommender Systems and the Social Web, October, 2009
  • M. Leeke, A. Jhumka, Evaluating the Use of Reference Run Models in Fault Injection Analysis, In Proceedings of the 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC09), November 16th, 2009, Shanghai, China
  • A. Jhumka, L. Mottola, On Consistent Neighborhood Views in Wireless Sensor Networks, In Proceedings of the 28th International Symposium on Reliable Distributed Systems (SRDS09), 2009
  • Principles and Methods for Face Recognition and Face Modelling. T. Rawlinson, A. Bhalerao, L. Wang. In Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions. Ed. C-T. Li. ISBN 1605668362
  • M. Leeke and A. Jhumka, 'Beyond The Golden Run: Evaluating the Use of Reference Run Models in Fault Injection Analysis', UK Performance Engineering Workshop 2009 (UKPEW09), July, 2006, Leeds, UK
  • Y. Yang, X. Sun, H. Yang, C.-T. Li and R. Xiao, "A Contrast-Sensitive Reversible Visible Image Watermarking Technique," IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 5, pp. 656 - 667, 2009
  • C.-H. Wei, Y. Li, W. Y. Chau and C.-T. Li, "Trademark Image Retrieval Using Synthetic Features for Describing Global Shape and Interior Structure," Pattern Recognition, vol. 42, no. 3, pp. 386-394, 2009
  • S. Lombardi, S. S. Anand and M. Gorgoglione. Context and Customer Behavior in Recommendation. RecSys09 Workshop on Context and Recommender Systems, October 2009
  • T. Li and S. S. Anand. Exploiting Domain Knowledge by Automated Taxonomy Generation in Recommender Systems. 10th International Conference on Electronic Commerce and Web Technologies, August, 2009
  • G. K. Williams, S. S. Anand. Predicting the Polarity Strength of Adjectives Using WordNet. AAAI International Conference on Weblogs and Social Media, May 2009.
  • C.-T. Li and Y. Li, "Medical Images Authentication through Repetitive Index Modulation Based on Watermarking," International Journal of Digital Crime and Forensics, vol. 1, no. 4, pp. 32 ¡V 39, October 2009
  • C.-T. Li, Y. Li and C.-H. Wei "Protection of Digital Mammograms on PACSs Using Data Hiding Techniques," International Journal of Digital Crime and Forensics, vol. 1, no. 1, pp. 57 ¡V 88, January 2009
  • C.-T. Li, "Source Imaging Device Linking Using Filtered Sensor Pattern Noise," in Proc. 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, 3 December, 2009
  • F. Peng, Y.-Z. Lei and C.-T. Li, "A Reversible Watermarking Scheme for 2D Engineering Graphics Based on Improved Quantization Index Modulation," in Proc. 3rd International Conference on Imaging for Crime Detection and Prevention (ICDP-09), London, UK, 3 December, 2009
  • C.-T Li, C.-Y. Chang and Y. Li, "On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise,¡¨ in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7-8 September, 2009
  • F. Peng, Re-Si Guo, C.-T. Li and Min Long, ¡¡¡ÓA Semi-Fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation,¡¨ in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7-8 September, 2009
  • C.-T. Li, "Source Camera Identification Using Filtered Sensor Pattern Noise," in Proc. IEEE International Conference on Image Processing, Cairo, Egypt, 7-11 November, 2009
  • R. Krishna, C.-T. Li and V. Buchanan-Wollaston, "Interaction Based Functional Clustering of Genomic Data," in Proc. IEEE International Conference on Bioinformatics and Bioengineering, Taichung, Taiwan, 22-24 June, 2009
  • Y. Yuan and C.-T. Li, "Inferring Causal Relations from Multivariate Time Series: A Fast Method for Large-Scale Gene Expression Data," in Proc. IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, Nashville, Tennessee, USA, 30 March - 2 April, 2009
  • C.-T. Li, "Detection of Block Artifacts for Digital Forensic Analysis," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009
  • Y. Li and C.-T. Li, "Decomposed Photo response Non-Uniformity for Digital Forensic Analysis," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009
  • C.-T. Li and Y. Li, "Authenticating Medical Images through Repetitive Index Modulation Based Watermarking," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forenensics 09), Adelaide, Australia, 19 - 21 January, 2009

2008:

  • F. Freiling, and A.Jhumka, "Global Predicate Detection in Distributed Systems with Small Faults¡¦¡¦, Proceedings of the International Symposium on Stabilization, Safety and Security in Distributed Systems, 2008
  • C.-T. Li and Y. Li, "Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images," in Proc. Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China, 15-17 August, 2008
  • T. Li and S. S. Anand, "HIREL: An Incremental Clustering Algorithm for Multi-Type Relational Datasets," Proceddings of ICDM 2008
  • T. Li and S. S. Anand, "Multi-type Relational Clustering Approaches: Current State-of-the-Art and New Directions," In Proceeding of the International Conference on Intelligent Systems and Networks (IISN-2008), India, 2008
  • T. Li and S. S. Anand, "Automated Taxonomy Generation for Summarizing Multi-type Relational Datasets," In Proceedings of DMIN¡¦08 joint with WORLDCOMP¡¦08. Las Vegas, USA, 2008
  • M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, `Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks', Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008
  • N. Griffiths, A. Jhumka, A. Dawson and R. Myers, `Simple Trust model for On-Demand Routing in Mobile Ad-hoc Networks', In Proceedings of the 2nd International Symposium on Intelligent Distributed Computing (IDC 2008), 2008
  • T. Li and S. S. Anand: Labeling Nodes of Automatically Generated Taxonomy for Multi-type Relational Datasets. DaWaK 2008: 317-326
  • A. Jhumka, N. Griffiths, A. Dawson and R. Myers, `An Outlook on Trusted Routing in Mobile Adhoc Networks', Networking and Electronic Commerce Research Conference (NAEC 2008), 2008
  • A. Jhumka, Dependability in Service-Oriented Computing. Book Chapter, in Agent-Based Service-Oriented Computing (L. Jain, X. Wu, N. Griffiths, and K.-M. Chao, eds.), Advanced Information and Knowledge Processing, pp. 141–160, Springer London, 2010.
  • M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, "Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks", Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008
  • Y. Yuan and C.-T. Li, "Probabilistic Framework for Gene Expression Clustering Validation Based on Gene Ontology and Graph Theory," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, USA, 30 March - 4 April, 2008
  • X. Yuan and C.-T. Li, "CBIR Approach to Building Image Retrieval Based on Invariant Characteristics in Hough Domain," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, USA, 30 March - 4 April, 2008
  • C.-H. Wei and C.-T. Li, " Content Analysis from User¡¦s Relevance Feedback for Content-Based Image Retrieval," in Artificial Intelligence for Maximizing Content Based Image Retrieval, ed. by Z. Ma, IGI Global, 2008
  • C.-H. Wei and C.-T. Li, " Content-Based Retrieval for Mammograms," in Artificial Intelligence for Maximizing Content Based Image Retrieval, ed. by Z. Ma, IGI Global, 2008
  • C.-T. Li, Y. Yuan and R. Wilson, "An Unsupervised Conditional Random Fields Approach for Clustering Gene Expression Time Series," Bioinformatics, vol. 24, no. 21, pp. 2467-2473, August 2008
  • Y. Liu, X. Sun, Y. Liu, C.-T. Li, "MIMIC-PPT: Mimicking-Based Steganography for Microsoft PowerPoint Document," Information Technology Journal, vol. 7, no. 4, pp. 654 - 660, 2008
  • Y. Yuan, C.-T. Li and R. Wilson, "Partial Mixture Model for Gene Expression Tight Clustering," BMC Bioinformatics, 2008, 9:287
  • Y. Yuan and C.-T. Li, "A Bayesian Random Field Approach for Integrative Large-Scale Regulatory Network Analysis,¡¨ Journal of Integrative Bioinformatics, 5(2):99, August 2008
  • Y. Yang, X. Sun, H. Yang and C.-T. Li, "A Removable Visible Image Watermarking Algorithm in DCT Domain," Journal of Electronic Imaging, vol. 17, no. 3, July 2008

2007:

  • Anand S S, P. Kearney, M. Shapcott, 'Generating Semantically Enriched User Profiles for Web Personalization,' ACM Transactions on Internet Technology, 7(4), pp. 1533-5399, 2007
  • T. Li, S. S. Anand, "DIVA: A Variance-based Clustering Approach for Multi-type Relational Data," Proceedings of the 16th ACM Conference on Information and Knowledge Management, Portugal, November, 2007
  • FC Freiling, A Jhumka, `Global Predicate Detection in Distributed Systems with Small Faults', In Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, 296-310, 2007
  • A Jhumka, SS Kulkarni, `On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks', In Proceedings of the International Conference on Distributed Computing and Internet Technology, 42-53, 2007
  • C.-T. Li and H. Si. Wavelet-based fragile watermarking scheme for image authentication. Journal of Electronic Imaging, 16(1), 2007
  • C.-T. Li and Y. Li. Steganographic method for colour image using expandable progressive exponential clustering. In Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairnes, Autralia, February 2007
  • Y. Zhu and C.-T. Li, "Structural Digital Signature and Semi-Fragile Watermarking for Image Authentication in Wavelet Domain," in Proc. The Third International Symposium on Information Assurance and Security (IAS'07), Manchester, UK, 29 - 31 August, 2007
  • Y. Li, C.-T. Li and C.-H. Wei, "Protection of Mammograms Using Blind Steganography and Watermarking," in Proc. The Third International Symposium on Information Assurance and Security (IAS'07), Manchester, UK, 29 - 31 August, 2007
  • C.-H. Wei, Y. Li and C.-T. Li, "Effective Extraction of Gabor Features for Adaptive Mammogram Retrieval," in Proc. IEEE International Conference on Multimedia and Expo, Beijin, China, 2 - 5 July, 2007
  • C.-T. Li and Y. Li, "Steganographic Method for Colour Image Using Expandable Progressive Exponential Clustering," in Proc. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, 21 - 23 February, 2007
  • C.-T. Li, "Unsupervised Clustering of Gene Expression Time Series with Conditional Random Field," in Proc. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, 21 - 23 February 2007

2006:

  • H. A. Jhumka, F. Frieling, C. Fetzer, N. Suri, 'An Approach to Synthesize Safe Systems,' International Journal of Security and Networks 1 (1), pp. 62 - 74, 2006
  • H.-F. Shih and C.-T. Li, "Information Security Management in Digital Government," in Encyclopedia of Digital Government, ed. by A.-V. Anttiroiko and M. Mälkiä, vol. III, pp. 1054 - 1057, Idea Group Publishing, 2006
  • C.-H. Wei, C.-T. Li and R. Wilson, "A Content-Based Approach to Medical Image Database Retrieval," in Database Modelling for Industrial Data Management: Emerging Technologies and Applications, ed. by Z. Ma, pp. 258 - 291, Idea Group Publishing, 2006
  • C.-T. Li and Y. Yuan. Digital watermarking scheme exploiting non-deterministic dependence for image authentication. Optical Engineering, 45(12), 2006
  • Y. Li and C.-T. Li. Steganographic scheme for vq compressed images using progressive exponential clustering. In Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, pages 185-188, Sydney, Australia, November 2006
  • Y. Yuan and C.-T. Li. Cbir approach to building image retrieval based on linear edge distribution. In Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, pages 185-188, Sydney, Australia, November 2006
  • W.-H. Lai and C.-T. Li. Skin colour-based face detection in colour images. In Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, pages 185-188, Sydney, Australia, November 2006
  • C.-H. Wei and C.-T. Li. Calcification descriptor and relevance feedback learning algorithms for content-based mammogram retrieval. In Proc. International Workshop on Digital Mammography, pages 307 - 314, Manchester, UK, June 2006
  • H. Si and C.-T. Li. Steganology: A promising technique for maintaining information security in e-government. In Encyclopedia of Digital Government ed. by A.-V. Anttiroiko, Idea Group Publishing, 2006
  • H. Si and C.-T. Li, "Maintaining Information Security in E-Government through Steganology," in Encyclopedia of Digital Government, ed. by A.-V. Anttiroiko and M. Mälkiä, vol. III, pp. 1180 - 1184, Idea Group Publishing, 2006

2005:

  • S S Anand, M Eirinaki J Vlachakis, 'IKUM: An Integrated Web Personalization Platform Based on Content Structures and User Behaviour' in Intelligent Techniques for Web Personalization, 272 - 288, Editors: B. Mobasher, S S Anand (978-3-540-29846-5), Berlin: Springer, 2005
  • C.-T. Li, "The Role of Biometrics in Virtual Communities and Digital Governments," in Encyclopedia of Virtual Communities and Technologies, ed. by S. Dasgupta, Part B, pp.1-3, Idea Group Publishing, July 2005
  • S S Anand, B. Mobasher, 'Intelligent Techniques for Web Personalization,' in Intelligent Techniques for Web Personalization, pp.1 - 36, Editors: B Mobasher (978-3-540-29846-5), Berlin: Springer
  • H. Si and C.-T. Li, " Copyright Protection in Virtual Communities through Digital Watermarking," in Encyclopedia of Virtual Communities and Technologies, ed. by S. Dasgupta, Part C, pp. 61 - 65, Idea Group Publishing, July 2005
  • C.-T. Li. Reversible watermarking scheme with image-independent embedding capacity. IEE Proceedings - Vision, Image, and Signal Processing, 152(6):779-786, 2005
  • A. Jhumka, M. Hiller, `Putting detectors in their place', In Proceedings of the IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 33–43, 2005
  • A. Jhumka, N. Suri, `Designing efficient fail-safe multitolerant systems', In Proceeding of 25th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2005), 428–442, 2005
  • A. Jhumka, S. Klaus, S.A. Huss, `A dependability-driven system-level design approach for embedded systems', In Proceedings of Design, Automation and Test in Europe (DATE 2005), 372–377, 2005
  • M. Hiller, A. Jhumka, N. Suri, `Tracking the Propagation of Errors in Software', Book Chapter, Dependable Computing Systems: Paradigms, Performance Issues and Applications, Hassan B. Diab and Albert Y. Zomaya (Eds)
  • C.-H. Wei and C.-T. Li. Design of Content-based Multimedia Retrieval. In Encyclopedia of Multimedia Technology and Networking, ed. by Margherita Pagani, Idea Group Publishing, 2005
  • C.-H. Wei and C.-T. Li. A general framework for content-based medical image retrieval with its application to mammogram retrieval. In Proc. SPIE International Symposium on Medical Imaging, San Diego, USA, 2005
  • C.-T. Li. Digital Watermarking for Multimedia Security Management. In Encyclopedia of Multimedia Technology and Networking, ed. by Margherita Pagani, Idea Group Publishing, 2005
  • C.-T. Li. Digital Watermarking for Multimedia Authentication. In Digital Watermarking for Digital Media,ed. by J. Seitz, Idea Group Publishing, 2005
  • C.-T. Li and R. Wilson. A random field approach to unsupervised texture image segmentation. In Proc. IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP 2005), 2005
  • X. Wang, Z. Yao, and C.-T. Li. A palette-based image steganographic method using colour quantization. In Proc. IEEE International Conference on Image Processing, 2005

2004:

  • M. Hiller, H. A. Jhumka, S. Suri, 'EPIC: Profiling the Propagation and Effect of Data Errors in Software,' IEEE Transactions On Computers 53 (5), pp. 512 - 530, 2004
  • S. S. Anand, M. Mulvenna, K. Chavielier, 'On the Deployment of Web Usage Mining,' in Web Mining: From Web to Semantic Web, pp. 23 - 42, Editors: Bettina Berendt, Andreas Hotho, Dunja Mladenic, Maarten van Someren, Myra Spiliopoulou, Gerd Stumme (3-540-23258-3), Berlin: Springer, 2004
  • F.C. Gärtner, A. Jhumka, `Automating the addition of fail-safe fault-tolerance: Beyond fusion-closed specifications', In Proceedings of the 2004 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems, 183–198, 2004
  • A. Jhumka, M. Hiller, N. Suri, `An approach for designing and assessing detectors for dependable component-based systems', In Proceedings of the 7th IEEE International Symposium on High Assurance Systems Engineering, 69–78, 2004
  • A. Johansson, A. Sarbu, A. Jhumka, N. Suri, `On enhancing the robustness of commercial operating systems', In Proceedings of the International Service Availability Symposium 2004 (ISAS 2004), 148–159, 2004
  • H. Si and C.-T. Li, "Fragile Watermarking Scheme Based on the Block-wise Dependency in the Wavelet Domain," in Proc. ACM Multimedia and Security Workshop, pp. 214-219, Magdeburg, Germany, September, 2004
  • C.-T. Li. Digital Fragile Watermarking Scheme for Authentication of JPEG Images. IEE proceedings - Vision, Image, and Signal Processing, 151(6):460-466, December 2004
  • H. Si and C.-T. Li. Fragile Watermarking Scheme Based on the Block-wise Dependency in the Wavelet Domain. In Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany, September 2004
  • Y. Yuan and C.-T. Li. Fragile Watermarking Scheme Exploiting Non-deterministic Block-wise Dependency. In Proc. International Conference on Pattern Recognition, Cambridge, UK, September 2004
  • C.-K. Ho and C.-T. Li. Semi-fragile Watermarking Scheme for Authentication of JPEG Images. In Proc. IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, USA, April 2004
  • D. C. Lou, J. L. Liu, and C.-T. Li. Digital Signature-Based Image Authentication. In Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, ed. by C. S. Lu, Idea Group Publishing, 207-230, 2004

2003:

  • R. Wilson and C.-T. Li. A Class of Discrete Multiresolution Random Fields and its Application to Image Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(1):42-56, 2003
  • C.-T. Li and R. Chiao. Multiresolution Genetic Clustering Algorithm For Texture Segmentation. Image and Vision Computing, 21(11):955-966, 2003
  • C.-T. Li and F. M. Yang. One-dimensional Neighbourhood Forming Strategy for Fragile Watermarking. Journal of Electronic Imaging, 12(2):284-291, 2003
  • J. Vlachakis, M. Eirinaki, S. S. Anand. IKUM: An Integrated Web Personalization Platform Based on Content Structures and Usage Behavior, IJCAI Workshop on Intelligent Techniques in Web Personlisation, August, 2003
  • C.-T. Li, D. C. Lou, and J. L. Liu. Image Integrity and Authenticity Verification Via Content-based Watermarks and a Public Key Cryptosystem. Journal of Chinese Institute of Electrical Engineering, 10(1):99-106, 2003
  • A. Jhumka, N. Suri, M. Hiller, `A framework for the design and validation of efficient fail-safe fault-tolerant programs', In Proceedings of the 6th International Workshop on Software and Compilers for Embedded Systems, 182–197, 2003
  • C.-T. Li. Multiresolution Image Segmentation Integrating Gibbs Sampler and Region Merging Algorithm. Signal Processing, 83(1):67-78, 2003
  • C.-T. Li and R. Chiao. Unsupervised Texture Segmentation Using Multiresolution Hybrid Genetic Algorithm. In Proc. IEEE International Conference on Image Processing, Barcelona, Spain, September 2003
  • T.-H. Hsieh, C.-T. Li, and S. Wang. Watermarking Scheme for Authentication of Compressed Image. In Proc. SPIE International Conference on Multimedia Systems and Applications VI, Orlando, Florida, USA, September 2003

2002:

  • C.-T. Li, "Image Segmentation Using Multiresolution Gibbs Sampler," in Proc. 15th IPPR Conference on Computer Vision, Graphics and Image Processing, pp 654-659, Hsin-Chu, Taiwan, August 2002
  • M. Hiller, A. Jhumka, N. Suri, `On the placement of software mechanisms for detection of data errors', In Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 135–144, 2002
  • M. Hiller, A. Jhumka, N. Suri, `PROPANE: an environment for examining the propagation of errors in software', In Proceedings of the 2002 International Symposium on Software Testing and Analysis (ISSTA 2002), 81–85, 2002
  • D. Patterson, N. Rooney, M. Galushka, S. S. Anand: Towards Dynamic Maintenance of Retrieval Knowledge in CBR. FLAIRS Conference 2002: 126-131
  • A. Jhumka, M. Hiller, V. Claesson, N. Suri, `On systematic design of globally consistent executable assertions in embedded software', In Proceedings of the 5th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2002), 75–84, 2002
  • A. Jhumka, M. Hiller, N. Suri, `An approach to specify and test component-based dependable software', In Proceedings of the 5th IEEE International Symposium on High Assurance Systems Engineering (HASE 2002), 211–220, 2002
  • A. Jhumka, M. Hiller, N. Suri, `Component-based synthesis of dependable embedded software', In Proceedings of the 2002 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT 2002), 111–128, 2002
  • C.-T. Li, F.-M. Yang, and C.-S. Lee. Oblivious Fragile Watermarking Scheme For Image Authentication. In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol VI, Orlando, FL, USA, May 2002

2001:

  • S. S. Anand, P/ Hamilton, J. G. Hughes, D. A. Bell, 'On Prognostic Models, Artificial Intelligence and Censored Observations,' Methods Of Information In Medicine, 40, pp. 18 - 24, 2001
  • David W. Patterson, Sarabjot S. Anand, John G. Hughes: Skill Refinement through Competence Feedback. FLAIRS Conference 2001: 394-401
  • S. S. Anand, M. Baumgarten, K. Bradley, J. Gonzalez-Olalla, N. Rooney, M. Galushka. Personalising Customer Interactions using Knowledge Mined from Behavioural Logs, Proceedings of e-Business and e-Work Conference, Venice, October, 2001
  • M. D. Mulvenna, T. de Bree, S. S. Anand & A. G. Büchner. “Personalizing Financial Interactions on The Net: Technology and Scope”, 10th Annual Conference of the Arab Academy for Banking & Financial Services, Amman, Hashemite Kingdom of Jordan, April 2001
  • C.-T. Li and R. Chiao, ¡¡¡ÓMultiresolution Hybrid Genetic Algorithm for Texture Segmentation,¡¨ in Proc. 14th IPPR Conference on Computer Vision, Graphics and Image Processing, Kaoshung, Taiwan, August 2001
  • M. Hiller, A. Jhumka, N. Suri, `An approach for analysing the propagation of data errors in software', In Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001), 161–172, 2001
  • A. Jhumka, M. Hiller, N. Suri, `Assessing inter-modular error propagation in distributed software', In Proceedings of the 20th International Symposium on Reliable Distributed Systems (ISRDS 2001), 152–161, 2001
  • C.-T. Li. An Approach to Reducing the Labeling Cost of Markov Random Fields within an Infinite Label Space. Signal Processing, 81(3):609-620, 2001
  • C.-T. Li and F.-M. Yang. A Fragile Digital Watermarking Scheme for Image Authentication. In Proc. 11th National Conf. on Information Security, Taiwan, August 2001

2000:

  • C.-T. Li, D. C. Lou and T. H. Chen, "Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem," in Proc. IEEE International Conference on Image Processing, pp. 694-697, Vancouver, Canada, September 2000
  • C.-T. Li and R. Chiao. Image Authentication and Integrity Verification via Content-based Watermarks and a Public Key Cryptosystem. In Proc. IEEE International Conference on Image Processing, Vancouver, Canada, pages 694-697, September 2000
  • M.D. Mulvenna, S. S. Anand, and A. G. Büchner. Personalization on the Net using Web Mining, Editors for Communications of the ACM Special Section, August 2000.
  • A.G. Büchner, M. Baumgarten, S.S. Anand, M.D. Mulvenna, J.G. Hughes. Navigation Pattern Discovery from Internet Data, B. Masand, M. Spiliopoulou (eds.) Advances in Web Usage Analysis and User Profiling, Lecturer Notes in Computer Science, Springer-Verlag, 2000.
  • M. D. Mulvenna, S. S. Anand, A. G. Büchner, M. Baumgarten, R. Böhm, Z. Neuman. “Web Intelligence: Analysis, Representation & Deployment”, In: P.T. Kidd and B. Stanford-Smith (eds.). E-business: Key Issues, Applications and Technologies, IOS Press, pp. 789-793, 2000
  • M. D. Mulvenna, T. de Bree, S. S. Anand, A. G. Buchner, M. Baumgarten. Personalising Financial Transactions using Web Mining, 5th International Conference on Artificial Intelligence & Emerging Technologies in Accounting, Finance & Tax, Huelva, Spain, 2-3 November 2000
  • M. D. Mulvenna, S. S. Anand, A. G. Büchner, M. Baumgarten, R. Böhm, Z. Neuman. Web Intelligence: Analysis, Representation & Deployment, EBEW-2000, Madrid, 2000
  • S. S. Anand, M. Baumgarten, A. G. Büchner., M. D. Mulvenna. Gaining Insights into Web Customers using Web Intelligence, PAIS-2000, Berlin, 2000
  • M.D. Mulvenna, S. S. Anand, A. G. Büchner, R. Böhm, M. Baumgarten. Applying Web Intelligence, ICEC-2000, Seoul, Korea, August, 2000
  • M. D. Mulvenna, A. G. Büchner, S. S. Anand., M. Baumgarten, R. Böhm. Web Intelligence & Representation of Mined Knowledge, INFORMS-2000, Salt Lake City, Utah, USA, May 2000
  • A.G. Büchner, M. Baumgarten, M. D. Mulvenna, R. Böhm, S. S. Anand. Data Mining and XML: Current and Future Issues, 1st International Conference on Web Information Systems Engineering (IDS-2000), Hong Kong, pp.127-131, 2000 (Best Paper Award)
  • H. Zheng, S. S. Anand, J. G. Hughes, N. D. Black. Methods for Clustering Mass Spectrometry Data in Drug Development, IDAMAP-2000, Berlin, August, 2000.
  • A. E. Smith, S. S. Anand. Patient Survival Estimation with Multiple Variables: Adaptation of Cox's Regression to give an Individual's Prediction, IDAMAP-2000, August 2000.
  • C.-T. Li. Image Segmentation Based On A Multiresolution MRF Framework And Stochastic Relaxation. In Proc. 4th Asian Conference on Computer Vision, Taipei, Taiwan, January 2000
  • R Wilson. Mgmm: Multiresolution gaussian mixture models for computer vision. In International Conference on Pattern Recognition-Volume 1, pages 1212-1215, Barcelona, Spain, September 2000
  • C.-T. Li and R. Chiao. Image Authentication and Integrity Verification via Content-based Watermarks and a Public Key Cryptosystem. In Proc. IEEE International Conference on Image Processing, Vancouver, Canada, pages 694-697, September 2000
  • C.-T. Li. Image Segmentation Based On A Multiresolution MRF Framework And Stochastic Relaxation. In Proc. 4th Asian Conference on Computer Vision, Taipei, Taiwan, January 2000