上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬
上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬內(nèi)容如下,更多考研資訊請關(guān)注我們網(wǎng)站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費(fèi)考研資源可以領(lǐng)取,有各種考研問題,也可直接加我們網(wǎng)站上的研究生學(xué)姐微信,全程免費(fèi)答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)
微信,為你答疑,送資源
上海大學(xué)通信與信息工程學(xué)院導(dǎo)師:張新鵬 正文
?個人簡介
辦公室:上海大學(xué)寶山校區(qū)東區(qū)通信樓(翔英樓)815室
通信地址:上大路99號83號信箱上海大學(xué)通信學(xué)院
郵政編碼:200444
電話:021-66137263
電子郵件:xzhang@shu.edu.cn
?教育經(jīng)歷
2004年畢業(yè)于上海大學(xué)通信與信息工程學(xué)院,獲工學(xué)博士學(xué)位
2001年于上海大學(xué)通信與信息工程學(xué)院獲工學(xué)碩士學(xué)位
1995年畢業(yè)于吉林大學(xué)數(shù)學(xué)系,獲理學(xué)學(xué)士學(xué)位
?工作經(jīng)歷
2011~2012,德國Konstanz大學(xué),Humboldt學(xué)者資深研究員
2010~2011,美國紐約州立大學(xué)Binghamton分校,訪問學(xué)者
2008~ ,上海大學(xué)通信與信息工程學(xué)院,教授
2006~2008,上海大學(xué)通信與信息工程學(xué)院,副教授
2004~2006,上海大學(xué)通信與信息工程學(xué)院,講師
?研究領(lǐng)域
多媒體信息安全、信息隱藏、數(shù)字取證、加密域信號處理、圖像處理
?科研項(xiàng)目
2015~2017,加密圖像壓縮研究,上海市曙光計劃,主持
2015~2018,密文圖像中的可逆信息隱藏,國家自然科學(xué)基金,主持
2013~2015,廣義率失真優(yōu)化的信息隱藏,上海市浦江人才計劃,主持
2012~2015,上海高校特聘教授(東方學(xué)者)專項(xiàng)資助,主持
2012~2014,高度安全的數(shù)字隱寫研究,教育部博士點(diǎn)基金(博導(dǎo)類),主持
2011~2013,廣義隱寫編碼與多載體安全隱寫研究,國家自然科學(xué)基金,主持
2010~2012,數(shù)字圖像內(nèi)容的真?zhèn)舞b定研究,上海市科委國際合作項(xiàng)目,主持
2010~2012,數(shù)字圖像中的新型安全隱寫,上海市科技啟明星跟蹤計劃,主持
2010~2011,新型數(shù)字隱寫編碼研究,教育部科研重點(diǎn)項(xiàng)目,主持
2009~2011,數(shù)字圖像真實(shí)性的被動取證研究,國家自然科學(xué)基金,主持
2009~2011,數(shù)字隱寫中的新型編碼研究,上海市教委科研創(chuàng)新重點(diǎn)項(xiàng)目,主持
2007~2009,數(shù)字圖像反隱寫關(guān)鍵技術(shù),國家高技術(shù)研究發(fā)展計劃(863計劃),主持
2006~2008,數(shù)字圖像中的隱寫分析與反隱寫綜合措施研究,上海市青年科技啟明星計劃,主持
2006~2008,具有統(tǒng)計隱蔽性和抗干擾性的安全密寫研究,國家自然科學(xué)基金,主持
2004~2007,抗統(tǒng)計分析的數(shù)字圖像密寫研究,上海市科委基礎(chǔ)研究重點(diǎn)項(xiàng)目,主持
2004~2006,具有多重免疫性的安全數(shù)字水印協(xié)議與算法研究,上海市教委青年基金,主持
?授課情況
信息科技概覽(本科生通識課)
信息時代的思維(本科生新生研討課)
信息論與編碼(本科生)
數(shù)字圖像處理(本科生)
信息網(wǎng)絡(luò)與安全(本科生)
通信與信息新技術(shù)進(jìn)展(研究生)
?近期論文
International Journal Papers:
1. Z. Qian, and X. Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source Encoding, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
2. G. Feng, H. Zhang, and X. Zhang, Effective Feature Selection for Image Steganalysis Using Extreme Learning Machine, Journal of Electronic Imaging, (to appear)
3. Y. Ren, S. Wang, and X. Zhang, Fully Secure Expressive Ciphertext-Policy Attribute-Based Encryption without Random Oracles, Information, (to appear)
4. F. Li, X. Zhang, J. Yu, and H. Cheng, Digital Image Steganalysis Based on Local Textural Features and Double Dimensionality Reduction, Security and Communication Networks, (to appear)
5. L. Shen, P. An, X. Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, (to appear)
6. X. Zhang, and W. Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61, 2015.
7. G. Feng, Y. Lan, X. Zhang, and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015.
8. Z. Qian, X. Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation, 26(1), pp. 9-13, 2015.
9. L. Shen, Z. Zhang, X. Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128, 2015.
10. X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing Encrypted Images with Auxiliary Information, IEEE Trans. on Multimedia, 16(5), pp. 1327-1336, 2014.
11. X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 25(2), pp. 322-328, 2014.
12. X. Zhang, C. Qin, and L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp. 441-447, 2014.
13. X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with Multi-layer Decomposition, Multimedia Tools and Applications, 72, pp. 489-502, 2014.
14. Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Trans. on Multimedia, 16(5), pp. 1486-1491, 2014.
15. F. Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography with New Distortion Function, Annals of Telecommunications, 69, pp. 431-440, 2014.
16. Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91, pp. 100-108, 2014.
17. B. Chen, G. Feng, X. Zhang, and F. Li, Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014.
18. X. Han, Z. Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Image Interpolation, International Journal of Digital Crime and Forensics, 6(2), pp. 73-84, 2014.
19. Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security, 16(4), 256-264, 2014.
20. R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management, 5(4), pp. 36-52, 2014.
21. X. Zhang, Reversible Data Hiding with Optimal Value Transfer, IEEE Trans. on Multimedia, 15(2), pp. 316-325, 2013.
22. X. Zhang, Commutative Reversible Data Hiding and Encryption, Security and Communication Networks, 6, pp. 1396-1403, 2013.
23. Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Trans. on Information Forensics & Security, 8(1), pp. 55-63, 2013.
24. L. Shen, Z. Liu, X. Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013.
25. F. Li, X. Zhang, B. Chen, and G. Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier, IEEE Signal Processing Letters, 20(3), pp. 233-236, 2013.
26. G. Sun, X. Zhang, G. Li, and J. Yin, Robust Degraded Face Recognition with Novel Face Representation and Multi-scale Fusion, Optical Engineering, 52(7), 2013.
27. Y. Ren, S. Wang, and X. Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper Keys, Computers and Mathematics with Applications, 65(9), pp. 1403-1412, 2013.
28. C. Qin, C.-C. Chang, W.-B. Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013.
29. X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012.
30. X. Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Trans. on Information Forensics & Security, 7(2), pp. 526-532, 2012.
31. X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), pp. 179-185, 2012.
32. H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012.
33. G. Feng, Z. Qian, and X. Zhang, Evolutionary Selection Extreme Learning Machine Optimization for Regression, Soft Computing, 16(9), pp. 1485-1491, 2012.
34. C. Qin, S. Wang, and X. Zhang, Simultaneous inpainting for image structure and texture using anisotropic heat transfer model, Multimedia Tools and Applications, 56(3), pp. 469-483, 2012.
35. Z. Qian, and X. Zhang, Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012.
36. G. Feng, Z. Qian, and X. Zhang, Spectrum-Estimation Based Lossless Information Recovery for Sparse Array Patterns, Telecommunication Systems, 49(2), pp. 163-169, 2012.
37. X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics & Security, 6(4), pp. 1223-1232, 2011.
38. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011.
39. X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Trans. on Information Forensics & Security, 6(1), pp. 53-58, 2011.
40. X. Zhang, Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18(4), pp. 255-258, 2011.
41. X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011.
42. X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54(2), pp. 385-395, 2011.
43. Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011.
44. Y. Ren, S. Wang, and X. Zhang, Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of Internet Technology, 12(4), pp. 647-658, 2011.
45. C. Qin, F. Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011.
46. Z. Qian, G. Feng, X. Zhang, and S. Wang, Image Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011.
47. Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3), pp. 325-345, 2011.
48. Z. Tang, S. Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011.
49. C. Kim, D. Shin, D. Shin, and X. Zhang, Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, Communications in Computer and Information Science, 186(1), pp. 130-138, 2011.
50. X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010.
51. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010.
52. S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010.
53. W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010.
54. H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved Modification Direction Methods, Computers and Mathematics with Applications, 60(2), pp. 319-325, 2010.
55. W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics & Security, 5(3), pp. 507-517, 2010.
56. Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self Recovery with Anti-cropping Capability, International Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010.
57. C. Qin, Q. Mao, and X. Zhang, Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010.
58. Y. Ren, D. Gu, S. Wang, and X. Zhang, New Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010.
59. Y. Ren, D. Gu, S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption without Random Oracles, International Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010.
60. X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009.
61. X. Zhang, S. Wang and W. Zhang, Steganography Combining Data Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009.
62. X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Trans. on Multimedia, 10(8), pp. 1490-1499, 2008.
63. X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, pp. 553-556, 2008.
64. Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and Technology, 2(1), pp. 18-26, 2008.
65. X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), pp. 1191-1192, 2007.
66. W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007.
67. X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), pp. 727-730, 2007.
68. W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682, 2007.
69. X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), pp. 482-483, 2007.
70. X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), pp. 125-128, 2007.
71. X. Zhang and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006.
72. X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), pp. 781-783, 2006.
73. X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006.
74. X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88-A(12), pp. 3663-3667, 2005.
75. X. Zhang and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), pp. 67-70, 2005.
76. X. Zhang and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25(8), pp. 967-973, 2004.
77. X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25(3), pp. 331-339, 2004.
78. X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002.
79. S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397, 2002.
80. S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402, 2002.
添加上海大學(xué)學(xué)姐微信,或微信搜索公眾號“考研派小站”,關(guān)注[考研派小站]微信公眾號,在考研派小站微信號輸入[上海大學(xué)考研分?jǐn)?shù)線、上海大學(xué)報錄比、上海大學(xué)考研群、上海大學(xué)學(xué)姐微信、上海大學(xué)考研真題、上海大學(xué)專業(yè)目錄、上海大學(xué)排名、上海大學(xué)保研、上海大學(xué)公眾號、上海大學(xué)研究生招生)]即可在手機(jī)上查看相對應(yīng)上海大學(xué)考研信息或資源。
上海大學(xué)
本文來源:http://alternativeofficeassistance.com/shanghaidaxue/daoshi_492773.html
推薦閱讀
-
上海大學(xué)法學(xué)院導(dǎo)師:諶瑜
研究方向:勞動與社會保障法、涉外民商法個人簡介:諶瑜,女,安徽蚌埠人,副教授,碩士生導(dǎo)師,兼任上海市江三角律師事務(wù)所律師。年畢業(yè)于安徽大學(xué)法律系法學(xué)專業(yè),獲法學(xué)士學(xué)位;年畢……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:陳琦華
研究方向:法律社會學(xué)、行政法與行政訴訟法、司法制度個人簡介:陳琦華,女,上海市人,中共黨員,法學(xué)博士,碩士生導(dǎo)師。兼任上海市浦東新區(qū)人民法院人民陪審員。主講課程:本科生:《……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:陳敬根
個人簡介:陳敬根,男,遼寧丹東人,滿族,中共黨員,法學(xué)博士,副教授、副編審,碩士生導(dǎo)師,律師(三級),中國國際經(jīng)濟(jì)貿(mào)易法學(xué)研究會理事。研究方向:海商法、海事法、海洋法、海事……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:陳劍平
陳劍平研究方向:金融法、經(jīng)濟(jì)法個人簡介:陳劍平(),男,教授年月生,浙江鎮(zhèn)海人。年畢業(yè)于復(fù)旦大學(xué)分校法律系。年起在上海大學(xué)任教。曾擔(dān)任文學(xué)院法律系經(jīng)濟(jì)法教研室主任、法律系主……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:傅文園
研究方向:訴訟法、知識產(chǎn)權(quán)法個人簡介:傅文園,女,浙江紹興人,副教授,碩士生導(dǎo)師,兼任中國高校知識產(chǎn)權(quán)研究會副秘書長,上海市仲裁委員會仲裁員,上海市知識產(chǎn)權(quán)仲裁院仲裁員,上……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:崔文玉
研究方向:商法、中日韓比較法個人簡介:崔文玉,吉林省延吉人,共產(chǎn)黨員,副教授,碩士生導(dǎo)師。主要講授商法(商法總論、公司法、破產(chǎn)法、票據(jù)法、保險法)日本商法學(xué)習(xí)經(jīng)歷:年月年月……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:金成華
研究方向:國際法、國際經(jīng)濟(jì)法、國際投資法、醫(yī)療法個人簡介:金成華:吉林人,朝鮮族,中共黨員,法學(xué)博士,法學(xué)博士后,副教授,碩士生導(dǎo)師主講課程:本科生的《國際法》、《國際經(jīng)濟(jì)……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:江界華
研究方向:刑法犯罪心理學(xué)、犯罪學(xué)個人簡介:江界華,男,副教授。早年畢業(yè)于復(fù)旦大學(xué)分校政法系法律專業(yè)。后從事法院審判工作,于年起在上海大學(xué)任教。年至年應(yīng)邀赴日本東洋大學(xué)為其外……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:鄭飛
一、個人情況:鄭飛,法學(xué)博士、博士后,副教授,碩士生導(dǎo)師吉林省雙陽縣第二中學(xué)中國人民公安大學(xué)偵察系刑偵專業(yè)吉林省林業(yè)公安干警學(xué)校長春稅務(wù)學(xué)院法學(xué)系現(xiàn)在上海大學(xué)法學(xué)院中國人民……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:趙清林
個人簡介:趙清林,男,生月生,湖北監(jiān)利人,漢族,中共黨員,法學(xué)博士,副教授,碩士生導(dǎo)師。研究方向:行政法學(xué)主講課程:本科生的《行政法與行政訴訟法》、《憲法》,研究生的《行政……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:趙輝
趙輝:男,湖北十堰人,漢族,中共黨員,法學(xué)博士,副教授研究方向:中國刑法學(xué)、比較刑法學(xué)主講課程:刑法學(xué)、刑事訴訟法學(xué)一、學(xué)歷及工作經(jīng)歷(一)學(xué)歷年月湖北大學(xué)經(jīng)濟(jì)學(xué)院國際金融……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:張玉蓉
研究方向:知識產(chǎn)權(quán)法、知識產(chǎn)權(quán)管理、與信息技術(shù)有關(guān)的知識產(chǎn)權(quán)問題、與國際貿(mào)易有關(guān)的知識產(chǎn)權(quán)問題個人簡介:張玉蓉,女,湖北荊門人,中共黨員,中德聯(lián)合培養(yǎng)知識產(chǎn)權(quán)管理學(xué)博士,副……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:張秀全
研究方向:民法基礎(chǔ)理論;合同法;物權(quán)法;商法基礎(chǔ)理論;公司法;破產(chǎn)法;保險法;知識產(chǎn)權(quán)法等。個人簡介:張秀全,男,河南濟(jì)源人,中共黨員,法學(xué)博士,教授,博導(dǎo),副院長,兼任中……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:袁真富
個人簡介:袁真富,男,年月生,四川大竹人,漢族,中共黨員,法學(xué)博士(社會學(xué)專業(yè)),副教授,知識產(chǎn)權(quán)學(xué)院副院長,兼任上海知識產(chǎn)權(quán)研究所副所長、高級研究員,東方知識產(chǎn)權(quán)俱樂部(……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:袁杜娟
個人簡介:袁杜娟,女,年月生,江西吉安人,漢族,法學(xué)博士、副教授,兼任上海捷華律師事務(wù)所律師。研究方向:國際經(jīng)濟(jì)法學(xué)、國際商法學(xué)主講課程:本科生《國際商法》、《法律英語》等……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:徐靜琳
研究方向:比較法學(xué)港澳基本法行政法學(xué)個人簡介:徐靜琳,女,上海市人。上海大學(xué)法學(xué)院教授,上海大學(xué)港澳臺法研究中心主任。年畢業(yè)于云南大學(xué),年西南政法學(xué)院主修法制史憲法學(xué),年香……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:許春明
研究方向:知識產(chǎn)權(quán)法、信息網(wǎng)絡(luò)法、知識產(chǎn)權(quán)管理個人簡介:許春明,男,年月生,江蘇省蘇州市吳江區(qū)人,教授、博士生導(dǎo)師,管理學(xué)博士、法學(xué)碩士、工學(xué)學(xué)士,知識產(chǎn)權(quán)學(xué)院副院長(主持……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:王勉青
王勉青研究方向:知識產(chǎn)權(quán)個人簡介:一、學(xué)歷及工作經(jīng)歷(一)學(xué)歷年月中國政法大學(xué)本科畢業(yè),獲法學(xué)學(xué)士學(xué)位。年月上海社科院研究生畢業(yè),獲法學(xué)碩士學(xué)位。年月華東師范大學(xué)研究生畢業(yè)……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:陶鑫良
陶鑫良教授簡況:陶鑫良,男,上海浦東人,大學(xué)畢業(yè)于上海機(jī)械學(xué)院(現(xiàn)上海大學(xué)前身之一)鋼鐵冶金專業(yè),研究生畢業(yè)于復(fù)旦大學(xué)管理學(xué)院,從事知識產(chǎn)權(quán)教學(xué)、研究和法律服務(wù)近三十年?,F(xiàn)……
日期:10-09 閱讀量:20 -
上海大學(xué)法學(xué)院導(dǎo)師:沈四寶
研究方向:商法、國際經(jīng)濟(jì)法個人簡介:沈四寶,出生于年月,上海市人,教授、博士生導(dǎo)師,現(xiàn)任上海大學(xué)法學(xué)院院長,第二屆教育部社科委員、國務(wù)院學(xué)位委員會法學(xué)評議組成員,中國法學(xué)會……
日期:10-09 閱讀量:20