Publications

  • Journals & Conferences

    • Beyond the Pixel World: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones (Paper && Code)
      Chenqi Kong, Kexin Zheng, Shiqi Wang, Anderson Rocha, Haoliang Li
      IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2022.

    • Detect and Locate: Exposing Face Manipulation by Semantic and Noise-level Telltales (Paper && Code)
      Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong
      IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2022.

    • Appearance Matters, So Does Audio: Revealing the Hidden Face via Cross-Modality Transfer (Paper)
      Chenqi Kong, Baoliang Chen, Wenhan Yang, Haoliang Li, Peilin Chen, Shiqi Wang
      IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2022.

    • M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System (Paper)
      Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li
      IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024.

    • Digital and Physical Face Attacks: Reviewing and One Step Further (Paper)
      Chenqi Kong, Shiqi Wang, Haoliang Li
      APSIPA Transactions on Signal and Information Processing, 2022.

    • Pixel Inconsistency Modeling for Image Manipulation Localization (Paper)
      Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, and Alex C. Kot
      IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2025.

    • MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection
      Chenqi Kong, Anwei Luo, Peijun Bao, Yi Yu, Haoliang Li, Shiqi Wang, Zengwei Zheng, and Alex C. Kot
      IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025.

    • Temporal Unlearnable Examples: Preventing Personal Video Data from Unauthorized Exploitation by Object Tracking
      Qiangqiang Wu, Yi Yu, Chenqi Kong*, Ziquan Liu, Jia Wan, Haoliang Li, Alex Kot, and Antoni B. Chan.
      ICCV 2025.

    • Vid-Morp: Video Moment Retrieval Pretraining from Unlabeled Videos in the Wild
      Peijun Bao, Chenqi Kong*, Siyuan Yang, Zihao Shao, Xinghao Jiang, Boon Poh Ng, and Alex C. Kot
      ICCV 2025.

    • Open-Set Deepfake Detection: A Parameter-Efficient Adaptation Method with Forgery Style Mixture
      Chenqi Kong, Anwei Luo, Peijun Bao, Haoliang Li, Renjie Wan, Zengwei Zheng, Anderson Rocha, and Alex C. Kot
      Submitted to IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2025.

    • Enhancing General Face Forgery Detection via Vision Transformer with Low-Rank Adaptation (Paper)
      Chenqi Kong, Shiqi Wang, Haoliang Li
      IEEE International Conference on Multimedia Information Processing and Retrieval (IEEE MIPR), 2023.

    • Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection (Paper)
      Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, and Alex C. Kot
      IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2023.

    • Two-branch Multi-scale Deep Neural Network for Generalized Document Recapture Attack Detection (Paper)
      Jiaxing Li, Chenqi Kong, Shiqi Wang, Haoliang Li
      IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2023.

    • S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens
      Rizhao Cai, Zitong Yu, Chenqi Kong, Haoliang Li, Changsheng Chen, Yongjian Hu, and Alex C. Kot
      IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2024.

    • Online Test-time Adaptation for Object Detection via Joint Object Entropy Minimization
      Kecheng Chen, Tiexin Qin, Chenqi Kong, Yan Hong, and Haoliang Li
      sSubmitted to IEEE Transactions on Pattern Analysis and Machine Intelligence} (TPAMI), 2024.

    • Forgery-aware Adaptive Vision Transformer for Face Forgery Detection
      Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, and Alex C. Kot
      IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT), 2024.

    • Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation
      Yi Yu, Song Xia, Xun Lin, Chenqi Kong, Wenhan Yang, Shijian Lu, Yap-peng Tan, and Alex C. Kot.
      IEEE Transactions on Information Security and Forensics (IEEE TIFS), 2024.

    • DAG: A Large-Scale Domain Adaptation Benchmark for Video Grounding
      Peijun Bao, Chenqi Kong*, Zihao Shao, Wenhan Yang, Boon Poh Ng, and Alex C. Kot
      Submitted to ACM Multimedia (ACM MM), 2024.

    • Unraveling the Mechanics of Learning-Based Prompt Retriever for In-Context Learning
      Hui Liu, Wenya Wang, Hao Sun, Chris Xing Tian, Chenqi Kong, Xin Dong, Haoliang Li
      ACL (oral), 2025.

    • Artifact-free, penetration-adjustable elliptical-mirror-based TIRF microscopy (Paper)
      Jian Liu, Chenqi Kong, Qiang Li, Weisong Zhao, Mengzhou Li, Shan Gao, Chenguang Liu, Jiubin Tan
      Optics Express (OE), 2018.

    • No-Reference Image Quality Assessment by Hallucinating Pristine Features (Paper && Code)
      Baoliang Chen, Lingyu Zhu, Chenqi Kong, Hanwei Zhu, Shiqi Wang, Li Zhu.
      IEEE Transactions on Image Processing (IEEE TIP), 2022.

    • Rethinking Attention-Model Explainability through Faithfulness Violation Test (Paper && Code)
      Yibing Liu, Haoliang Li, Yangyang Guo, Chenqi Kong, Jing Li, Shiqi Wang
      International Conference on Machine Learning (ICML), 2022.

  • Patents

    • Echo-FAS: A Novel Acoustic-based Face Anti-Spoofing System for Smartphones
      Chenqi Kong, Haoliang Li, Shiqi Wang, Kexin Zheng

    • A More General And Robust Face Manipulation Detection Approach via Noise Modeling
      Baoliang Chen, Chenqi Kong, Haoliang Li, Shiqi Wang