中山大學信息科學與技術學院導師:黃方軍

發(fā)布時間:2021-10-05 編輯:考研派小莉 推薦訪問:
中山大學信息科學與技術學院導師:黃方軍

中山大學信息科學與技術學院導師:黃方軍內容如下,更多考研資訊請關注我們網站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費考研資源可以領取,有各種考研問題,也可直接加我們網站上的研究生學姐微信,全程免費答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)

中山大學信息科學與技術學院導師:黃方軍 正文


  姓名:黃方軍  性別:男  職稱:副教授  
  學院:信息科學與技術學院  最后學歷:博士
  主要研究方向:多媒體信息安全、多媒體信息處理

  
  現(xiàn)在中山大學信息科學與技術學院從事教學和科研工作。于南京理工大學獲得學士學位,華中科技大學獲得碩士和博士學位。2009年獲國家留學基金資助在美國新澤西理工學院電子與計算機工程系從事博士后研究。


  研究領域為多媒體信息安全。近年來,已在Springer出版社出版與圖像隱寫安全相關的圖書章節(jié)一部,在本領域國際頂級期刊IEEE Trans.Information Forensics and Security以及其它權威期刊IET Information Security、Science in China Series F: Information Sciences等發(fā)表學術論文多篇。主持國家自然科學基金面上項目、教育部博士點基金及多項應用課題的研究。

 

教學工作:

1)高級語言程序設計(C++)
2)數(shù)據(jù)結構(C++版)
3)微機原理
4)Matlab語言
5)過程控制

近年來主持科研項目:

1)國家自然科學基金面上項目(61173147),2012.1-2015.12
2)高?;究蒲袠I(yè)務費中山大學青年教師培育項目(12lgpy31),2012.1-2014.12
3) 信息安全國家重點實驗室開放基金(04-06-4),2011.1-2012.12
4) 教育部博士點新教師基金(20070558054),2008.1-2010.12
5)中山大學青年教師科研啟動基金,2007.1-2008.12
另主持橫向課題多項,已結題

近期主要論文如下:

Book chapter:

Fangjun Huang, Bin Li, Y. Q. Shi, Jiwu Huang, Guorong Xuan, “Image Steganalysis”, Intelligent Multimedia Analysis for Security Applications, (Ed. Husrev Taha Sencar), Chapter 3, Mar. 2010, Springer Publisher.

Journal papers:

[1]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "New Channel Selection Rule for JPEG Steganography", IEEE Trans. Information Forensics and Security, 2012, 7(4). 1181-1191. (SCI)

[2]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "Detecting double JPEG compression with the same quantization matrix", IEEE Trans. Information Forensics and Security, 2010, 5(4): 478-486. (SCI)

[3]Fangjun Huang,Jiwu Huang, Yun Q. Shi, "An experimental study on the security performance of YASS", IEEE Trans. Information Forensics and Security, 2010, 5(3): 374-380. (SCI)

[4]Weiqi Luo, Fangjun Huang,Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Information Forensics and Security, 2010, 5(2): 201-214. (SCI)

[5]Fangjun Huang, Weiqi Luo, Jiwu Huang, “Steganalysis of JPEG steganography with complementary embedding strategy”, IET Information Security, 2011, 5(1): 10-18. (SCI)

[6]Fangjun Huang, Jiwu Huang, Yun Q. Shi“Frequency Selective JPEG Steganography”, Science in China Series F: Information Sciences, to appear. (SCI)

[7] Fangjun Huang, Jiwu Huang, “Calibration based universal JPEG steganalysis”, Science in China Series F: Information Sciences, 2009, 52(2): 260-268. (SCI)

[8]WeiqiLuo, Fangjun Huang, JiwuHuang, “A more secure steganography based on adaptive pixel-value differencing scheme”, Multimed Tools Applications, Published online: Jan. 9, 2010. (SCI)

[9]Fangjun Huang and Z.-H Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 2005, 23(3): 851-855. (SCI)

[10]Fangjun Huang and Z.-H Guan, “A modified method of a class of recently presented cryptosystems”, Chaos, Solitons and Fractals, 2005, 23(5): 1893-1899. (SCI)

[11]Fangjun Huang and Z.-H Guan, “A hybrid SVD-DCT watermarking method based on LPSNR”, Pattern Recognition Letters, 2004, 25(15): 1769-1775. (SCI)

[12]Z.-H Guan and Fangjun Huang, “A General Chaos Based Key Stream Generator”, Circuits, Systems and Signal Processing, 2005, 24(5): 549-555. (SCI)

[13]Z.-H Guan, Fangjun Huang and Wenjie Guan, “Chaos-based image encryption algorithm”, Physics Letters A, 2005, 346: 153-157. (SCI)

 


Conference Papers
[1]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “New JPEG steganographic scheme with high security performance”, Proc.9th International Workshop on Digital Watermarking, October 1–3, 2010, Korea University, Seoul, Republic of Korea.

[2]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “A study on security performance of YASS”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)

[3]Fangjun Huang, Bin Li, Jiwu Huang, “Universal JPEG Steganalysis based on microscopic and macroscopic calibration”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)

[4] Fangjun Huang, Bin Li, Jiwu Huang, “Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)

[5] Bin Li, Fangjun Huang, Jiwu Huang, “Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)

[6]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang and Yun Q. Shi, “Effect of coding pattern on compress domain based universal JPEG steganalysis”,6th International workshop on digital watermarking, December 3-5, 2007, Guangzhou, China. (EI)

聯(lián)系方式:廣州大學城中山大學實驗中心B502。

郵箱:huangfj@mail.sysu.edu.cn

中山大學

添加中山大學學姐微信,或微信搜索公眾號“考研派小站”,關注[考研派小站]微信公眾號,在考研派小站微信號輸入[中山大學考研分數(shù)線、中山大學報錄比、中山大學考研群、中山大學學姐微信、中山大學考研真題、中山大學專業(yè)目錄、中山大學排名、中山大學保研、中山大學公眾號、中山大學研究生招生)]即可在手機上查看相對應中山大學考研信息或資源。

中山大學考研公眾號 考研派小站公眾號

本文來源:http://www.scstrans.com/zhongshandaxue/daoshi_474785.html

推薦閱讀