


default search action
Changsheng Chen 0001
Person information
- affiliation: Shenzhen University, Shenzhen, China
Other persons with the same name
- Changsheng Chen — disambiguation page
- Changsheng Chen 0002
— China Electric Power Research Institute, Beijing, China - Changsheng Chen 0003
— University of Massachusetts Dartmouth, New Bedford, MA, USA - Changsheng Chen 0004
— Shenzhen University, China - Changsheng Chen 0005
— Guizhou University, Guiyang, China
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j29]Shiqiang Zheng
, Changsheng Chen
, Shen Chen, Taiping Yao
, Shouhong Ding, Bin Li
, Jiwu Huang
:
Generalized Document Tampering Localization via Color and Semantic Disentanglement. IEEE Trans. Circuits Syst. Video Technol. 36(1): 1279-1292 (2026)
[j28]Zhihao Chen
, Yongqi Chen, Changsheng Chen
, Shunquan Tan
, Jiwu Huang
:
DiffEraser: Generalized Text Erasure Based on Latent Diffusion Prior. IEEE Trans. Image Process. 35: 2138-2151 (2026)
[i10]Youqi Wang, Shen Chen, Haowei Wang, Rongxuan Peng, Taiping Yao, Shunquan Tan, Changsheng Chen, Bin Li, Shouhong Ding:
ForgeryVCR: Visual-Centric Reasoning via Efficient Forensic Tools in MLLMs for Image Forgery Detection and Localization. CoRR abs/2602.14098 (2026)- 2025
[j27]Zhifan Lai
, Zikai Chang
, Mingrui Sha, Qihong Zhang
, Ning Xie
, Changsheng Chen
, Dusit Tao Niyato
:
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches. ACM Comput. Surv. 57(5): 117:1-117:35 (2025)
[j26]Changsheng Chen, Wenyu Chen, Ximin Chen, Haodong Li
:
Optical flow-based spatiotemporal analysis for document presentation attack detection. J. Electronic Imaging 34(3) (2025)
[j25]Rizhao Cai
, Yawen Cui
, Zitong Yu
, Xun Lin
, Changsheng Chen
, Alex C. Kot
:
Rehearsal-Free and Efficient Continual Learning for Cross-Domain Face Anti-Spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 47(12): 11348-11365 (2025)
[j24]Zitong Yu
, Rizhao Cai
, Yawen Cui
, Ajian Liu
, Changsheng Chen
:
Visual Prompt Flexible-Modal Face Anti-Spoofing. IEEE Trans. Dependable Secur. Comput. 22(3): 2597-2606 (2025)
[j23]Changsheng Chen
, Youjie Li
, Bokang Li, Weifan Yu, Baoying Chen
, Bin Li, Jiwu Huang:
Moiré Spectral Augmentation and Masked Frequency Modeling for Document Presentation Attack Detection. IEEE Trans. Dependable Secur. Comput. 22(6): 5366-5381 (2025)
[j22]Yuanman Li
, Yingjie He, Changsheng Chen
, Li Dong
, Bin Li
, Jiantao Zhou
, Xia Li
:
Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning. IEEE Trans. Image Process. 34: 425-440 (2025)
[c12]Changsheng Chen
, Wenyu Chen
, Yinyin Lin
, Bin Li
, Jiwu Huang
:
Unmask Tampering: Efficient Document Tampering Localization under Recapturing Attacks with Real Distortion Knowledge. CCS 2025: 1694-1708
[c11]Yongqi Chen, Lin Zhao, Rizhao Cai, Zitong Yu, Changsheng Chen, Bin Li:
Forensicability Assessment: Not All Samples Qualify for Recapture Detection. ICME 2025: 1-6
[c10]Songze Li
, Yunfei Guo
, Shen Chen
, Bin Li
, Kaiqing Lin
, Changsheng Chen
, Haodong Li
, Taiping Yao
, Shouhong Ding
:
DITL2: Dual-Stage Invariance Transfer Learning for Generalizable Document Image Tampering Localization. ACM Multimedia 2025: 82-91- 2024
[j21]Changsheng Chen
, Xijin Li, Baoying Chen
, Haodong Li
:
A distortion model guided adversarial surrogate for recaptured document detection. Pattern Recognit. 151: 110433 (2024)
[j20]Changsheng Chen
, Bokang Li, Rizhao Cai
, Jishen Zeng, Jiwu Huang
:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. IEEE Trans. Inf. Forensics Secur. 19: 1283-1298 (2024)
[j19]Rizhao Cai
, Zitong Yu
, Chenqi Kong
, Haoliang Li
, Changsheng Chen
, Yongjian Hu
, Alex C. Kot
:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing With Statistical Tokens. IEEE Trans. Inf. Forensics Secur. 19: 8385-8397 (2024)
[c9]Changsheng Chen, Wenyu Chen, Ximin Chen, Haodong Li
:
A Document Presentation Attack Detection Scheme with Optical Flow under a Flashlight. APSIPA 2024: 1-6
[c8]Changsheng Chen, Liangwei Lin, Yongqi Chen, Bin Li, Jishen Zeng, Jiwu Huang:
CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images. CVPR 2024: 15577-15586
[c7]Bokang Li, Changsheng Chen
:
Robust Document Presentation Attack Detection via Diffusion Models and Knowledge Distillation. PRCV (11) 2024: 278-291
[i9]Yuanman Li, Yingjie He, Changsheng Chen, Li Dong, Bin Li, Jiantao Zhou, Xia Li:
Image Copy-Move Forgery Detection via Deep PatchMatch and Pairwise Ranking Learning. CoRR abs/2404.17310 (2024)
[i8]Wentang Song, Zhiyuan Yan, Yuzhen Lin, Taiping Yao, Changsheng Chen, Shen Chen, Yandan Zhao, Shouhong Ding, Bin Li:
A Quality-Centric Framework for Generic Deepfake Detection. CoRR abs/2411.05335 (2024)- 2023
[j18]Jiaheng Zhang, Junjie Chen, Le Ou-Yang
, Changsheng Chen
, Ning Xie
:
Reading Multilevel 2-D Barcodes Using a Machine Learning Approach. IEEE Internet Things J. 10(14): 12908-12922 (2023)
[j17]Yongqi Chen
, Jiawei Pan
, Jiayu Lei
, Deyu Zeng
, Zongze Wu
, Changsheng Chen
:
EEE-Net: Efficient Edge Enhanced Network for Surface Defect Detection of Glass. IEEE Trans. Instrum. Meas. 72: 1-13 (2023)
[c6]Yingjie He, Yuanman Li, Changsheng Chen, Xia Li:
Image Copy-Move Forgery Detection via Deep Cross-Scale PatchMatch. ICME 2023: 2327-2332
[i7]Zitong Yu, Rizhao Cai, Yawen Cui, Ajian Liu, Changsheng Chen:
Visual Prompt Flexible-Modal Face Anti-Spoofing. CoRR abs/2307.13958 (2023)
[i6]Yingjie He, Yuanman Li, Changsheng Chen, Xia Li:
Image Copy-Move Forgery Detection via Deep Cross-Scale PatchMatch. CoRR abs/2308.04188 (2023)
[i5]Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, Alex C. Kot:
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens. CoRR abs/2309.04038 (2023)- 2022
[j16]Xiaoze Huang
, Zhaocheng Yang
, Changsheng Chen
:
Regional People Counting Approach Based on Multi-Motion States Models Using MIMO Radar. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022)
[j15]Changsheng Chen
, Lin Zhao
, Jiabin Yan, Haodong Li
:
A distortion model-based pre-screening method for document image tampering localization under recapturing attack. Signal Process. 200: 108666 (2022)
[j14]Ning Xie
, Junjie Chen, Yicong Chen, Ji Hu, Qiqi Zhang, Changsheng Chen
, Lei Huang
:
Detection of Information Hiding at Anti-Copying 2D Barcodes. IEEE Trans. Circuits Syst. Video Technol. 32(1): 437-450 (2022)
[j13]Zhaoxu Hu
, Changsheng Chen
, Wai Ho Mow
, Jiwu Huang
:
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells. IEEE Trans. Inf. Forensics Secur. 17: 2800-2815 (2022)
[j12]Changsheng Chen
, Shuzheng Zhang, Fengbo Lan, Jiwu Huang
:
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2890-2905 (2022)
[c5]Guanglin Li, Bin Li, Changsheng Chen, Shunquan Tan, Guoping Qiu:
Learning General Gaussian Mixture Model with Integral Cosine Similarity. IJCAI 2022: 3201-3207
[i4]Changsheng Chen, Lin Zhao, Rizhao Cai, Zitong Yu, Jiwu Huang, Alex C. Kot:
Forensicability Assessment of Questioned Images in Recapturing Detection. CoRR abs/2209.01935 (2022)- 2021
[j11]Ning Xie
, Changsheng Chen
, Zhong Ming
:
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels. IEEE Trans. Dependable Secur. Comput. 18(1): 253-268 (2021)
[j10]Rizhao Cai
, Haoliang Li
, Shiqi Wang
, Changsheng Chen
, Alex C. Kot
:
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 16: 937-951 (2021)
[j9]Lin Zhao
, Changsheng Chen
, Jiwu Huang
:
Deep Learning-Based Forgery Attack on Document Images. IEEE Trans. Image Process. 30: 7964-7979 (2021)
[j8]Ning Xie
, Qiqi Zhang, Yicong Chen, Ji Hu, Gang Luo, Changsheng Chen
:
Low-Cost Anti-Copying 2D Barcode by Exploiting Channel Noise Characteristics. IEEE Trans. Multim. 23: 3752-3767 (2021)
[c4]Sudao Cai, Lin Zhao, Changsheng Chen
:
Open-Set Product Authentication Based on Deep Texture Verification. ICIG (1) 2021: 114-125
[c3]Anselmo Ferreira, Changsheng Chen, Mauro Barni:
Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection. WIFS 2021: 1-6
[i3]Lin Zhao, Changsheng Chen, Jiwu Huang:
Deep Learning-based Forgery Attack on Document Images. CoRR abs/2102.00653 (2021)- 2020
[j7]Changsheng Chen
, Mulin Li, Anselmo Ferreira
, Jiwu Huang
, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. IEEE Trans. Inf. Forensics Secur. 15: 1056-1071 (2020)
[j6]Wenyun Sun
, Yu Song
, Changsheng Chen
, Jiwu Huang
, Alex C. Kot
:
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. IEEE Trans. Inf. Forensics Secur. 15: 3181-3196 (2020)
[i2]Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen, Alex ChiChung Kot:
DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing. CoRR abs/2009.07529 (2020)
2010 – 2019
- 2019
[i1]Rizhao Cai, Changsheng Chen:
Learning deep forest with multi-scale Local Binary Pattern features for face anti-spoofing. CoRR abs/1910.03850 (2019)- 2018
[j5]Changsheng Chen
, Baojian Zhou, Wai Ho Mow:
RA Code: A Robust and Aesthetic Code for Resolution-Constrained Applications. IEEE Trans. Circuits Syst. Video Technol. 28(11): 3300-3312 (2018)- 2017
[j4]Changsheng Chen
:
QR Code Authentication with Embedded Message Authentication Code. Mob. Networks Appl. 22(3): 383-394 (2017)- 2016
[j3]Changsheng Chen
, Wenjian Huang, Baojian Zhou, Chenchen Liu, Wai Ho Mow:
PiCode: A New Picture-Embedding 2D Barcode. IEEE Trans. Image Process. 25(8): 3444-3458 (2016)- 2013
[j2]Changsheng Chen, Alex C. Kot, Huijuan Yang
:
A two-stage quality measure for mobile phone captured 2D barcode images. Pattern Recognit. 46(9): 2588-2598 (2013)- 2012
[j1]Changsheng Chen, Pina Marziliano, Alex C. Kot:
2D Finite Rate of Innovation Reconstruction Method for Step Edge and Polygon Signals in the Presence of Noise. IEEE Trans. Signal Process. 60(6): 2851-2859 (2012)
[c2]Changsheng Chen, Pina Marziliano, Alex C. Kot:
Step-edge reconstruction using 2D finite rate of innovation principle. ICASSP 2012: 3833-3836- 2010
[c1]Changsheng Chen, Alex C. Kot, Huijuan Yang
:
A quality measure of mobile phone captured 2D barcode images. ICIP 2010: 329-332
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-27 01:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







