发布时间:2021-10-09 编辑:考研派小莉 推荐访问:
上海大学通信与信息工程学院导师:张新鹏

上海大学通信与信息工程学院导师:张新鹏的内容如下,更多考研资讯请关注我们考研派网站的更新!敬请收藏本站。或下载我们的考研派APP和考研派微信公众号(里面有非常多的免费考研资源可以领取哦)[上海大学法学院导师:袁杜娟] [上海大学法学院导师:袁真富] [上海大学法学院导师:张秀全] [上海大学法学院导师:张玉蓉] [上海大学法学院导师:赵辉] [上海大学法学院导师:赵清林]

上海大学学姐微信
为你答疑,送资源

95%的同学还阅读了: [2022上海大学研究生招生目录] [上海大学研究生分数线[2013-2021]] [上海大学王牌专业排名] [上海大学考研难吗] [上海大学研究生院] [上海大学考研群] [上海大学研究生学费] 上海大学保研夏令营 上海大学考研调剂2022最新信息 [上海大学研究生辅导] [考研国家线[2006-2021]] [2022年考研时间:报名日期和考试时间]

上海大学通信与信息工程学院导师:张新鹏正文

  

  ►个人简介
  办公室:上海大学宝山校区东区通信楼(翔英楼)815室
  通信地址:上大路99号83号信箱上海大学通信学院
  邮政编码:200444
  电话:021-66137263
  电子邮件:xzhang@shu.edu.cn

  教育经历
  2004年毕业于上海大学通信与信息工程学院,获工学博士学位
  2001年于上海大学通信与信息工程学院获工学硕士学位
  1995年毕业于吉林大学数学系,获理学学士学位

  工作经历
  2011~2012,德国Konstanz大学,Humboldt学者资深研究员
  2010~2011,美国纽约州立大学Binghamton分校,访问学者
  2008~    ,上海大学通信与信息工程学院,教授
  2006~2008,上海大学通信与信息工程学院,副教授
  2004~2006,上海大学通信与信息工程学院,讲师

  研究领域
  多媒体信息安全、信息隐藏、数字取证、加密域信号处理、图像处理

  科研项目
  2015~2017,加密图像压缩研究,上海市曙光计划,主持
  2015~2018,密文图像中的可逆信息隐藏,国家自然科学基金,主持
  2013~2015,广义率失真优化的信息隐藏,上海市浦江人才计划,主持
  2012~2015,上海高校特聘教授(东方学者)专项资助,主持
  2012~2014,高度安全的数字隐写研究,教育部博士点基金(博导类),主持
  2011~2013,广义隐写编码与多载体安全隐写研究,国家自然科学基金,主持
  2010~2012,数字图像内容的真伪鉴定研究,上海市科委国际合作项目,主持
  2010~2012,数字图像中的新型安全隐写,上海市科技启明星跟踪计划,主持
  2010~2011,新型数字隐写编码研究,教育部科研重点项目,主持
  2009~2011,数字图像真实性的被动取证研究,国家自然科学基金,主持
  2009~2011,数字隐写中的新型编码研究,上海市教委科研创新重点项目,主持
  2007~2009,数字图像反隐写关键技术,国家高技术研究发展计划(863计划),主持
  2006~2008,数字图像中的隐写分析与反隐写综合措施研究,上海市青年科技启明星计划,主持
  2006~2008,具有统计隐蔽性和抗干扰性的安全密写研究,国家自然科学基金,主持
  2004~2007,抗统计分析的数字图像密写研究,上海市科委基础研究重点项目,主持
  2004~2006,具有多重免疫性的安全数字水印协议与算法研究,上海市教委青年基金,主持

  授课情况
  信息科技概览(本科生通识课)
  信息时代的思维(本科生新生研讨课)
  信息论与编码(本科生)
  数字图像处理(本科生)
  信息网络与安全(本科生)
  通信与信息新技术进展(研究生)

  近期论文
  International Journal Papers:
  1.      Z. Qian, and X. Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source Encoding, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
  2.      G. Feng, H. Zhang, and X. Zhang, Effective Feature Selection for Image Steganalysis Using Extreme Learning Machine, Journal of Electronic Imaging, (to appear)
  3.      Y. Ren, S. Wang, and X. Zhang, Fully Secure Expressive Ciphertext-Policy Attribute-Based Encryption without Random Oracles, Information, (to appear)
  4.      F. Li, X. Zhang, J. Yu, and H. Cheng, Digital Image Steganalysis Based on Local Textural Features and Double Dimensionality Reduction, Security and Communication Networks, (to appear)
  5.      L. Shen, P. An, X. Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, (to appear)
  6.      X. Zhang, and W. Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61, 2015.
  7.      G. Feng, Y. Lan, X. Zhang, and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015.
  8.      Z. Qian, X. Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation, 26(1), pp. 9-13, 2015.
  9.      L. Shen, Z. Zhang, X. Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128, 2015.
  10.  X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing Encrypted Images with Auxiliary Information, IEEE Trans. on Multimedia, 16(5), pp. 1327-1336, 2014.
  11.  X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 25(2), pp. 322-328, 2014.
  12.  X. Zhang, C. Qin, and L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp. 441-447, 2014.
  13.  X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with Multi-layer Decomposition, Multimedia Tools and Applications, 72, pp. 489-502, 2014.
  14.  Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Trans. on Multimedia, 16(5), pp. 1486-1491, 2014.
  15.  F. Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography with New Distortion Function, Annals of Telecommunications, 69, pp. 431-440, 2014.
  16.  Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91, pp. 100-108, 2014.
  17.  B. Chen, G. Feng, X. Zhang, and F. Li, Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014.
  18.  X. Han, Z. Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Image Interpolation, International Journal of Digital Crime and Forensics, 6(2), pp. 73-84, 2014.
  19.  Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security, 16(4), 256-264, 2014.
  20.  R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management, 5(4), pp. 36-52, 2014.
  21.  X. Zhang, Reversible Data Hiding with Optimal Value Transfer, IEEE Trans. on Multimedia, 15(2), pp. 316-325, 2013.
  22.  X. Zhang, Commutative Reversible Data Hiding and Encryption, Security and Communication Networks, 6, pp. 1396-1403, 2013.
  23.  Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Trans. on Information Forensics & Security, 8(1), pp. 55-63, 2013.
  24.  L. Shen, Z. Liu, X. Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013.
  25.  F. Li, X. Zhang, B. Chen, and G. Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier, IEEE Signal Processing Letters, 20(3), pp. 233-236, 2013.
  26.  G. Sun, X. Zhang, G. Li, and J. Yin, Robust Degraded Face Recognition with Novel Face Representation and Multi-scale Fusion, Optical Engineering, 52(7), 2013.
  27.  Y. Ren, S. Wang, and X. Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper Keys, Computers and Mathematics with Applications, 65(9), pp. 1403-1412, 2013.
  28.  C. Qin, C.-C. Chang, W.-B. Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013.
  29.  X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012.
  30.  X. Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Trans. on Information Forensics & Security, 7(2), pp. 526-532, 2012.
  31.  X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), pp. 179-185, 2012.
  32.  H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012.
  33.  G. Feng, Z. Qian, and X. Zhang, Evolutionary Selection Extreme Learning Machine Optimization for Regression, Soft Computing, 16(9), pp. 1485-1491, 2012.
  34.  C. Qin, S. Wang, and X. Zhang, Simultaneous inpainting for image structure and texture using anisotropic heat transfer model, Multimedia Tools and Applications, 56(3), pp. 469-483, 2012.
  35.  Z. Qian, and X. Zhang, Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012.
  36.  G. Feng, Z. Qian, and X. Zhang, Spectrum-Estimation Based Lossless Information Recovery for Sparse Array Patterns, Telecommunication Systems, 49(2), pp. 163-169, 2012.
  37.  X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics & Security, 6(4), pp. 1223-1232, 2011.
  38.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011.
  39.  X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Trans. on Information Forensics & Security, 6(1), pp. 53-58, 2011.
  40.  X. Zhang, Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18(4), pp. 255-258, 2011.
  41.  X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011.
  42.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54(2), pp. 385-395, 2011.
  43.  Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011.
  44.  Y. Ren, S. Wang, and X. Zhang, Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of Internet Technology, 12(4), pp. 647-658, 2011.
  45.  C. Qin, F. Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011.
  46.  Z. Qian, G. Feng, X. Zhang, and S. Wang, Image Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011.
  47.  Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3), pp. 325-345, 2011.
  48.  Z. Tang, S. Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011.
  49.  C. Kim, D. Shin, D. Shin, and X. Zhang, Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, Communications in Computer and Information Science, 186(1), pp. 130-138, 2011.
  50.  X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010.
  51.  X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010.
  52.  S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010.
  53.  W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010.
  54.  H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved Modification Direction Methods, Computers and Mathematics with Applications, 60(2), pp. 319-325, 2010.
  55.  W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics & Security, 5(3), pp. 507-517, 2010.
  56.  Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self Recovery with Anti-cropping Capability, International Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010.
  57.  C. Qin, Q. Mao, and X. Zhang, Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010.
  58.  Y. Ren, D. Gu, S. Wang, and X. Zhang, New Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010.
  59.  Y. Ren, D. Gu, S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption without Random Oracles, International Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010.
  60.  X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009.
  61.  X. Zhang, S. Wang and W. Zhang, Steganography Combining Data Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009.
  62.  X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Trans. on Multimedia, 10(8), pp. 1490-1499, 2008.
  63.  X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, pp. 553-556, 2008.
  64.  Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and Technology, 2(1), pp. 18-26, 2008.
  65.  X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), pp. 1191-1192, 2007.
  66.  W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007.
  67.  X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), pp. 727-730, 2007.
  68.  W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682, 2007.
  69.  X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), pp. 482-483, 2007.
  70.  X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), pp. 125-128, 2007.
  71.  X. Zhang and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006.
  72.  X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), pp. 781-783, 2006.
  73.  X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006.
  74.  X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88-A(12), pp. 3663-3667, 2005.
  75.  X. Zhang and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), pp. 67-70, 2005.
  76.  X. Zhang and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25(8), pp. 967-973, 2004.
  77.  X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25(3), pp. 331-339, 2004.
  78.  X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002.
  79.  S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397,  2002.
  80.  S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402,  2002.

添加上海大学学姐微信,或微信搜索公众号“考研派之家”,关注【考研派之家】微信公众号,在考研派之家微信号输入【上海大学考研分数线、上海大学报录比、上海大学考研群、上海大学学姐微信、上海大学考研真题、上海大学专业目录、上海大学排名、上海大学保研、上海大学公众号、上海大学研究生招生)】即可在手机上查看相对应上海大学考研信息或资源

上海大学考研公众号 考研派之家公众号

本文来源:http://m.okaoyan.com/shanghaidaxue/daoshi_492773.html