複製鏈接
請複製以下鏈接發送給好友

盧偉

(中山大學計算機學院教授)

鎖定
盧偉,男,博士,籍貫河南,中山大學計算機學院 教授、博士生導師,網絡空間安全研究所所長。
中文名
盧偉
國    籍
中國
民    族
漢族
畢業院校
上海交通大學
學位/學歷
博士
職    業
教師
專業方向
計算機科學與技術
主要成就
網絡空間安全+多媒體安全+大數據安全+隱蔽通信
任職院校
中山大學

盧偉人物經歷

2002年7月畢業於東北大學自動化專業,獲工學學士學位;
2005年3月畢業於上海交通大學計算機軟件與理論專業,獲工學碩士學位;
2007年4月畢業於上海交通大學計算機軟件與理論專業,獲工學博士學位(Ph.D);
2005年至2006年於香港理工大學計算學系擔任助理研究員; [1] 

盧偉研究方向

信息安全與取證、信息隱藏、數字水印、隱私保護;
多媒體大數據安全理論和技術;
雲計算環境下數字媒體安全和分析理論與技術;
圖像/視頻/音頻處理,計算機視覺,機器學習,深度學習,數據挖掘;
人像、步態、語音同一性識別和分析;
聲像資料鑑定技術研究和在公檢法司中的應用;
信息安全、安防理論、技術與系統。
Multimedia security, data hiding, digital forensics
Image/Video intelligent analysis, computer vision, deep learning
Big data security, privacy protection [1] 

盧偉學術獎勵

上海市科學技術獎自然科學獎),省部級二等獎,排名第二;
The second prize of Shanghai Natural Science Award
ICICIT最佳學生論文獎(best student paper award) [1] 

盧偉學術任職

中國圖象圖形學學會數字媒體取證與安全專委會委員
中國圖象圖形學學會交通視頻專委會委員
Associate Editor:
Signal Processing (一區)
Journal of Visual Communication and Image Representation (三區)
International Journal of Digital Crime and Forensics
PC member:
2017&2018&2019 International Workshop on Digital Crime and Forensics
2018 International Conference on Security with Intelligent Computing
2017&2018&2019 International Conference on Cloud Computing and Security [1] 

盧偉開設課程

統計機器學習(研究生),信息安全數學基礎(組合數學與數論),信號與系統,通信原理,模式識別,人工智能,密碼學與網絡安全 [1] 

盧偉學術成果

盧偉科研項目

國家自然科學基金廣東聯合基金重點項目,“視頻感知及篡改取證理論與方法研究”
國家自然科學基金,“JPEG圖像篡改取證理論與方法研究”
國家自然科學基金通用聯合基金,“實用型二值圖像信息隱藏理論與方法研究”
國家自然科學基金(NSFC),“基於模式識別技術的數字圖像盲取證研究”
廣東省重點領域研發計劃,“面向政務大數據應用的隱私保護與對抗關鍵技術和系統研究”
廣東省自然科學基金,“數字圖像篡改檢測理論與方法研究”
廣東省科技計劃,“實用新穎性圖像信息隱藏檢測系統研究”
廣州市科學研究計劃重點項目,“面向大數據的數字視像取證關鍵技術與系統研究”
科技成果轉換計劃,“數字聲像資料鑑別分析系統雲平台研發”
中央高校基本科研業務費基金,“數字圖像區域複製篡改取證新理論和新方法研究”
中山大學青年教師科研啓動基金,“非負矩陣分解及其在信息安全中的應用研究” [1] 

盧偉期刊論文

[38]Wei Lu, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang, Yun-Qing Shi, “Secure Halftone Image Steganography Based on Pixel Density Transition”, IEEE Transactions on Dependable and Secure Computing, 2019. Accepted.
[37]Wei Lu, Ruipeng Li, Lingwen Zeng, Junjia Chen, Jiwu Huang, Yun-Qing Shi, “Binary Image Steganalysis Based on Histogram of Structuring Elements”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted.
[36] Yuileong Yeung, Wei Lu, Yingjie Xue, Jiwu Huang, Yun-Qing Shi, “Secure Binary Image Steganography with Distortion Measurement Based on Prediction”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted.
[35] Xianjin Liu, Wei Lu, Qin Zhang, Jiwu Huang, Yun-Qing Shi, “Downscaling Factor Estimation on Pre-JPEG Compressed Images”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted
[34] Wei Lu, Liyu He, Ruiliang Yang, Yingjie Xue, Hongmei Liu, “Secure Binary Image Steganography based on Fused Distortion Measurement”, IEEE Transactions on Circuits and Systems for Video Technology, 2018. accepted.
[33] Xianjin Liu, Wei Lu, Wanteng Liu, Shangjun Luo, Yaohua Liang, Ming Li, “Image Deblocking Detection Based on a Convolutional Neural Network”, IEEE Access, vol. 7, no. 1, 2019, pp. 26432-26439
[32] Qin Zhang, Wei Lu, Tao Huang, Shangjun Luo, Zhaopeng Xu, Yaohua Liang, “On the Robustness of JPEG Post-Compression to Resampling Factor Estimation”, Signal Processing, 2019
[31]Honglin Ren, Wei Lu, Bing Chen, “Reversible data hiding in encrypted binary images by pixel prediction”, Signal Processing, vol. 165, Dec. 2019, pp. 268–277.
[30] Wanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang, Jinhua Zeng, Shaopei Shi, Mingzhi Mao, “Secure Halftone Image Steganography with Minimizing the Distortion on Pair Swapping”, Signal Processing, 2019, Accepted.
[29] Bing Chen, Xiaotian Wu, Wei Lu, Honglin Ren, “Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism”, Signal Processing, vol. 164, 2019, pp. 48-57.
[28] Qin Zhang, Huimei Xiao, Fei Xue, Wei Lu, Hongmei Liu, Fangjun Huang, “Digital image forensics of non-uniform deblurring”, Signal Processing: Image Communication, 2019, accepted.
[27] Zhaopeng Xu, Wei Lu, Qin Zhang, Yuileong Yeung, Xin Chen, “Gait Recognition Based on Capsule Network”, Journal of Visual Communication and Image Representation, In press, Available online 14 January 2019
[26] Junhong Zhang, Wei Lu, Xiaolin Yin, Wanteng Liu, Yuileong Yeung, “Binary image steganography based on joint distortion measurement”, Journal of Visual Communication and Image Representation, vol. 58, January 2019, Pages 600-605
[25] Huimei Xiao, Wei Lu, Ruipeng Li, Nan Zhong, Yuileong Yeung, Junjia Chen, Fei Xue, Wei Sun, “Defocus blur detection based on multiscale SVD fusion in gradient domain”, Journal of Visual Communication and Image Representation, Volume 59, February 2019, Pages 52-61
[24] Zhaozhi Xie, Wei Lu, Xianjin Liu, Yingjie Xue, Yuileong Yeung, “Copy-move detection of digital audio based on multi-feature decision”, Journal of Information Security and Applications, vol. 43, pp. 37-46, 2018.
[23] Yingjie Xue, Wanteng Liu, Wei Lu, Yuileong Yeung, Xianjin Liu, Hongmei Liu, “Efficient Halftone Image Stegnography Based on Dispersion Degree Optimization”, Journal of Real-Time Image Processing, 2018. Accepted
[22] Xianjin Liu, Wei Lu, Tao Huang, Hongmei Liu, Yingjie Xue, Yuileong Yeung, “Scaling factor estimation on JPEG compressed images by cyclostationarity analysis”, Multimedia Tools and Applications, 2018. Accepted
[21]Junjia Chen, Wei Lu, “Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix”, Computers, Materials & Continua, 2018
[20]Cong Lin, Wei Lu, “Copy-move forgery detection using combined features and transitive matching”, ICCCS2018.
[19]Xinchao Huang, Zihan Liu, Wei Lu, “Fast and Effective Copy-Move Detection of Digital Audio based on Auto Segment” International Journal of Digital Crime and Forensics, vol. 10, no. 5, 2018.
[18]Ruxin Wang, Wei Lu, Jixian Li, “Digital image splicing detection based on Markov feature in QDCT and QWT domain” International Journal of Digital Crime and Forensics, vol. 10, no. 4, 2018
[17]Jialiang Chen, Wei Lu, Yanmei Fang, “Binary Image Steganalysis based on Local Texture Pattern”, Journal of Visual Communication and Image Representation, 2018
[16]Fengjun Zhang, Wei Lu, Hongmei Liu, Fei Xue, “Natural image deblurring based on L0-regularization and kernel shape optimization”, Multimedia Tools and Applications, 2018, Accepted.
[15]Xin Chen, Jian Weng, Wei Lu, "Multi-gait Recognition based on Attribute Discovery", IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, Accepted.
[14]Xin Chen, Jian Weng, Wei Lu, "Deep Manifold Learning Combined with Convolutional Neural Networks for Action Recognition", IEEE Transactions on Neural Networks and Learning Systems, accepted.
[13]Cong Lin, Wei Lu, Wei Sun, Jinhua Zeng, Tianhua Xu, Jian-Huang Lai, "Region duplication detection based on image segmentation and keypoint contexts", Multimedia Tools and Applications, 2017, Accepted.
[12]Fei Xue, Ziyi Ye, Wei Lu, Hongmei Liu, Bin Li, "MSE period based estimation of first quantization step in double compressed JPEG images", Signal Processing: Image Communication, Vol. 57C, September 2017, pp. 76-83
[11]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei, “Steganalysis of content-adaptive binary image data hiding”, Journal of Visual Communication and Image Representation, Volume 46, July 2017, Pages 119-127.
[10]Fan Yang, Jingwei Li, Wei Lu, Jian Weng, "Copy-move forgery detection based on hybrid features", Engineering Applications of Artificial Intelligence, Volume 59, March 2017, pp. 73-83.
[9]Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng, “Steganalysis with CNN Using Multi-channels Filtered Residuals”, International Conference on Cloud Computing and Security, 2017, Nanjing China, pp 110-120.
[8]Zihan Liu, Wei Lu, “Fast Copy-Move Detection of Digital Audio”, IEEE International Conference on Data Science in Cyberspace (DSC), pp. 26-29 June 2017, Shenzhen, China.
[7]Bingwen Feng, Jian Weng, Wei Lu, “Improved Algorithms for Robust Histogram Shape-Based Image Watermarking”, International Workshop on Digital-Forensics and Watermarking (IWDW 2017), Lecture Notes in Computer Science, vol 10431, pp 275-289, 2017.
[6]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei, “Multiple Watermarking Using Multilevel Quantization Index Modulation”, International Workshop on Digital-Forensics and Watermarking (IWDW 2016), Lecture Notes in Computer Science, vol 10082, pp 312-326, 2017.
[5]Jie Li, Wei Lu, "Blind image motion deblurring with L0-regularized priors", Journal of Visual Communication and Image Representation, Volume 40, Part A, October 2016, pp. 14-23.
[4]Qingbo Zhang, Wei Lu, Jian Weng, "Joint image splicing detection in DCT and Contourlet transform domain", Journal of Visual Communication and Image Representation, Volume 40, Part B, October 2016, Pages 449-458.
[3]馮丙文,翁健,盧偉,基於隱私保護的數字圖像取證外包技術框架研究,網絡與信息安全學報,2016年第8期,第23-31頁
[2]Jinhua Zeng, Wei Lu, Rui Yang, Xiulian Qiu, Practical tools for digital image forensic authentication, Advanced Multimedia and Ubiquitous Engineering, LNCS, 2016.4
[1]Jingwei Li, Fan Yang, Wei Lu, Wei Sun, "Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching", Multimedia Tools and Applications, vol. 76, no. 20, 2017, pp. 20483-20497. [1] 
參考資料