百家乐玩法-网上百家乐官网哪家较安全

學術機構

首頁 > 學術機構 > 工程系 > 師資隊伍 > 教授 > 正文

工程系

教授

SMBU

作者:    審核:    發布時間:2025-02-19    閱讀次數:

工學博士。1962-10出生,深圳北理莫斯科大學工程系首席教授IEEE Fellow。研究方向為多媒體取證與安全、AI安全。

教育

西安電子科技大學電子對抗專業, 工學學士1982.1

清華大學通信與電子系統專業,工學碩士1987.12

中科院自動化所模式識別與智能系統專業,工學博士。1998.12

曾任職學術兼職

桂林電子工業學院助教、講師;汕頭大學講師、副教授、教授,汕頭大學工學院副院長、院長;中山大學教授,信息科學與技術學院副院長、院長教育部信息xxx重點實驗室(中山大學)主任、廣東省信息安全技術重點實驗室(中山大學)主任;深圳大學信息工程學院特聘教授、廣東省智能信息處理重點實驗室(深圳大學)主任

學術榮譽

國家杰出青年科學基金獲得者, 2003

IEEE Fellow, 2015

廣東省“特支計劃”杰出人才, 2017

曾主持的主要科研項目

1) NSFC-企業創新聯合基金重點項目社交網絡虛假媒體內容檢測關鍵技術的研究U19B2022),2020.1-2023.12

2) NSFC-通用技術基礎研究聯合基金重點項目基于大數據的信息隱藏與對抗技術U1636202),2017.1-2020.12

3) NSFC-廣東聯合基金重點項目網絡媒體內容服務安全理論與關鍵技術,(U1135001),2012.1-2015.12

4) 國家自然科學基金重點項目數字媒體內容安全關鍵技術及評測方法的研究60633030)。220萬。2007.1-2010.12

5) 國家重點研發計劃課題基于免疫的網絡動態風險評估與控制技術2020YFB18054042020 .11~

6) 國家973計劃項目課題網絡可視媒體安全2011CB302204, 2011.9-2015.8

7) 國家973計劃項目課題基于內容的可視媒體安全2006CB303104),2006.9-2010.8

8) 廣東省重點領域研發計劃網絡信息安全重點專項開放課題面向AI安全的偽造音視頻取證分析關鍵技術,”2019.1~2022.12

9) 阿里巴巴圖像篡改檢測與定位2020.11.01~2021.10.31

10) 阿里巴巴媒體認證技術認證2017.12~2018.11

科研教學獲獎

可視媒體幾何計算的理論與方法。國家自然科學等獎(排名, 2015

穩健數字水印方法。教育部提名國家科學技術獎自然科學一等獎(排名第一)2004

信息隱藏理論與方法。中國計算機學會科學技術獎自然科學一等獎排名, 2019

全方位實踐驅動的創新型IT人才培養模式研究。廣東省高等教育省級教學成果一等獎(排名第一),2010

發明專利:

獲國家發明專利授權60多件。部分成果在國家有關部門和工業界應用。

研究生

培養博士后/博士生40多名、碩士生70多名

論文和學術影響

發表論文近400篇。論文被引用23000多次(google scholar)。H-index: 79

3年發表的部分論文

[1] Shunquan Tan, Long Zhuo, Shenghai Luo, Han Chen, Bin Li, Jiwu Huang, “Evading detection actively: toward anti-forensics against forgery localization,” IEEE Trans. on Dependable and Secure Computing. Accepted

[2] Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex Kot, “Forgery-aware adaptive learning with vision transformer for generalized face forgery detection,” IEEE Trans. on Circuits and Systems for Video. Accepted

[3] Peijia Zheng, Xiongjie Fang , Zhipeng Zhou , Rui Yang , Wei Lu , Xiaochun Cao , Jiwu Huang, “Accurate and efficient privacy-preserving feature extraction on encrypted images,” IEEE Trans. on Dependable and Secure Computing. Accepted

[4] Guoyuan Lin, Weiqi Luo, Peijia Zheng, Jiwu Huang, “An audio watermarking method against re-recording distortions” Pattern Recognition, January 2025   https://doi.org/10.1016/j.patcog.2025.111366

[5] Qilin Yin, Wei Lu, Xiaochun Cao, Xiangyang Luo, Yicong Zhou, Jiwu Huang, “Fine-grained multimodal deepfake classification via heterogeneous graphs” International Journal of Computer Vision, 132(11): 5255-5269, 2024

[6] Kangkang Wei, Weiqi Luo, Jiwu Huang, “Color Image Steganalysis based on pixel difference convolution and enhanced transformer with selective pooling,” IEEE Trans. on Information Forensics & Security. vol.19 No.11 9970-9983, Nov. 2024

[7] Wenmin Huang, Weiqi Luo, Jiwu Huang, “Interactive Generative Adversarial Networks with High-Frequency Compensation for Facial Attribute Editing,” IEEE Trans. on Circuits and Systems for Video Technology. vol. 34, No.9, Sep., 2024

[8] Zhaoyang Zhang, Shen Wang, Guopu Zhu, Dechen Zhan, Jiwu Huang, “Adversarial perturbation prediction for real-time protection of speech privacy,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 8701-8706, Sep. 2024

[9] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Secure deep learning framework for moving object detection in compressed video,” IEEE Trans. on Dependable and Secure Computing. 21(4): 2836-2851, 2024.

[10] Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. “Detection of deepfake videos using long-distance attention,” IEEE Trans. on Neural Networks and Learning Systems. vol. 35, No. 7, pp. 9366-9379, July 2024

[11] Rongxuan Peng, Shunquan Tan, Xianbo Mo, Bin Li, and Jiwu Huang, “Employing reinforcement learning to construct a decision-making environment for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 4820-4834, May 2024

[12] Peijia Zheng, Ziyan Cheng, Xianhao Tian, Hongmei Liu, Weiqi Luo, Jiwu Huang. "Non-Interactive Privacy-Preserving Frequent Itemset Mining over Encrypted Cloud Data," IEEE Trans. on Cloud Computing, vol. 11, Issue 4, pp. 3452-3468, 2023

[13] Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang, “Joint cost learning and payload allocation with image-wise attention for batch steganography,” IEEE Trans. on Information Forensics & Security. vol. 19, pp. 2826-2839, Feb. 2024 .

[14] Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang, “One-class neural network with directed statistics pooling for spoofing speech detection,” IEEE Trans. on Information Forensics & Security. vol.19, pp. 2581-2593, Jan., 2024

[15] Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, and Jiwu Huang, “Distortion model-based spectral augmentation for generalized recaptured document detection, IEEE Trans. on Information Forensics & Security. vol. 19, pp. 15-29, 2024.

[16] Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, and Jiwu Huang, "steganography embedding cost learning with generative multi-adversarial network" IEEE Trans. on Information Forensics & Security. vol. 19, pp. 1283-1298, Jan. 2024.

[17] Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot, "Beyond the prior forgery knowledge: mining critical clues for general face forgery detection," IEEE Trans. on Information Forensics & Security. vol. 19, pp. 1168-1182, 2024.

[18] Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang, “ReLoc: a restoration-assisted framework for robust image tampering localization,” IEEE Trans. on Information Forensics & Security. vol. 18, pp. 5243-5257, 2023.

[19] Shuanquan Tan, Qiushi Li, Yilin Chen, Bin Li, Jiwu Huang, “STD-NET: search of image steganalytic deep-learning architecture via hierarchical tensor decomposition,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2657-2673, 2023.

[20] Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, and Jiwu Huang, “Adversarial steganography embedding via stego generation and selection,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2375-2389, 2023.

[21] Xianbo Mo, Sunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang, “ReLOAD: using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 18, 1524-1538, 2023

[22] Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang, “Query-efficient adversarial attacks with low perturbation against end-to-end speech recognition systems,” IEEE Trans. on Information Forensics & Security. vol.18, no.11, pp. 351-364, 2023

[23] Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang, “Domain-agnostic document authentication against practical recapturing attacks,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 8, pp. 2890-2905, Aug., 2022

[24] Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang, “Document recapture detection based on a unified distortion model of halftone cells,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 7, pp. 2800-2815, July, 2022

[25] Yuan Yuan, Gene Cheung, Pascal Frossard, V. H. Zhao, Jiwu Huang, “Landmarking for navigational streaming of stored high-dimensional media,” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5663-5679, Aug., 2022

[26] Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang, “Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography. IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5110-5123, Aug., 2022

[27] Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun Q. Shi, “Robust estimation of upscaling factor on double JPEG compressed images,” IEEE Trans. on Cybernetics. vol. 52, no. 10, pp. 10814-10826, Oct., 2022

[28] Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang, “Hybrid deep-learning framework for object-based forgery detection in video.” Signal Processing: Image Communication. vol. 105, 116655, 2022.

[29] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, " Universal Deep Network for Steganalysis of Color Image Based on Channel Representation," IEEE Trans. on Information Forensics and Security, vol. 17, no. 8, pp. 3022-3036, Aug., 2022

[30] Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang, “Self-adversarial training incorporating forgery attention for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol.17, pp.819-834 March 2022

[31] Weixuan Tang, Bin Li, Jin Li, Mauro Barni, Jiwu Huang, “Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge,” IEEE Trans. on. Circuits and Systems for Video. vol.32, no. 6, pp.4081-4095, June 2022

[32] Qiushi Li, Shunquan Tan, Shengda Chen, Bin Li, Jiwu Huang, “One-class double compression detection of advanced videos based on simple Gaussian distribution model,” IEEE Trans. on. Circuits and Systems for Video. 32(4), pp. 2496-2500, Apr. 2022.

[33] Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang, “Query-efficient attack for black-box image inpainting forensics via reinforcement learning,” AAAI 2025

[34] Ye Miaoxin, Saixing Zhou, Weiqi Luo, Shunquan Tan, Jiwu Huang, “GAN-based symmetric embedding costs adjustment for enhancing image steganographic security,” ACM Multimedia 2024: 7046-7054

[35] Changsheng Chen, Liangwei Lin, Yongqi Chen, Bin Li, Jishen Zeng, Jiwu Huang. , “CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images,” CVPR 2024: 15577-15586

[36] Peijia Zheng, Jiwu Huang, “Two-tier data packing in RLWE-based homomorphic encryption,” ACM CCS 2024, 2844-2858

[37] Wenmin Huang, Weiqi Luo, Jiwu Huang, Xiaochun Cao, “SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing,” AAAI 2024: 2374-2381

[38] Xianbo Mo, Shunquan Tan, Jiwu Huang, “Query-efficient black-box attack for image forgery localization via reinforcement learning,” ACM CCS 2023 (poster)

[39] Weiqi Luo, Jiwu Huang, “Automatic asymmetric embedding cost learning via generative adversarial networks,” ACM MM 2023.

[40] Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang, “Keyword spotting in the homomorphic encrypted domain using deep complex-valued CNN,” Proc. of ACM Multimedia 2022.



關閉

地址:深圳市龍崗區大運新城國際大學園路1號

電話:0755-28323024

郵箱:[email protected]

深圳北理莫斯科大學版權所有 - 粵ICP備16056390號 - 粵公網安備44030702002529號

返回頂部
皇冠体育网| 百家乐官网台布21点| 什么百家乐平注法| 新全讯网网址xb112| 金榜百家乐官网的玩法技巧和规则 | 闲和庄百家乐官网娱乐平台| 百家乐网站可信吗| 百家乐官网八卦九| 彩会百家乐官网游戏| 大发888真钱电玩游戏| 金宝博百家乐娱乐城| 哪个百家乐官网投注好| 娱乐城送体验金38元| 天博百家乐的玩法技巧和规则| 属狗与属龙做生意好吗| 百家乐官网有送体验金| 台前县| 澳门百家乐送彩金| 正品百家乐官网地址| 百家乐官网技巧发布| 利来国际开户| 威尼斯人娱乐成| 大杀器百家乐学院| 百家乐下注口诀| 百家乐官网真人游戏赌场娱乐网规则| 百家乐官网平台有什么优势| 长白| 瑞博国际| 威尼斯人娱乐网址| 百家乐真人真钱| 百家乐官网007| 百家乐官网视频游戏道具| 五常市| 皇冠现金网址| 单机百家乐游戏下| 请问下百家乐去哪个娱乐城玩最好呢| 百家乐棋牌辅助| 百家乐园sun811.com| 怎么玩百家乐能赢钱| 哪个百家乐网站最大| 赌博百家乐弱点|