|
Publications
Journals & Conferences
Pixel Inconsistency Modeling for Image Manipulation Localization (Paper)
Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, and Alex C. Kot
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2025, (CCF-A).
MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection
Chenqi Kong, Anwei Luo, Peijun Bao, Yi Yu, Haoliang Li, Shiqi Wang, Zengwei Zheng, and Alex C. Kot
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025, (CCF-A).
M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System (Paper)
Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024, (CCF-A).
Beyond the Pixel World: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones (Paper && Code)
Chenqi Kong, Kexin Zheng, Shiqi Wang, Anderson Rocha, Haoliang Li
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2022, (CCF-A).
Detect and Locate: Exposing Face Manipulation by Semantic and Noise-level Telltales (Paper && Code)
Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2022, (CCF-A).
Temporal Unlearnable Examples: Preventing Personal Video Data from Unauthorized Exploitation by Object Tracking
Qiangqiang Wu, Yi Yu, Chenqi Kong*, Ziquan Liu, Jia Wan, Haoliang Li, Alex Kot, and Antoni B. Chan.
ICCV 2025, (CCF-A).
Vid-Morp: Video Moment Retrieval Pretraining from Unlabeled Videos in the Wild
Peijun Bao, Chenqi Kong*, Siyuan Yang, Zihao Shao, Xinghao Jiang, Boon Poh Ng, and Alex C. Kot
ICCV 2025, (CCF-A).
SAVER: Mitigating Hallucinations in Large Vision-Language Models via Style-Aware Visual Early Revision
Zhaoxu Li, Chenqi Kong*, Yi Yu, Qiangqiang Wu, Xinghao Jiang, Ngai-Man Cheung, Bihan Wen, Alex Kot, and Xudong Jiang
AAAI 2026, (CCF-A).
Open-Set Deepfake Detection: A Parameter-Efficient Adaptation Method with Forgery Style Mixture
Chenqi Kong, Anwei Luo, Peijun Bao, Haoliang Li, Renjie Wan, Zengwei Zheng, Anderson Rocha, and Alex C. Kot
IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2026, (JCR-Q1).
Appearance Matters, So Does Audio: Revealing the Hidden Face via Cross-Modality Transfer (Paper)
Chenqi Kong, Baoliang Chen, Wenhan Yang, Haoliang Li, Peilin Chen, Shiqi Wang
IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2022, (JCR-Q1).
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization
Keyang Zhang, Chenqi Kong*, Hui Liu, Bo Ding, Xinghao Jiang, and Haoliang Li*
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2026, (CCF-A).
Digital and Physical Face Attacks: Reviewing and One Step Further (Paper)
Chenqi Kong, Shiqi Wang, Haoliang Li
APSIPA Transactions on Signal and Information Processing, 2022.
Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation (Paper)
Chenqi Kong, Shiqi Wang, Haoliang Li
IEEE International Conference on Multimedia Information Processing and Retrieval (IEEE MIPR), 2023.
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection (Paper)
Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, and Alex C. Kot
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2023, (CCF-A).
Two-branch Multi-scale Deep Neural Network for Generalized Document Recapture Attack Detection (Paper)
Jiaxing Li, Chenqi Kong, Shiqi Wang, Haoliang Li
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2023.
S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens
Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, and Alex C. Kot
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2024, (CCF-A).
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection
Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, and Alex C. Kot
IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2024.
Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
Yi Yu, Song Xia, Xun Lin, Chenqi Kong, Wenhan Yang, Shijian Lu, Yap-peng Tan, and Alex C. Kot.
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2025, (CCF-A).
Image Provenance Analysis via Graph Encoding with Vision Transformer
Keyang Zhang, Chenqi Kong, Shiqi Wang, Anderson Rocha, and Haoliang Li.
IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2025, (CCF-A).
Unraveling the Mechanics of Learning-Based Prompt Retriever for In-Context Learning
Hui Liu, Wenya Wang, Hao Sun, Chris Xing Tian, Chenqi Kong, Xin Dong, Haoliang Li
ACL (oral), 2025, (CCF-A).
Artifact-free, penetration-adjustable elliptical-mirror-based TIRF microscopy (Paper)
Jian Liu, Chenqi Kong, Qiang Li, Weisong Zhao, Mengzhou Li, Shan Gao, Chenguang Liu, Jiubin Tan
Optics Express (OE), 2018.
No-Reference Image Quality Assessment by Hallucinating Pristine Features (Paper && Code)
Baoliang Chen, Lingyu Zhu, Chenqi Kong, Hanwei Zhu, Shiqi Wang, Li Zhu.
IEEE Transactions on Image Processing (IEEE TIP), 2022, (CCF-A).
Rethinking Attention-Model Explainability through Faithfulness Violation Test (Paper && Code)
Yibing Liu, Haoliang Li, Yangyang Guo, Chenqi Kong, Jing Li, Shiqi Wang
International Conference on Machine Learning (ICML), 2022, (CCF-A).
Privacy-Preserving Face Forgery Detection via Fine-Grained Steganographic Domain Analysis
Guoqing Ma, Xun Lin, Hui Ma, Ajian Liu, Yizhong Liu, Wenzhong Tang, Shan Yu, Chenqi Kong, Yi Yu
Machine Intelligence Research} (MIR), 2026.
Preprints
SAKED: Mitigating Hallucination in Large Vision-Language Models via Stability-Aware Knowledge Enhanced Decoding
Zhaoxu Li, Chenqi Kong (equal contribution), Peijun Bao, Song Xia, Yi Yu, Yi Tu, Xinghao Jiang, and Xudong Jiang. Yi Yu
ArXiv, 2026.
Provable Robustness in Multimodal Large Language Models via Feature Space Smoothing
Song Xia, Meiwen DING, Chenqi Kong, Wenhan Yang, and Xudong Jiang.
ArXiv, 2026.
Event-Native Dataset Distillation for efficient and fast SNN Training
Shuhan Ye, Yi Yu, Qixin Zhang, Chenqi Kong,, Qiangqiang Wu, Kun Wang, and Xudong Jiang.
ArXiv, 2026.
Sparse by Rule: Probability-Based N:M Pruning for Spiking Neural Networks with O(M) Complexity
Shuhan Ye, Yi Yu, Qixin Zhang, Chenqi Kong, Qiangqiang Wu, Xudong Jiang, and Dacheng Tao.
ArXiv, 2026.
Actor-Critic Framework for Hallucination Detection and Mitigation in MLLMs
Nithish Muthuchamy Selvaraj, Linwei Zhang, Chenqi Kong, Bihan Wen, Xudong Jiang.
ArXiv, 2026.
Say It with an Image: Targeted Text Induction in Multimodal LLMs
Meiwen Ding, Song Xia, Chenqi Kong, and Xudong Jiang.
ArXiv, 2026.
ForensicsSAM: Toward Robust and Unified Image Forgery Detection and Localization Resisting to Adversarial Attack
Rongxuan Peng, Shunquan Tan, Chenqi Kong, Anwei Luo, Alex C. Kot, and Jiwu Huang.
ArXiv, 2025.
Patents
Echo-FAS: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones
Chenqi Kong, Haoliang Li, Shiqi Wang, Kexin Zheng
A More General And Robust Face Manipulation Detection Approach via Noise Modeling
Baoliang Chen, Chenqi Kong, Haoliang Li, Shiqi Wang
|