Jinyu Tian is currently an Assistant Professor at the Faculty of Innovation Engineering, at Macau University of Science and Technology. He received his Ph.D. degree from the Faculty of Science and Technology, University of Macau, Taipa, China. Before this, he received B.S. and M.S. degrees in mathematics from Chongqing University, Chongqing, China, in 2014 and 2017, respectively. His current research interests include adversarial machine learning, security of deep learning, and subspace learning. He has authored/co-authored over 10 scientific papers in international journals and conferences, such as TIP, TNNLS, AAAI, and CVPR. He is a regular reviewer of extensive journals and conferences, such as TIP, TMM, ACM MM, and CVPR.

đź“– EDUCATIONS

  • 2017.08 - 2022.01 University of Macau, Macau, China, Ph.D., Computer Science.
  • 2014.09 - 2017.07 Chongqing University, Chongqing, China, M.S., Mathematics.
  • 2010.09 - 2014.07 Chongqing University, Chongqing, China, B.S., Mathematics.

đź’» RESEARCH INTERESTS/AREAS

Adversarial Machine Learning: Adversarial Detection, White-box Attack, and Physical Attack.

Security of Deep Learning: IP Protection of Deep Models, Watermarking of Deep Models.

Multimedia Forensics: Forgery Detection, DeepFake Detection, AIGC Detection.

Subspace Learning: Subspace Manifold Representation, Robust Subspace Learning.

đź“– OPENINGS

We regularly have several positions for full-scholarship and half-scholarship Ph.D. If you are interested in my research and want to join our group, please don’t hesitate to send me an email with your CV and research interests.

🔥 NEWS

2024.11: 🎉 Two papers are accepted by AAAI 2025

2024.10: 🎉 One paper is accepted by NeruIPS 2024

đź“ť PUBLICATIONS

2025

T. T. Wang, K. Fang, J. J. Cai, L. Wang, J. Y. Tian*, H. L. Feng, J. Q. Li, M. Guizani, W. Wang, “Security within Security: Attack Detection Model with Defenses Against Attacks Capability for Zero-trust Networks”, IEEE Journal on Selected Areas in Communications. (JCR Q1)

Y. Y. Tian, and J. Y. Tian*, “Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models”, AAAI. (CCF A)

L. Zheng, L. B. Xie, J. T. Zhou, X. T. Wang, H. W. Wu, J. Y. Tian, “Anti-Diffusion: Preventing Abuse of Modifications of Diffusion-Based Models”, AAAI. (CCF A)

2024

F. P. Li, K. M. Li, H. W. Wu, J. Y. Tian, J. T. Zhou, “DAT: Improving Adversarial Robustness via Generative Amplitude Mix-up in Frequency Domain”, NeruIPS. (CCF A)

T. T. Wang, J. Y. Tian*, K. Fang, T. R.Gadekallu, W. Wang, “AI and Digital Twin for Consumer Electronics in Smart Cities”, IEEE Consumer Electronics Magazine. (JCR Q2)

Y. Wu, J. Y. Tian*, H. J. Liu, Y. Y. Tang, “A dense video caption dataset of student classroom behaviors and a baseline model with boundary semantic awareness”, Displays. (JCR Q1)

J Liu, J. T. Zhou, J. D. Zeng, J. Y. Tian, “DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space”, AAAI (CCF A)

F Li, K. M. Li, J. Y. Tian, J. T. Zhou, “Regroup Median Loss for Combating Label Noise”, AAAI (CCF A)

J. Liu, J. T. Zhou, J. Y. Tian, W. W. Sun, “Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples”, ACM Transactions on Multimedia Computing, Communications, and Applications. (CCF B, JCR Q1)

T. T. Wang, T. Tang, Z. Cai, K. Fang, J. Y. Tian*, J. Q. Li, W. Wang, F. Xia, “Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things”, ACM Transactions on Internet Technology. (CCF B, JCR Q1)

X. R. Wang, J. Y. Tian*, J. Q. Li, B. Z. Wang, Y. Y. Tang, “Multimodal Fusion With Optimized Embedding Strength for Consumptive Medical Image Protection”, IEEE Transactions on Consumer Electronics. (JCR Q1)

B. Sun, J. Y. Tian, Y. Wu, L. Yu, Y. Y. Tang, “Structured Encoding Based on Semantic Disambiguation for Video Captioning”, Cognitive Computation. (JCR Q1)

2023

J. C. Deng, L. Dong, J. Chen, D. Yan, R. Wang, D. Ye, L. Zhao, J. Y. Tian, “Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition” ACM MM. (CCF A)

J. Liu, J. T. Zhou, H. W. Wu, W. W. Sun, J. Y. Tian, “Generating Robust Adversarial Examples against Online Social Networks (OSNs)”, ACM Transactions on Multimedia Computing, Communications and Applications. (CCF B, JCR Q1)

Y. M. Li, M. Liu, J. Y. Tian, J. Du, X. Li, “Operation history estimation and its application to multi-degraded image restoration”, IEEE Transactions on Consumer Electronics. (JCR Q1)

H. W. Wu, J. T. Zhou, X. Zhang, J. Y. Tian, W. W. Sun, “Robust Camera Model Identification over Online Social Network Shared Images via Multi-Scenario Learning”, IEEE Transactions on Information Forensics and Security. (CCF A, JCR Q1)

Y. M. Chen, J. Y. Tian, X. Y. Chen, and J. T. Zhou, “Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution”, CVPR (CCF-A).

Y. M. Li, L. Hu, L. Dong, H. W. Wu, J. Y. Tian, J. T. Zhou, X. Li, “Transformer-based image inpainting detection via label decoupling and constrained adversarial training”, IEEE Transactions on Circuits and Systems for Video Technology. (CCF B, JCR Q1)

X. Wang, X. Yuan, M. Li, Y. Sun, J. Y. Tian, H. Guo, J. Li, “Parallel multiple watermarking using adaptive Inter-Block correlation”, Expert Systems with Applications. (JCR Q1)

2022

H. W. Wu, J. T. Zhou, J. Y. Tian, and J. Liu, “Robust Image Forgery Detection over Online Social Network Shared Images”, IEEE Conference on Computer Vision and Pattern Recognition, 2022 (Oral, AR 4.2%). (CCF-A)

T. T. Wang, K. Fang, W. Wei, J. Y. Tian, Y. Pan, J. Li, “Microcontroller unit chip temperature fingerprint informed machine learning for IIoT intrusion detection”, IEEE Transactions on Industrial Informatics. (JCR Q1)

H. W. Wu, J. T. Zhou, J. Y. Tian, J. Liu, and Yu Qiao, “Robust Image Forgery Detection against Transmission over Online Social Networks”, IEEE Transactions on Information Forensics and Security, 2022. (CCF: A)

2021

J. Y. Tian, J. T. Zhou, and J. Duan, “Providing Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption”, IEEE Transactions on Services Computing. (CCF A, JCR Q1)

J. Y. Tian, J. T. Zhou, and J. Duan, “Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services”, CVPR. (CCF: A)

J. Y. Tian, J. T. Zhou, Y.M. Li, and J. Duan, “Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain”, AAAI. (CCF: A)

W. W. Sun, J. T. Zhou, L. Dong, J. Y. Tian, and J. Liu, “Optimal Pre-filtering for Improving Shared Images in Online Social Networks”, IEEE Transactions on Image Processing, 2021. (CCF: A, JCR Q1)

Y. M. Li, J. T. Zhou, J. Y. Tian, X. W. Zheng, and Y. Y. Tang, “Weighted Error Entropy based Information Theoretic Learning for Robust Subspace Representation”, IEEE Transactions on Neural Networks and Learning Systems. (CCF B, JCR Q1)

Y. M. Li, J. T. Zhou, X. W. Zhen, J. Y. Tian, and Y. Y. Tang. “Robust Subspace Clustering with Independent and Piecewise Identically Distributed (i.p.i.d.) Noise Modeling”, CVPR. (CCF: A; Oral, AR 5.6%)

Before

A. Y. Qin, Z. W. Shang, J. Y. Tian, Y. L. Wang, T. P. Zhang, and Y. Y. Tang, “Spectral–Spatial Graph Convolutional Networks for Semisupervised Hyperspectral Image Classification”. IEEE Geoscience and Remote Sensing Letters. (JCR: Q1)

J. Y. Tian, T. P. Zhang, A. Y. Qin, Z. W. Shang, and Y. Y. Tang, “Learning the Distribution Preserving Semantic Subspace for Clustering”, IEEE Transactions on Image Processing, 2017. (CCF: A, JCR Q1)

🎖 PROFESSIONAL ACTIVITIES & AWARDS

  1. Natural Science Award, the Third Prize, Macau, 2022.
  2. The secretary of the Institute of Electrical and Electronics Engineers (IEEE), Macau Section.
  3. Area Chair: Int. Conf. on Multimedia and Expo (CCF B), 2023
  4. Publication Chair: Asia Pacific Signal and Information Processing Association, Annual Summit and Conference, 16th.
  5. Reviewer of journals and conferences, including
    • IEEE Trans. on Image Processing
    • IEEE Trans. on Information Forensics and Security
    • IEEE Trans. on Dependable and Secure Computing
    • IEEE Trans. on Multimedia
    • International Journal of Pattern Recognition and Machine Learning
    • CVPR, AAAI, ICML, NeruIPS, ACM MM.

đź’» FUNDING

  1. Natural Science Foundation of China (NSFC), PI, “Study of Adversarial Perturbations for Privacy-preserving in Online Social Network”, 62202009, Jan. 2023 – Dec. 2025. (300K RMB)

  2. Macau Science and Technology Development Fund (FDCT), PI, “Research on Visual Adversarial Perturbation Toward the Protection of Digital Properties and Privacy”, 0004/2023/RIB1, Oct. 2023 – Oct. 2026. (719K Mop)

  3. Macau Science and Technology Development Fund (FDCT), PI, “Research and Application of Key Technologies for Artificial Intelligence Generated Content Detection”, 0040/2023/ITP1, Dec. 2023 – Dec. 2025. (333K Mop)

  4. Guangdong Provincial Natural Science Foundation General Project, PI, “Research on Privacy Protection of Social Platforms Based on Discrete Robust Adversarial Perturbation”, Jan. 2024 – Dec. 2026. (150K RMB)