中山大学信息科学与技术学院导师介绍:黄方军的内容如下,更多考研资讯请关注我们考研派网站的更新!敬请收藏本站。或下载我们的考研派APP和考研派微信公众号(里面有非常多的免费考研资源可以领取哦)[中山大学公共卫生学院导师介绍:唐小江] [中山大学公共卫生学院导师介绍:肖勇梅] [中山大学公共卫生学院导师介绍:王庆] [中山大学公共卫生学院导师介绍:杨杏芬] [中山大学公共卫生学院导师介绍:杨燕] [中山大学公共卫生学院导师介绍:冯翔]
为你答疑,送资源
95%的同学还阅读了: [2022中山大学研究生招生目录] [中山大学研究生分数线[2013-2021]] [中山大学王牌专业排名] [中山大学考研难吗] [中山大学研究生院] [中山大学考研群] [中山大学研究生学费] 中山大学保研夏令营 中山大学考研调剂2022最新信息 [中山大学研究生辅导] [考研国家线[2006-2021]] [2022年考研时间:报名日期和考试时间]
中山大学信息科学与技术学院导师介绍:黄方军正文
姓名:黄方军 性别:男 职称:副教授
学院:信息科学与技术学院 最后学历:博士
主要研究方向:多媒体信息安全、多媒体信息处理
现在中山大学信息科学与技术学院从事教学和科研工作。于南京理工大学获得学士学位,华中科技大学获得硕士和博士学位。2009年获国家留学基金资助在美国新泽西理工学院电子与计算机工程系从事博士后研究。
研究领域为多媒体信息安全。近年来,已在Springer出版社出版与图像隐写安全相关的图书章节一部,在本领域国际顶级期刊IEEE Trans.Information Forensics and Security以及其它权威期刊IET Information Security、Science in China Series F: Information Sciences等发表学术论文多篇。主持国家自然科学基金面上项目、教育部博士点基金及多项应用课题的研究。
教学工作:
1)高级语言程序设计(C++)
2)数据结构(C++版)
3)微机原理
4)Matlab语言
5)过程控制
近年来主持科研项目:
1)国家自然科学基金面上项目(61173147),2012.1-2015.12
2)高校基本科研业务费中山大学青年教师培育项目(12lgpy31),2012.1-2014.12
3) 信息安全国家重点实验室开放基金(04-06-4),2011.1-2012.12
4) 教育部博士点新教师基金(20070558054),2008.1-2010.12
5)中山大学青年教师科研启动基金,2007.1-2008.12
另主持横向课题多项,已结题
近期主要论文如下:
Book chapter:
Fangjun Huang, Bin Li, Y. Q. Shi, Jiwu Huang, Guorong Xuan, “Image Steganalysis”, Intelligent Multimedia Analysis for Security Applications, (Ed. Husrev Taha Sencar), Chapter 3, Mar. 2010, Springer Publisher.
Journal papers:
[1]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "New Channel Selection Rule for JPEG Steganography", IEEE Trans. Information Forensics and Security, 2012, 7(4). 1181-1191. (SCI)
[2]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "Detecting double JPEG compression with the same quantization matrix", IEEE Trans. Information Forensics and Security, 2010, 5(4): 478-486. (SCI)
[3]Fangjun Huang,Jiwu Huang, Yun Q. Shi, "An experimental study on the security performance of YASS", IEEE Trans. Information Forensics and Security, 2010, 5(3): 374-380. (SCI)
[4]Weiqi Luo, Fangjun Huang,Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Information Forensics and Security, 2010, 5(2): 201-214. (SCI)
[5]Fangjun Huang, Weiqi Luo, Jiwu Huang, “Steganalysis of JPEG steganography with complementary embedding strategy”, IET Information Security, 2011, 5(1): 10-18. (SCI)
[6]Fangjun Huang, Jiwu Huang, Yun Q. Shi“Frequency Selective JPEG Steganography”, Science in China Series F: Information Sciences, to appear. (SCI)
[7] Fangjun Huang, Jiwu Huang, “Calibration based universal JPEG steganalysis”, Science in China Series F: Information Sciences, 2009, 52(2): 260-268. (SCI)
[8]WeiqiLuo, Fangjun Huang, JiwuHuang, “A more secure steganography based on adaptive pixel-value differencing scheme”, Multimed Tools Applications, Published online: Jan. 9, 2010. (SCI)
[9]Fangjun Huang and Z.-H Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 2005, 23(3): 851-855. (SCI)
[10]Fangjun Huang and Z.-H Guan, “A modified method of a class of recently presented cryptosystems”, Chaos, Solitons and Fractals, 2005, 23(5): 1893-1899. (SCI)
[11]Fangjun Huang and Z.-H Guan, “A hybrid SVD-DCT watermarking method based on LPSNR”, Pattern Recognition Letters, 2004, 25(15): 1769-1775. (SCI)
[12]Z.-H Guan and Fangjun Huang, “A General Chaos Based Key Stream Generator”, Circuits, Systems and Signal Processing, 2005, 24(5): 549-555. (SCI)
[13]Z.-H Guan, Fangjun Huang and Wenjie Guan, “Chaos-based image encryption algorithm”, Physics Letters A, 2005, 346: 153-157. (SCI)
Conference Papers
[1]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “New JPEG steganographic scheme with high security performance”, Proc.9th International Workshop on Digital Watermarking, October 1–3, 2010, Korea University, Seoul, Republic of Korea.
[2]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “A study on security performance of YASS”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)
[3]Fangjun Huang, Bin Li, Jiwu Huang, “Universal JPEG Steganalysis based on microscopic and macroscopic calibration”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)
[4] Fangjun Huang, Bin Li, Jiwu Huang, “Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)
[5] Bin Li, Fangjun Huang, Jiwu Huang, “Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)
[6]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang and Yun Q. Shi, “Effect of coding pattern on compress domain based universal JPEG steganalysis”,6th International workshop on digital watermarking, December 3-5, 2007, Guangzhou, China. (EI)
联系方式:广州大学城中山大学实验中心B502。
邮箱:huangfj@mail.sysu.edu.cn
添加中山大学学姐微信,或微信搜索公众号“考研派之家”,关注【考研派之家】微信公众号,在考研派之家微信号输入【中山大学考研分数线、中山大学报录比、中山大学考研群、中山大学学姐微信、中山大学考研真题、中山大学专业目录、中山大学排名、中山大学保研、中山大学公众号、中山大学研究生招生)】即可在手机上查看相对应中山大学考研信息或资源。
本文来源:http://m.okaoyan.com/zhongshandaxue/daoshi_474785.html