複製鏈接
請複製以下鏈接發送給好友

張新鵬

(教授、國家傑青)

鎖定
張新鵬,男,1975年9月生於黑龍江密山,籍貫山東掖縣,現任復旦大學教授,上海大學教授,上海大學科研管理部常務副部長。 [2] 
教授、博導,國家傑出青年科學基金獲得者,併入選上海市優秀學術帶頭人、上海市曙光人才計劃、上海市 “東方學者” 跟蹤計劃、上海市浦江人才計劃、上海市 “青年科技啓明星” 跟蹤計劃。曾赴美國紐約州立大學賓漢頓分校訪問一年,受德國洪堡基金會資助作為資深研究員赴德國康斯坦茨大學訪問 14 個月。主持國家自然科學基金重點項目、國家 863 計劃等科研項目 40 餘項。發表論文 200 餘篇,被引 10000 餘次,2014 年—2018 年連續五年入選中國高被引學者(Most Cited Chinese Researchers)榜單。申請發明專利 20 餘項,授權 11 項。獲上海市自然科學獎二等獎(第一完成人)、中國電子學會自然科學獎二等獎(第二完成人)、國家級教學成果獎(參與)。曾擔任 IEEE Trans. on Information Forensics and Security(IEEE T-IFS)等國際學術期刊的 Associate Editor、ACM IH&MMSec 等國際學術會議的 TPC Chair。
中文名
張新鵬
國    籍
中國
民    族
漢族
籍    貫
山東掖縣
出生日期
1975年9月
畢業院校
上海大學
職    業
教師
主要成就
發表論文 200 餘篇,被引 10000 餘次
職    稱
教授

張新鵬科研項目

2020~2023,社交網絡虛擬用户塑造及其信息隱藏研究,國家自然科學基金通用技術基礎研究聯合基金重點項目,主持
2017~2020,新型信息隱藏的基礎理論與關鍵技術研究,國家自然科學基金通用技術基礎研究聯合基金重點項目,主持
2016~2020,多媒體信息隱藏,國家傑出青年科學基金,主持
2016~2019,雲數據安全處理,上海市優秀學術帶頭人計劃,主持 [1] 

張新鵬研究方向

從事多媒體安全與人工智能安全研究。提出方向調整、雙/多層結構等不同形式的隱寫編碼方法,持續推動率失真性能進步,並接近理論極限。提出參考數據共享機制克服篡改/丟失併發問題、提出圖像內容投影表示機制克服水印數據浪費問題,可實現大面積內容恢復與質量自適應的內容恢復;進而提出基於可逆信息隱藏的自嵌入水印方案,可實現篡改區域原始內容的完美恢復。開拓了密文域信息隱藏這一新研究方向,突破密文數據不含冗餘而難以處理的傳統觀念,提出不可分離與可分離的兩種密文圖像可逆信息隱藏方案、“密文域變換—量化”的新機制,可實現密文圖像有損壓縮與可伸縮編碼。2004年至今,全力推動多媒體信息安全、網絡空間安全和人工智能安全的研究與應用,以及相對應的本科生、研究生教育。 [3] 

張新鵬發表論文

  1. Li, X. Zhang, Z. Qian, G. Feng, and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Trans. on Dependable and Secure Computing, (to appear)
  2. Feng, X. Zhang, Y. Ren, Z. Qian, and F. Li, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
  3. Zhu, S. Li, X. Zhang, L. Liang, A. Kot, and F. Li, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
  4. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li, How to Extract Image Features Based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing, IEEE Trans. on Cloud Computing, (to appear)
  5. Ren, M. Dong, Z. Qian, X. Zhang, and G. Feng, Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server, IEEE Trans. on Cloud Computing, (to appear)
  6. Wang, X. Zhang, and Z. Qian, Practical Cover Selection for Steganography, IEEE Signal Processing Letters, (to appear)
  7. Shi, Z. Wang, Z. Qian, N. Huang, and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, (to appear)
  8. Ren, X. Zhang, D. Gu, and G. Feng, Efficient Outsourced Extraction of Histogram Features over Encrypted Images in Cloud, SCIENCE CHINA Information Sciences, (to appear)
  9. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang, Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation, Signal Processing, 167, 2020.
  10. Li, and X. Zhang, Towards Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Trans. on Image Processing, 28(3), pp. 1482-1497, 2019.
  11. Tao, S. Li, X. Zhang, and Z. Wang, Towards Robust Image Steganography, IEEE Trans. on Circuits and Systems for Video Technology, 29(2), pp. 594-600, 2019.
  12. Qian, H. Xu, X. Luo, and X. Zhang, New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on Circuits and Systems for Video Technology, 29(2), pp. 351-362, 2019.
  13. Qin, Q. Zhou, F. Cao, J. Dong, and X. Zhang, Flexible Lossy Compression for Selective Encrypted Image with Image Inpainting, IEEE Trans. on Circuits and Systems for Video Technology, 29(11), pp. 3341-3355, 2019.
  14. Ni, G. Feng, L. Shen, and X. Zhang, Selective Ensemble Classification of Image Steganalysis via Deep Q Network, IEEE Signal Processing Letters, 26(7), pp. 1065-1069, 2019.
  15. Ying, Z. Qian, X. Zhang, and D. Ye, Reversible Data Hiding with Image Enhancement using Histogram Shifting, IEEE Access, 7, pp. 46506-46521, 2019.
  16. Wang, and X. Zhang, Secure Cover Selection for Steganography, IEEE Access, 7, pp. 57857-57867, 2019.
  17. Wang, S. Li, and X. Zhang, Towards Improved Steganalysis: When Cover Selection Is Used in Steganography, IEEE Access, 7, pp. 168914-168921, 2019.
  18. Qin, X. Qian, W. Hong, and X. Zhang, An Efficient Coding Scheme for Reversible Data Hiding in Encrypted Image with Redundancy Transfer, Information Sciences, 487, pp. 176-192, 2019.
  19. Jia, Z. Yin, X. Zhang, and Y. Luo, Reversible Data Hiding Based on Reducing Invalid Shifting of Pixels in Histogram Shifting, Signal Processing, 163, pp. 238-246, 2019.
  20. Liang, X. Zhang, and H. Cheng, Huffman-Code Based Retrieval for Encrypted JPEG Images, Journal of Visual Communication and Image Representation, 61, pp. 149-156, 2019.
  21. Du, W. Zhang, H. Fu, W. Ren, and X. Zhang, An Efficient Privacy Protection Scheme for Data Security in Video Surveillance, Journal of Visual Communication and Image Representation, 59, pp. 347-362, 2019.
  22. Zhong, Z. Qian, Z. Wang, and X. Zhang, Steganography in Stylized Images,Journal of Electronic Imaging, 28(3), 033005, 2019.
  23. Zeng, G. Feng, and X. Zhang, Detection of Double JPEG Compression Using Modified Dense Net Model, Multimedia Tools and Applications, 78(7), pp. 8183-8196, 2019.
  24. Liu, Z.Wang, Z.Qian, X.Zhang, and G.Feng, Steganography in Beautified Images, Mathematical Biosciences and Engineering, 16(4), pp. 2322-2333,2019.
  25. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux, and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, 59(3), pp. 943-953, 2019.
  26. Qian,Z.Wang,X.Zhang,and G.Feng,Breaking Steganography: Slight Modification with Distortion Minimization, InternationalJournalofDigitalCrimeandForensics,11(1), pp. 114-125, 2019.
  27. Wang, Z. Yin, and X. Zhang, Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation, InternationalJournalofDigitalCrime and Forensics, 11(1), pp. 90-99, 2019.
  28. Wang, J. Ni, X. Zhang, and Q. Huang, Efficient Compression of Encrypted Binary Images Using the Markov Random Field, IEEE Trans. on Information Forensics & Security, 13(5), pp. 1271-1285, 2018.
  29. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on Dependable and Secure Computing, 15(6), pp. 1055-1067, 2018.
  30. Wang, X. Zhang, and Z. Yin, Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization, IEEE Signal Processing Letters, 25(10), pp. 1530-1534, 2018.
  31. Li, K. Wu, X. Zhang, J. Lei, and M. Wen, Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition, IEEE Access, 6, pp. 29912-29925, 2018.
  32. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, On Improving Distortion Functions for JPEG Steganography, IEEE Access, 6, pp. 74917-74930, 2018.
  33. Qiu, H. He, Z. Qian, S. Li, and X. Zhang, Lossless Data Hiding in JPEG Bitstream Using Alternative Embedding, Journal of Visual Communication and Image Representation, 52, pp. 86-91, 2018.
  34. Qin,X. Chen,X. Luo,X. Zhang, and X. Sun,Perceptual Image Hashing via Dual-cross Pattern Encoding and Salient Structure Detection, Information Sciences, 423, pp. 284-302, 2018.
  35. Qin,W. Zhang,F. Cao,X. Zhang, and C.-C. Chang, Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection, Signal Processing, 153, pp. 109-122, 2018.
  36. Yao, C. Qin, Z. Tang, and X. Zhang, A General Framework for Shiftable Position-Based Dual-image Reversible Data Hiding, EURASIP Journal on Image and Video Processing, 41, pp. 1-10, 2018.
  37. Qian, L. Pan, N. Huang, and X. Zhang, Constructive Steganography by Tangles, KSII Transactions on Internet and Information Systems, 12(8), pp. 3911-3925, 2018.
  38. Qian,N.Huang,S.Li,andX.Zhang,ConstructiveSteganographyUsingTextureSynthesis,IETETechnicalReview, 35(Sup. 1), pp. 14-22, 2018.
  39. Li, X. Chen, Z. Wang, Z.Qian, andX.Zhang, Data Hiding in Iris Image for Privacy Protection, IETE Technical Review, 35(Sup. 1), pp. 34-41, 2018.
  40. Wang, Z. Yin, and X. Zhang, Distortion Function for JPEG Steganography Based on Image-Texture and Correlation in DCT Domain, IETE Technical Review, 35(4), pp. 351-358, 2018.
  41. Wei, Z. Yin, Z. Wang, and X. Zhang, Distortion Function Based on Residual Blocks for JPEG Steganography, Multimedia Tools and Applications, 77(14), pp. 17875-17888, 2018.
  42. Lv, S. Li, and X. Zhang, A Novel Auxiliary Data Construction Scheme for Reversible Data Hiding in JPEG Images, Multimedia Tools and Applications, 77(14), pp. 18029-18041, 2018.
  43. Yin, X. Niu, X. Zhang, J. Tang, and B. Luo, Reversible data hiding in encrypted AMBTC images, Multimedia Tools and Applications, 77(14), pp. 18067-18083, 2018.
  44. Liang, X. Zhang, H. Cheng, and Q. Wei, Secure and Efficient Image Retrieval over Encrypted Cloud Data, Security and Communication Networks, vol. 2018, Article ID 7915393, 14 pages, 2018.
  45. Li, K, Wu, X. Zhang, J. Lei, and M. Wen, Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles, Symmetry, 10(5), 128, 2018.
參考資料