上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬

發(fā)布時間:2021-10-09 編輯:考研派小莉 推薦訪問:
上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬

上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬內(nèi)容如下,更多考研資訊請關(guān)注我們網(wǎng)站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費(fèi)考研資源可以領(lǐng)取,有各種考研問題,也可直接加我們網(wǎng)站上的研究生學(xué)姐微信,全程免費(fèi)答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)

上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬 正文

  

  ?個人簡介
  辦公室:上海大學(xué)寶山校區(qū)東區(qū)通信樓(翔英樓)815室
  通信地址:上大路99號83號信箱上海大學(xué)通信學(xué)院
  郵政編碼:200444
  電話:021-66137263
  電子郵件:xzhang@shu.edu.cn

  ?教育經(jīng)歷
  2004年畢業(yè)于上海大學(xué)通信與信息工程學(xué)院,獲工學(xué)博士學(xué)位
  2001年于上海大學(xué)通信與信息工程學(xué)院獲工學(xué)碩士學(xué)位
  1995年畢業(yè)于吉林大學(xué)數(shù)學(xué)系,獲理學(xué)學(xué)士學(xué)位

  ?工作經(jīng)歷
  2011~2012,德國Konstanz大學(xué),Humboldt學(xué)者資深研究員
  2010~2011,美國紐約州立大學(xué)Binghamton分校,訪問學(xué)者
  2008~    ,上海大學(xué)通信與信息工程學(xué)院,教授
  2006~2008,上海大學(xué)通信與信息工程學(xué)院,副教授
  2004~2006,上海大學(xué)通信與信息工程學(xué)院,講師

  ?研究領(lǐng)域
  多媒體信息安全、信息隱藏、數(shù)字取證、加密域信號處理、圖像處理

  ?科研項(xiàng)目
  2015~2017,加密圖像壓縮研究,上海市曙光計劃,主持
  2015~2018,密文圖像中的可逆信息隱藏,國家自然科學(xué)基金,主持
  2013~2015,廣義率失真優(yōu)化的信息隱藏,上海市浦江人才計劃,主持
  2012~2015,上海高校特聘教授(東方學(xué)者)專項(xiàng)資助,主持
  2012~2014,高度安全的數(shù)字隱寫研究,教育部博士點(diǎn)基金(博導(dǎo)類),主持
  2011~2013,廣義隱寫編碼與多載體安全隱寫研究,國家自然科學(xué)基金,主持
  2010~2012,數(shù)字圖像內(nèi)容的真?zhèn)舞b定研究,上海市科委國際合作項(xiàng)目,主持
  2010~2012,數(shù)字圖像中的新型安全隱寫,上海市科技啟明星跟蹤計劃,主持
  2010~2011,新型數(shù)字隱寫編碼研究,教育部科研重點(diǎn)項(xiàng)目,主持
  2009~2011,數(shù)字圖像真實(shí)性的被動取證研究,國家自然科學(xué)基金,主持
  2009~2011,數(shù)字隱寫中的新型編碼研究,上海市教委科研創(chuàng)新重點(diǎn)項(xiàng)目,主持
  2007~2009,數(shù)字圖像反隱寫關(guān)鍵技術(shù),國家高技術(shù)研究發(fā)展計劃(863計劃),主持
  2006~2008,數(shù)字圖像中的隱寫分析與反隱寫綜合措施研究,上海市青年科技啟明星計劃,主持
  2006~2008,具有統(tǒng)計隱蔽性和抗干擾性的安全密寫研究,國家自然科學(xué)基金,主持
  2004~2007,抗統(tǒng)計分析的數(shù)字圖像密寫研究,上海市科委基礎(chǔ)研究重點(diǎn)項(xiàng)目,主持
  2004~2006,具有多重免疫性的安全數(shù)字水印協(xié)議與算法研究,上海市教委青年基金,主持

  ?授課情況
  信息科技概覽(本科生通識課)
  信息時代的思維(本科生新生研討課)
  信息論與編碼(本科生)
  數(shù)字圖像處理(本科生)
  信息網(wǎng)絡(luò)與安全(本科生)
  通信與信息新技術(shù)進(jìn)展(研究生)

  ?近期論文
  International Journal Papers:
  1.      Z. Qian, and X. Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source Encoding, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
  2.      G. Feng, H. Zhang, and X. Zhang, Effective Feature Selection for Image Steganalysis Using Extreme Learning Machine, Journal of Electronic Imaging, (to appear)
  3.      Y. Ren, S. Wang, and X. Zhang, Fully Secure Expressive Ciphertext-Policy Attribute-Based Encryption without Random Oracles, Information, (to appear)
  4.      F. Li, X. Zhang, J. Yu, and H. Cheng, Digital Image Steganalysis Based on Local Textural Features and Double Dimensionality Reduction, Security and Communication Networks, (to appear)
  5.      L. Shen, P. An, X. Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, (to appear)
  6.      X. Zhang, and W. Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61, 2015.
  7.      G. Feng, Y. Lan, X. Zhang, and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015.
  8.      Z. Qian, X. Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation, 26(1), pp. 9-13, 2015.
  9.      L. Shen, Z. Zhang, X. Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128, 2015.
  10.  X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing Encrypted Images with Auxiliary Information, IEEE Trans. on Multimedia, 16(5), pp. 1327-1336, 2014.
  11.  X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 25(2), pp. 322-328, 2014.
  12.  X. Zhang, C. Qin, and L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp. 441-447, 2014.
  13.  X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with Multi-layer Decomposition, Multimedia Tools and Applications, 72, pp. 489-502, 2014.
  14.  Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Trans. on Multimedia, 16(5), pp. 1486-1491, 2014.
  15.  F. Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography with New Distortion Function, Annals of Telecommunications, 69, pp. 431-440, 2014.
  16.  Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91, pp. 100-108, 2014.
  17.  B. Chen, G. Feng, X. Zhang, and F. Li, Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014.
  18.  X. Han, Z. Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Image Interpolation, International Journal of Digital Crime and Forensics, 6(2), pp. 73-84, 2014.
  19.  Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security, 16(4), 256-264, 2014.
  20.  R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management, 5(4), pp. 36-52, 2014.
  21.  X. Zhang, Reversible Data Hiding with Optimal Value Transfer, IEEE Trans. on Multimedia, 15(2), pp. 316-325, 2013.
  22.  X. Zhang, Commutative Reversible Data Hiding and Encryption, Security and Communication Networks, 6, pp. 1396-1403, 2013.
  23.  Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Trans. on Information Forensics & Security, 8(1), pp. 55-63, 2013.
  24.  L. Shen, Z. Liu, X. Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013.
  25.  F. Li, X. Zhang, B. Chen, and G. Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier, IEEE Signal Processing Letters, 20(3), pp. 233-236, 2013.
  26.  G. Sun, X. Zhang, G. Li, and J. Yin, Robust Degraded Face Recognition with Novel Face Representation and Multi-scale Fusion, Optical Engineering, 52(7), 2013.
  27.  Y. Ren, S. Wang, and X. Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper Keys, Computers and Mathematics with Applications, 65(9), pp. 1403-1412, 2013.
  28.  C. Qin, C.-C. Chang, W.-B. Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013.
  29.  X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012.
  30.  X. Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Trans. on Information Forensics & Security, 7(2), pp. 526-532, 2012.
  31.  X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), pp. 179-185, 2012.
  32.  H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012.
  33.  G. Feng, Z. Qian, and X. Zhang, Evolutionary Selection Extreme Learning Machine Optimization for Regression, Soft Computing, 16(9), pp. 1485-1491, 2012.
  34.  C. Qin, S. Wang, and X. Zhang, Simultaneous inpainting for image structure and texture using anisotropic heat transfer model, Multimedia Tools and Applications, 56(3), pp. 469-483, 2012.
  35.  Z. Qian, and X. Zhang, Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012.
  36.  G. Feng, Z. Qian, and X. Zhang, Spectrum-Estimation Based Lossless Information Recovery for Sparse Array Patterns, Telecommunication Systems, 49(2), pp. 163-169, 2012.
  37.  X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics & Security, 6(4), pp. 1223-1232, 2011.
  38.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011.
  39.  X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Trans. on Information Forensics & Security, 6(1), pp. 53-58, 2011.
  40.  X. Zhang, Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18(4), pp. 255-258, 2011.
  41.  X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011.
  42.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54(2), pp. 385-395, 2011.
  43.  Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011.
  44.  Y. Ren, S. Wang, and X. Zhang, Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of Internet Technology, 12(4), pp. 647-658, 2011.
  45.  C. Qin, F. Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011.
  46.  Z. Qian, G. Feng, X. Zhang, and S. Wang, Image Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011.
  47.  Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3), pp. 325-345, 2011.
  48.  Z. Tang, S. Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011.
  49.  C. Kim, D. Shin, D. Shin, and X. Zhang, Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, Communications in Computer and Information Science, 186(1), pp. 130-138, 2011.
  50.  X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010.
  51.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010.
  52.  S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010.
  53.  W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010.
  54.  H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved Modification Direction Methods, Computers and Mathematics with Applications, 60(2), pp. 319-325, 2010.
  55.  W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics & Security, 5(3), pp. 507-517, 2010.
  56.  Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self Recovery with Anti-cropping Capability, International Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010.
  57.  C. Qin, Q. Mao, and X. Zhang, Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010.
  58.  Y. Ren, D. Gu, S. Wang, and X. Zhang, New Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010.
  59.  Y. Ren, D. Gu, S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption without Random Oracles, International Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010.
  60.  X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009.
  61.  X. Zhang, S. Wang and W. Zhang, Steganography Combining Data Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009.
  62.  X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Trans. on Multimedia, 10(8), pp. 1490-1499, 2008.
  63.  X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, pp. 553-556, 2008.
  64.  Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and Technology, 2(1), pp. 18-26, 2008.
  65.  X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), pp. 1191-1192, 2007.
  66.  W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007.
  67.  X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), pp. 727-730, 2007.
  68.  W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682, 2007.
  69.  X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), pp. 482-483, 2007.
  70.  X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), pp. 125-128, 2007.
  71.  X. Zhang and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006.
  72.  X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), pp. 781-783, 2006.
  73.  X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006.
  74.  X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88-A(12), pp. 3663-3667, 2005.
  75.  X. Zhang and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), pp. 67-70, 2005.
  76.  X. Zhang and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25(8), pp. 967-973, 2004.
  77.  X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25(3), pp. 331-339, 2004.
  78.  X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002.
  79.  S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397,  2002.
  80.  S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402,  2002.

以上老師的信息來源于學(xué)校網(wǎng)站,如有更新或錯誤,請聯(lián)系我們進(jìn)行更新或刪除,聯(lián)系方式

添加上海大學(xué)學(xué)姐微信,或微信搜索公眾號“考研派小站”,關(guān)注[考研派小站]微信公眾號,在考研派小站微信號輸入[上海大學(xué)考研分?jǐn)?shù)線、上海大學(xué)報錄比、上海大學(xué)考研群、上海大學(xué)學(xué)姐微信、上海大學(xué)考研真題、上海大學(xué)專業(yè)目錄、上海大學(xué)排名、上海大學(xué)保研、上海大學(xué)公眾號、上海大學(xué)研究生招生)]即可在手機(jī)上查看相對應(yīng)上海大學(xué)考研信息或資源

上海大學(xué)考研公眾號 考研派小站公眾號
上海大學(xué)

本文來源:http://alternativeofficeassistance.com/shanghaidaxue/daoshi_492773.html

推薦閱讀