中山大學(xué)信息科學(xué)與技術(shù)學(xué)院導(dǎo)師:黃方軍

發(fā)布時(shí)間:2021-10-05 編輯:考研派小莉 推薦訪問:
中山大學(xué)信息科學(xué)與技術(shù)學(xué)院導(dǎo)師:黃方軍

中山大學(xué)信息科學(xué)與技術(shù)學(xué)院導(dǎo)師:黃方軍內(nèi)容如下,更多考研資訊請關(guān)注我們網(wǎng)站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費(fèi)考研資源可以領(lǐng)取,有各種考研問題,也可直接加我們網(wǎng)站上的研究生學(xué)姐微信,全程免費(fèi)答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)

中山大學(xué)信息科學(xué)與技術(shù)學(xué)院導(dǎo)師:黃方軍 正文


  姓名:黃方軍  性別:男  職稱:副教授  
  學(xué)院:信息科學(xué)與技術(shù)學(xué)院  最后學(xué)歷:博士
  主要研究方向:多媒體信息安全、多媒體信息處理

  
  現(xiàn)在中山大學(xué)信息科學(xué)與技術(shù)學(xué)院從事教學(xué)和科研工作。于南京理工大學(xué)獲得學(xué)士學(xué)位,華中科技大學(xué)獲得碩士和博士學(xué)位。2009年獲國家留學(xué)基金資助在美國新澤西理工學(xué)院電子與計(jì)算機(jī)工程系從事博士后研究。


  研究領(lǐng)域?yàn)槎嗝襟w信息安全。近年來,已在Springer出版社出版與圖像隱寫安全相關(guān)的圖書章節(jié)一部,在本領(lǐng)域國際頂級期刊IEEE Trans.Information Forensics and Security以及其它權(quán)威期刊IET Information Security、Science in China Series F: Information Sciences等發(fā)表學(xué)術(shù)論文多篇。主持國家自然科學(xué)基金面上項(xiàng)目、教育部博士點(diǎn)基金及多項(xiàng)應(yīng)用課題的研究。

 

教學(xué)工作:

1)高級語言程序設(shè)計(jì)(C++)
2)數(shù)據(jù)結(jié)構(gòu)(C++版)
3)微機(jī)原理
4)Matlab語言
5)過程控制

近年來主持科研項(xiàng)目:

1)國家自然科學(xué)基金面上項(xiàng)目(61173147),2012.1-2015.12
2)高?;究蒲袠I(yè)務(wù)費(fèi)中山大學(xué)青年教師培育項(xiàng)目(12lgpy31),2012.1-2014.12
3) 信息安全國家重點(diǎn)實(shí)驗(yàn)室開放基金(04-06-4),2011.1-2012.12
4) 教育部博士點(diǎn)新教師基金(20070558054),2008.1-2010.12
5)中山大學(xué)青年教師科研啟動(dòng)基金,2007.1-2008.12
另主持橫向課題多項(xiàng),已結(jié)題

近期主要論文如下:

Book chapter:

Fangjun Huang, Bin Li, Y. Q. Shi, Jiwu Huang, Guorong Xuan, “Image Steganalysis”, Intelligent Multimedia Analysis for Security Applications, (Ed. Husrev Taha Sencar), Chapter 3, Mar. 2010, Springer Publisher.

Journal papers:

[1]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "New Channel Selection Rule for JPEG Steganography", IEEE Trans. Information Forensics and Security, 2012, 7(4). 1181-1191. (SCI)

[2]Fangjun Huang, Jiwu Huang, Yun Q. Shi, "Detecting double JPEG compression with the same quantization matrix", IEEE Trans. Information Forensics and Security, 2010, 5(4): 478-486. (SCI)

[3]Fangjun Huang,Jiwu Huang, Yun Q. Shi, "An experimental study on the security performance of YASS", IEEE Trans. Information Forensics and Security, 2010, 5(3): 374-380. (SCI)

[4]Weiqi Luo, Fangjun Huang,Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Information Forensics and Security, 2010, 5(2): 201-214. (SCI)

[5]Fangjun Huang, Weiqi Luo, Jiwu Huang, “Steganalysis of JPEG steganography with complementary embedding strategy”, IET Information Security, 2011, 5(1): 10-18. (SCI)

[6]Fangjun Huang, Jiwu Huang, Yun Q. Shi“Frequency Selective JPEG Steganography”, Science in China Series F: Information Sciences, to appear. (SCI)

[7] Fangjun Huang, Jiwu Huang, “Calibration based universal JPEG steganalysis”, Science in China Series F: Information Sciences, 2009, 52(2): 260-268. (SCI)

[8]WeiqiLuo, Fangjun Huang, JiwuHuang, “A more secure steganography based on adaptive pixel-value differencing scheme”, Multimed Tools Applications, Published online: Jan. 9, 2010. (SCI)

[9]Fangjun Huang and Z.-H Guan, “Cryptosystem using chaotic keys”, Chaos, Solitons and Fractals, 2005, 23(3): 851-855. (SCI)

[10]Fangjun Huang and Z.-H Guan, “A modified method of a class of recently presented cryptosystems”, Chaos, Solitons and Fractals, 2005, 23(5): 1893-1899. (SCI)

[11]Fangjun Huang and Z.-H Guan, “A hybrid SVD-DCT watermarking method based on LPSNR”, Pattern Recognition Letters, 2004, 25(15): 1769-1775. (SCI)

[12]Z.-H Guan and Fangjun Huang, “A General Chaos Based Key Stream Generator”, Circuits, Systems and Signal Processing, 2005, 24(5): 549-555. (SCI)

[13]Z.-H Guan, Fangjun Huang and Wenjie Guan, “Chaos-based image encryption algorithm”, Physics Letters A, 2005, 346: 153-157. (SCI)

 


Conference Papers
[1]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “New JPEG steganographic scheme with high security performance”, Proc.9th International Workshop on Digital Watermarking, October 1–3, 2010, Korea University, Seoul, Republic of Korea.

[2]Fangjun Huang, Yun Q. Shi, Jiwu Huang, “A study on security performance of YASS”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)

[3]Fangjun Huang, Bin Li, Jiwu Huang, “Universal JPEG Steganalysis based on microscopic and macroscopic calibration”, Proc. IEEE Int. Conf. on Image Processing, October 12–15, 2008, San Diego, California, U.S.A. (EI)

[4] Fangjun Huang, Bin Li, Jiwu Huang, “Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)

[5] Bin Li, Fangjun Huang, Jiwu Huang, “Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry”, Proc. IEEE Int. Conf. on Image Processing, September 16-19, 2007, San Antonio, Texas, U.S.A. (EI)

[6]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang and Yun Q. Shi, “Effect of coding pattern on compress domain based universal JPEG steganalysis”,6th International workshop on digital watermarking, December 3-5, 2007, Guangzhou, China. (EI)

聯(lián)系方式:廣州大學(xué)城中山大學(xué)實(shí)驗(yàn)中心B502。

郵箱:huangfj@mail.sysu.edu.cn

中山大學(xué)

添加中山大學(xué)學(xué)姐微信,或微信搜索公眾號“考研派小站”,關(guān)注[考研派小站]微信公眾號,在考研派小站微信號輸入[中山大學(xué)考研分?jǐn)?shù)線、中山大學(xué)報(bào)錄比、中山大學(xué)考研群、中山大學(xué)學(xué)姐微信、中山大學(xué)考研真題、中山大學(xué)專業(yè)目錄、中山大學(xué)排名、中山大學(xué)保研、中山大學(xué)公眾號、中山大學(xué)研究生招生)]即可在手機(jī)上查看相對應(yīng)中山大學(xué)考研信息或資源

中山大學(xué)考研公眾號 考研派小站公眾號

本文來源:http://www.qiang-kai.com/zhongshandaxue/daoshi_474785.html

推薦閱讀