王莘科研成果_王莘专利信息_哈尔滨工业大学计算学部王莘科研信息|王莘校企合作信息|王莘联系方式
全国客户服务热线:4006-054-001 疑难解答:159-9855-7370(7X24受理投诉、建议、合作、售前咨询),173-0411-9111(售前),155-4267-2990(售前),座机/传真:0411-83767788(售后),微信咨询:543646
企业服务导航

王莘科研成果

发布日期:2024-05-10 专利申请、商标注册、软件著作权、资质办理快速响应 微信:543646


王莘
姓名 王莘 性别 王莘
学校 哈尔滨工业大学 部门 计算学部
学位 王莘 学历 王莘
职称 教授 联系方式 shen.wang@hit.edu.cn
邮箱 shen.wang@hit.edu.cn    
软件产品登记测试全国受理 软件著作权666元代写全部资料全国受理 实用新型专利1875代写全部资料全国受理
王莘

基本信息 科研成果 教育教学 新建主栏目 个人简介 名称 王莘,博士,教授,博士生导师。2012年毕业于哈尔滨工业大学计算机科学与技术学院信息安全专业,师承牛夏牧教授。2013年就职于信息对抗技术研究所。自任职以来先后主持国家自然科学基金及国防类科研项目50余项,发表SCI论文50余篇。获省部级科技进步三等奖1项。同年获得哈尔滨工业大学保密先进个人称号。2022年在计算学部一校三区教学基本功大赛中获得一等奖。2024年入选电子学会青年编委。 教育经历 名称 2001-03 至 2003-09 德国德累斯顿工业大学 电气工程与信息技术 学士 2003-10 至 2007-01 德国德累斯顿工业大学 电气工程与信息技术 硕士 2007-09 至 2012-07 哈尔滨工业大学 信息安全 博士 工作经历 名称 2013-03 至 2016-11 哈尔滨工业大学 计算机科学与技术学院 讲师 2015-03 至 2019-03 哈尔滨工业大学 计算机科学与技术专业 硕士生导师 2016-12 至 2022-12 哈尔滨工业大学 计算机科学与技术学院 副教授 2019-03 至今 哈尔滨工业大学 网络空间安全专业 博士生导师 2020-05 至今 哈尔滨工业大学 网络空间安全学院 副院长 2022-12 至今 哈尔滨工业大学 网络空间安全学院 教授 科研项目 名称 主持纵向项目16项,其中国家级纵向课题11项。主持横向课题26项。 发表论文 名称 [1] Shen Wang , Zhaoyang Zhang, Guopu Zhu*, Xinpeng Zhang, Yicong Zhou, Jiwu Huang.Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Transactions on Information Forensics and Security. vol. 18, pp. 351-364, 2023. [2] Yihan Yan, Xiaojun Tong, Shen Wang*. Clustered federated learning in heterogeneous environment. IEEE Transactions on Neural Networks and Learning Systems. 10.1109/TNNLS.2023.3264740,2023. [3] Xin Li, Guopu Zhu, Shen Wang, Yicong Zhou, Xinpeng Zhang. Clustered federated learning in heterogeneous environment. IEEE Transactions on Circuits and Systems for Video Technology, DOI 10.1109/TCSVT.2024.3367808. [4]Yuxin Gong, Shen Wang*, Xunzhi Jiang, Liyao Yin, Fanghui Sun. Adversarial example detection using semantic graph matching. Applied Soft Computing, 141 (2023) 110317. [5] Yuxin Gong; Shen Wang*; Tingyue Yu; Xunzhi Jiang; Fanghui Sun; Improving Adversarial Robustness Using Knowledge Distillation Guided by Attention Information Bottleneck. Information Sciences. 665 (2024) 120401. [6] Liyao Yin, Shen Wang*, Zhenbang Wang, Changdong Wang and Dechen Zhan. Attribution Guided Purification Against Adversarial Patch. Displays. https://doi.org/10.1016/j.displa. 2024.102720. [7]Shen Wang*, Yuxin Gong. Adversarial Example Detection Based on Saliency Map Features. Applied Intelligence, 52, 6262–6275, 2022. [8] Junfeng Zhao, Shen Wang*. A stable GAN for image steganography with multi-order feature fusion. Neural Computing and Applications.2022(34):16073-16088, 2022. [9] Fanghui Sun, Shen Wang*, Chunrui Zhang. Hongli Zhang, Unsupervised field segmentation of unknown protocol messages. Computer Communications, 2019, 146:121-130. [10] Fanghui Sun, Shen Wang*, Chunrui Zhang. Hongli Zhang, Clustering of unknown protocol messages based on format comparison. Computer Networks, 2020, 179:107296. [11] Fanghui Sun, Shen Wang*, Hongli Zhang. A Progressive Learning Method on Unknown Protocol Behaviors, Journal of Network and Computer Applications,Volume 197, January 2022:103249. [12] Shen Wang, Fanghui Sun, Jeng-Shyang Pan*, Hongli Zhang, A novel method for CCSDS-TC recognition, Journal of Internet Technology, 2020, 03:313-322. [13]Tingyue Yu, Shen Wang*, Xiangzhan Yu. Global Wasserstein Margin Maximization for Boosting Generalization in Adversarial Training. Applied Intelligence, doi.org/10.1007/s10489-022-03480-w, 2022. [14] Tingyue Yu, Shen Wang*, Chunrui Zhang, Zhenbang Wang, Yetian Li, Xiangzhan Yu. Targeted adversarial examples generating method based on cVAE in black box settings. Chinese Journal of Electronics,30(5), 2021: 866-875. [15] Chunrui Zhang*, Shen Wang, Dechen Zhan, Yonghui Yang.Automatic determination of types number of mixed binary protocols.IET Commun., 2019, Vol 13 : 1769-1775. [16] Chunrui Zhang*, Shen Wang, Dechen Zhan, Mingyong Yin,Fang Lou. Inferring Users’Social Roles with a Multi-Level Graph Neural Network Model[J]. Entropy, 2021, 23(11), 1453. [17] Chunrui Zhang, Shen Wang, Dechen Zhan, Tingyue Yu, Tiangang Wang, Mingyong Yin. Detecting Insider threat from behavioral logs based on ensemble and selfsupervised learning [J]. Security and Communication Networks, 2021, 4148441:1-11. [18] Chunrui Zhang, Gang Wang*, Shen Wang, Dechen Zhan, Mingyong Yin. Cross-Domain Network Attack Detection Enabled by Heterogeneous Transfer Learning. Computer Networks,Volume 227, May 2023, 109692. [19] Xunzhi Jiang, Shen Wang*, Xiangzhan Yu, Yuxin Gong. Double-Layer Positional Encoding Embedding Method for Cross-Platform Binary Function Similarity Detection. Chinese Journal of Electronics, 2022, 31(4): 604-611. [20] Shen Wang*, Chen Cui, Xiamu Niu. A Novel DIBR 3D Image Watermarking Algorithm Resist to Geometrical Attacks. Chinese Journal of Electronics, 2017, 26(6):1184-1193. [21] Shen Wang, Xianhua Song*. Quantum Video Information Hiding Based on Improved LSQb and Motion Vector. Journal of Internet Technology, 2017, 18(6),1361-1368. [22] Shen Wang* and Xiamu Niu. Hiding Traces of Double Compression in JPEG Images Based on Tabu Search. Neural Computing and Applications, May 2012, 22(1): 283~291. [23] Shen Wang* and Xiamu Niu. Cover the Trace of Image Fogery by PSO. Journal of Internet Technology. 2013,14(1):161-168. [24] Shen Wang and Xiamu Niu. A Countermeasure against Double Compression Based Image Forensic. IEICE Transaction on Information & System. 2012, D(10), 2577-2580. [25] Shen Wang*, Chen Cui, Xiamu Niu. Watermarking for DIBR 3D Images Based on SIFT Feature Points. Measurement, 2014, 48(1), 54-62. [26] Shen Wang*, Xuehu Yan, Jianzhi Sang, Xiamu Niu. Meaningful visual secret sharing based on error diffusion and random grids.Multimedia Tools and Applications, 75(6):3353-3373, 2015. [27] Shen Wang*, Jianzhi Sang, Qi Han, Xiamu Niu. Least Significant Qubit (LSQb) information hiding Algorithm for Quantum Image. Measurement, 2015,73, p 352-359. [28] Shen Wang*, Xianhua Song, Xiamu Niu. Quantum Cosine Transform Based Watermarking Scheme for Quantum Images. Chinese Journal of Electronics, 2015, 24(2):321-325. [29] Shen Wang*, Xunzhi Jiang, Xiangzhan Yu, Xiaohui Su, Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding, Security and Communication Networks, vol. 2021, Article ID 3095203, 8 pages, 2021. [30] Xianhua Song, Shen Wang*, Shuai Liu, A. A. A. El-Latif, Xiamu Niu. A Dynamic Watermarking Scheme for Quantum Images Using Quantum Wavelet Transform. Quantum Information Processing, 2013, 12(12): 3689-3704. [31] Xianhua Song, Shen Wang*, A. A. A. El-Latif, Xiamu Niu. Quantum Image Encryption Based on Restricted Geometric and Color Transformations. Quantum Information Processing, 2014, 13(8): 1765-1787. [32] Xianhua Song, Shen Wang*, A. A. A. El-Latif, Xiamu Niu. Dynamic Watermarking Scheme for Quantum Images Based on Hadamard Transform. Multimedia Systems, 2014, 20(4): 379-388. [33] Xianhua Song, Shen Wang*, Siuming Yiu, Lin Jiang, Xiamu Niu. Detection of Image Region Duplication Using Spin Image. IEICE Transaction on Information and Systems, 2013, E96(7): 1565-1568. [34] Jianzhi Sang, Shen Wang*, Xiamu Niu. Quantum Realization of Nearest Neighbor Interpolation for FRQI and NEQR[J]. Quantum Information Processing, 2016, 15(1), 37-64. [35] Jianzhi Sang, Shen Wang*, Xiamu Niu. Quantum Realization of Arnold Scrambling for IFRQI. International Journal of Theoretical Physics, 2016, 55(8), 3706-3721. [36] Jianzhi Sang, Shen Wang, Qiong Li. Least Significant Qubit Algorithm for Quantum Images. Quantum Information Processing, 2016, vol. 15(11), 4441-4460. [37] Xuehu Yan, Shen Wang*, and Xiamu Niu. Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Processing, Volume 105, December 2014: 389-398. [38] Xuehu Yan*, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Processing,109, 2015, 317-333. [39] Xuehu Yan, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Random gridbased visual secret sharing with multiple decryptions. Journal of Visual Communication and Image Representation, Volume 26, January 2015: 94–104. [40] Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimedia Tools and Applications, 24 December 2013: 1-22. [41] Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Random gridsbased visual secret sharing with improved visual quality via error diffusion. Multimedia Tools and Applications, 13 June 2014: 1-18. [42] Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Processing, 12 Apr 2013:1-12. [43] Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Threshold Visual Secret Sharing with Comprehensive Properties Based on Random Grids. Signal, Image and Video Processing. 06 Apr 2014: 1-10. [44] Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. A novel perceptual secret sharing scheme. Transactions on Data Hiding and Multimedia Security IX Lecture Notes in Computer Science, 2014, Volume 8363: 68-90. [45] Xuehu Yan, Shen Wang*, and Xiamu Niu. Threshold visual secret sharing based on Boolean operations and random grids. International Conference on Neural Information Processing 2014 Conference(ICONIP-2014). 3 - 6 November 2014, Kuching, Sarawak, Malaysia, Part III, Lecture Notes in Computer Science(LNCS) 8836:620–627. [46] Xuehu Yan, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Essential visual cryptographic scheme with different importance of shares. International Conference on Neural Information Processing 2014 Conference(ICONIP-2014). 3-6 November 2014, Kuching, Sarawak, Malaysia, Part III, Lecture Notes in Computer Science(LNCS) 8836:636–643. [47] Xuehu Yan*, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Halftone visual cryptography with minimum auxiliary black pixels and improved image quality. Digital Signal Processing, 38, 2015, 53-65. [48] Chen Cui,Shen Wang*,Xiamu Niu. A novel watermarking for DIBR 3D images with geometric rectification based on feature points. Multimedia Tools and Applications volume 76, pages649–677 (2017). [49] Xin Liu*, Shen Wang, Jianzhi Sang, Weizhe Zhang. A novel mapping-based lossless recovery algorithm for VSS. Journal of Real-Time Image Processing, 2016, 14(1):51-60. [50] Xin Liu*, Shen Wang, Xuehu Yan, Weizhe Zhang. Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimedia Tools and Applications, 2018, 77(16):20673-20696. [51] Xin Liu*, Shen Wang*, Jianzhi Sang, Weizhe Zhang. A Novel Lossless Recovery Algorithm for Basic Matrix-based VSS. Multimedia Tools and Applications, 2018, 77(13):16461-16476. 讲授课程 名称 (1)专业课《信息隐藏技术基础》 (大三本科生课程,春季学期,32学时) (2)基础课《大学计算机---计算思维导论》(大一本科生课程,秋季学期,32学时) (3)《多媒体安全技》 (研究生课程,春季学期,24学时)