哈尔滨工业大学

朱国普

发布日期:2024-05-10 浏览次数:

基本信息 论文和专利 科研项目 English 新建主栏目 个人简介 名称 朱国普,计算学部长聘教授、博士生导师、网络大数据安全分析工信部重点实验室副主任。曾任中科院深圳先进技术研究院研究员、博士生导师、物联网计算中心主任。研究方向主要包括多媒体取证与安全、人工智能安全、机器学习。以第一或通讯作者身份在IEEE TIP、IEEE TIFS、IEEE TMM、IEEE TCSVT、IEEE TCYB、IEEE TSMC、IEEE TCAS-I、ACM TOMM、Pattern Recognition等国际权威期刊上发表学术论文50余篇,其中IEEE/ACM Transactions论文20余篇、单篇最高Google Scholar引用达1500余次;申请发明专利40余项,获授权发明专利30余项;主持各类科研项目20余项,包括科技部、国自然项目/课题7项。担任IEEE Transactions on Cybernetics、IEEE Systems Journal、Journal of Information Security and Applications、Electronics Letters等多个国际权威期刊编委(Associate Editor);曾担任国家自然科学基金重点项目、国家重点研发计划项目会议评审专家。2013年,被认定为深圳市“孔雀计划”B类人才;2015年,入选中国科学院“青年创新促进会”会员(中科院青年人才计划);2019年,入选“广东特支计划”科技创新青年拔尖人才;2020年,被聘为厦门大学兼职教授。 教育经历 名称 博士,哈尔滨工业大学,2007.10; 硕士,哈尔滨工业大学,2004.07; 学士,吉林大学,2002.07。 工作经历 名称 2022.03—至今,哈尔滨工业大学,网络大数据安全分析工信部重点实验室,副主任; 2021.08—至今,哈尔滨工业大学,计算学部,长聘教授,博士生导师; 2018.06—2021.07,中国科学院深圳先进技术研究院,物联网计算中心主任、研究员; 2016.01—2021.07,中国科学院深圳先进技术研究院,研究员,博士生导师; 2010.05—2016.01,中国科学院深圳先进技术研究院,副研究员; 2008.08—2010.04,香港城市大学,Senior Research Associate / Research Associate; 2007.11—2010.06,中山大学,博士后。 奖励荣誉 名称 2021年,被聘为中科院深圳先进技术研究院客座研究员; 2020年,被聘为厦门大学兼职教授; 2019年,入选“广东特支计划”科技创新青年拔尖人才; 2015年,入选中国科学院“青年创新促进会”会员(中科院青年人才计划); 2014年,入选IEEE高级会员(Senior Member); 2013年,以通讯作者身份获国际会议IWDW“最佳论文奖”; 2013年,被认定为深圳市“孔雀计划”B类人才; 2008年,获“中山大学年度优秀博士后”荣誉称号。 学术活动 名称 1. 担任多个国际权威期刊编委 (Associate Editor),包括:(1) IEEE Transactions on Cybernetics (中科院一区); (2) IEEE Systems Journal (中科院二区); (3) Journal of Information Security and Applications (CCF推荐期刊、SCI期刊); (4) Electronics Letters (IET期刊、SCI期刊)。 2. 曾担任 (1) 国家自然科学基金项目(包括重点项目)通讯/会议评审专家;(2) 国家重点研发计划项目综合绩效会议评审专家;(3) 工信部创新人才项目通讯评审专家;(4) 澳门科学技术发展基金项目通讯评审专家;(5) 中科院国际大科学计划培育专项通讯评审专家;(6) 广东省科技厅项目(包括省杰青项目)通讯评审专家;(7) 陕西省科技厅项目(包括省杰青项目)通讯/会议评审专家。 3. 曾担任多个国际会议程序委员会(PC)或技术程序委员会(TPC)成员,包括:(1) Int. Joint Conf. on Artificial Intelligence(IJCAI), (2) Int. Workshop on Digital-forensics and Watermarking (IWDW), (3) Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), (4) Int. Workshop on Digital Crime and Forensics (IWDCF), (5) Int. Conf. on Machine Learning and Cybernetics (ICMLC). 4. 受邀为三十余个国际权威期刊审稿,包括: (1) IEEE Trans. on Image Processing; (2) IEEE Trans. on Information Forensics and Security; (3) IEEE Trans. on Circuits and Systems for Video Technology; (4) IEEE Trans. on Multimedia; (5) IEEE Trans. on Systems, Man and Cybernetics: Systems; (6) IEEE Trans. on Industrial Electronics; (7) IEEE Trans. on Cloud Computing; (8) IEEE Internet of Things Journal等。 代表性论文 名称 [1] B. Zhang, G. Zhu*, Z. Zhu, H. Zhang, Y. Zhou, and S. Kwong, “Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3225525, in press. [2] Y. Zhang, G. Zhu*, X. Wang, X. Luo, Y. Zhou, H. Zhang, and L. Wu, “CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/Target Distinguishment,” IEEE Transactions on Circuits and Systems for Video Technology, DOI: 10.1109/TCSVT.2022.3220630, in press. [3] J. You#, Y.-G. Wang#, G. Zhu*, L. Wu, H. Zhang, and S. Kwong, “Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys,” IEEE Transactions on Multimedia, DOI: 10.1109/TMM.2022.3147379, in press. [4] F. Ding, Z. Shen, G. Zhu*, S. Kwong, Y. Zhou, and S. Lyu, “ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3210294, in press. [5] B. Zhang, G. Zhu*, Z. Zhu, and S. Kwong, “Alternating direction method of multipliers for nonconvex log total variation image restoration,” Applied Mathematical Modelling, vol. 114, pp. 338-359, 2023. [6] S. Wang, Z. Zhang, G. Zhu*, X. Zhang, Y. Zhou, and J. Huang, “Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 351-364, 2022. [7] J. Chang, G. Zhu*, H. Zhang, Y. Zhou, X. Luo, and L. Wu, “Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 8, pp. 5055-5067, 2022. [8] Z. Liu, G. Zhu*, F. Ding, X. Luo, S. Kwong, and P. Li, “Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 18, no. 3s, article ID 148, 2022. [9] Y. Zhang, G. Zhu*, L. Wu, S. Kwong, H. Zhang, and Y. Zhou, “Multi-task SE-Network for Image Splicing Localization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 7, pp. 4828-4840, 2022. [10] F. Ding, G. Zhu*, Y. Li, X. Zhang, P. K. Atrey, and S. Lyu, “Anti-Forensics for Face Swapping Videos via Adversarial Training,” IEEE Transactions on Multimedia, vol. 24, pp. 3429-3441, 2022. [11] Y. He, G. Zhu*, C. Gong, P. Shi, “Stability Analysis for Hybrid Time-delay Systems with Double Degrees,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7444-7456, 2022. [12] Y. He, X. Zhao, G. Zhu*, and C. Gong, “Stability Analysis of Hybrid Time-Delay Systems Using Homogeneity Property,” ISA Transactions, vol. 129, part A, pp. 128-137, 2022. [13] F.-Z. Ou, Y.-G. Wang, J. Li, G. Zhu, and S. Kwong, “A Novel Rank Learning Based No-Reference Image Quality Assessment Method,” IEEE Transactions on Multimedia, vol. 24, pp. 4197-4211, 2022. [14] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Asynchronous Distributed Finite-time H∞ Filtering in Sensor Networks with Hidden Markovian Switching and Two-channel Stochastic Attacks,” IEEE Transactions on Cybernetics, vol. 52, no. 3 pp. 1502-1514, 2022. [15] J. Yang, G. Zhu*, Y. Luo, S.Kwong, X. Zhang, and Y. Zhou, “Forensic Analysis of JPEG-domain Enhanced Images via Coefficient Likelihood Modeling,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1006-1019, 2022. [16] J. You#, Y-G. Wang#, G. Zhu*, and S. Kwong, “Truncated Robust Natural Watermarking with Hungarian Optimization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 483-495, 2022. [17] F. Ding, G. Zhu, M.Alazab, X. Li, and K. Yu, “Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets,” IEEE Consumer Electronics Magazine, vol. 11, no. 2, pp. 42-50, 2022 (Highly Cited Paper). [18] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Distributed Fault Detection and Control for Markov Jump Systems Over Sensor Networks With Round-Robin Protocol,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 8, pp. 3422-3435, 2021. [19] C. Gong, G. Zhu*, and P. Shi, “Adaptive event-triggered and double-quantized consensus of leader-follower multi-agent systems with semi-Markovian jump parameters,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 9, pp. 5867-5879, 2021. [20] J. Yang, Y. Zhang, G. Zhu*, and S. Kwong, “A Clustering-based Framework for Improving the Performance of JPEG Quantization Step Estimation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 4, pp. 1661-1672, 2021. [21] Y.-G. Wang, G. Zhu*, J. Li, M. Conti, and J. Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 1, pp. 76-87, 2021. [22] Y. Zhang, F.Ding, S. Kwong, and G. Zhu*, “Feature pyramid network for diffusion-based image inpainting detection,” Information Sciences, vol. 572, pp. 29-42, 2021. [23] Z. Liu, G. Zhu*, F. Ding, and S.Kwong, “Weighted visual secret sharing for general access structures based on random grids,” Signal Processing: Image Communication, vol. 92, article ID 116129, 2021. [24] C. Li, R. Cong, S. Kwong, J. Hou, H. Fu, G. Zhu, D. Zhang, and Q. Huang, “ASIF-Net: Attention Steered Interweave Fusion Network for RGB-D Salient Object Detection,” IEEE Transaction on Cybernetics, vol. 51, no. 1, pp. 88-100, 2021 (Highly Cited Paper). [25] F. Ding, H. Wu, G. Zhu*, and Y.-Q. Shi, “METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 12, pp. 4715-4727, 2020. [26] Z. Liu, G. Zhu*, Y.-G. Wang, J. Yang, and S. Kwong, “A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 4, article ID 118, 2020. [27] B. Zhang, G. Zhu*, and Z. Zhu, “A TV-log nonconvex approach for image deblurring with impulsive noise,” Signal Processing, vol. 174, article ID: 107631, 2020. [28] Y.-G. Wang, G. Zhu*, and Y.-Q. Shi, “Transportation spherical watermarking,” IEEE Transactions on Image Processing, vol. 27, no. 4, pp. 2063-2077, 2018. [29] Y.-G. Wang, G. Zhu*, S. Kwong, and Y.-Q. Shi, “A study on the security levels of spread-spectrum embedding schemes in the WOA framework,” IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2307-2320, 2018. [30] C. Gong, G. Zhu*, and P. Shi, “L2-L∞ filtering for stochastic time-varying delay systems based on the Bessel-Legendre stochastic inequality,” Signal Processing, vol. 145, pp. 26-36, 2018. [31] J. Yang, G. Zhu*, and Y.-Q. Shi, “Analyzing the effect of JPEG compression on local variance of image intensity,” IEEE Transactions on Image Processing, vol. 25, no. 6, pp. 2647-2656, 2016. [32] Y.-G. Wang and G. Zhu*, “An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy,” Information Sciences, vol. 316, pp. 40-53, 2015. [33] J. Yang, G. Zhu*, J. Huang, and X. Zhao, “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, vol. 41, pp. 90-97, 2015. [34] F. Ding, G. Zhu*, J. Yang, J. Xie, and Y.-Q. Shi, “Edge perpendicular binary coding for USM sharpening detection,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 327-331, 2015. [35] J. Yang#, J. Xie#, G. Zhu*, S. Kwong, and Y.-Q. Shi, “An effective method for detecting double JPEG compression with the same quantization matrix,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1933-1942, 2014. [36] Y.-G. Wang, G. Zhu, and J. Huang, “An improved sample projection approach for image watermarking,” Digital Signal Processing, vol. 24, pp. 135-143, 2014. [37] J. Yang, G. Zhu*, J. Wang, and Y.-Q. Shi, “Detecting non-aligned double JPEG compression based on refined intensity difference and calibration,” in Proc. 12th Int. Workshop on Digital-forensics and Watermarking (IWDW), Auckland, New Zealand, 2013 (Best Paper Award). [38] G. Zhu, S. Kwong, J. Huang, and J. Yang, “Random Gray code and its performance analysis for image hashing,” Signal Processing, vol. 91, no. 9, pp. 2178-2193, 2011. [39] G. Zhu, J. Huang, S. Kwong, and J. Yang, “Fragility analysis of adaptive quantization-based image hashing,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 133-147, 2010. [40] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Gradient vector flow active contours with prior directional information,” Pattern Recognition Letters, vol. 31, no. 9, pp. 845-856, 2010. [41] G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166-3173, 2010 (Over 1,500 citations according to Google scholar). [42] G. Zhu, J. Huang, S. Kwong, and J. Yang, “A study on the randomness measure of image hashing,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 928-932, 2009. [43] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Anisotropic virtual electric field for active contours,” Pattern Recognition Letters, vol. 29, no. 11, pp. 1659-1666, 2008. [44] G. Zhu, S. Zhang, X. Chen, and C. Wang “Efficient illumination insensitive object tracking by normalized gradient matching,” IEEE Signal Processing Letters, vol. 14, no. 12, pp. 944-947, 2007. [45] G. Zhu, Q. Zeng, and C. Wang, “Efficient edge-based object tracking,” Pattern Recognition, vol. 39, no. 11, pp. 2223-2226, 2006. 主要授权专利 名称 1. 杨建权、朱国普、黄晓霞, “估计JPEG压缩位图量化步长的方法及系统”, 发明专利, ZL201611113143.9, 2020.07 2. 罗瑶、杨建权、朱国普、黄晓霞, “一种图像增强处理的检测方法及装置”, 发明专利, ZL201510368803.7, 2019.08 3. 杨建权、吴雪、朱国普、黄晓霞, “视频帧篡改检测方法”, 发明专利, ZL201510472855.9, 2019.06 4. 丁峰、杨建权、朱国普、黄晓霞, “一种图像掩模锐化检测方法及系统”, 发明专利, ZL201410112696.7, 2018.02 5. 杨建权、朱国普、黄继武、赵希、黄晓霞, “一种位图JPEG压缩检测的方法及系统”, 发明专利, ZL201310003334.X, 2017.04 6. 沈凯捷、朱国普、杨建权、黄晓霞、赵希, “图像加密压缩和解压解密方法及装置”, 发明专利, ZL201210253495.X, 2017.02 承担的主要项目 名称 1. 国家自然科学基金面上项目,“基于深度学习的数字图像取证关键技术研究”,2022.01-2025.12, 58万,主持; 2. 国家自然科学基金面上项目,“图像锐化检测关键技术研究”,2019.01-2022.12, 65万,主持; 3. 国家自然科学基金面上项目,“JPEG压缩检测关键技术研究”,2016.01-2019.12, 78万,主持; 4. 国家自然科学基金青年科学基金项目,“面向认证的图像哈希的特征安全性分析”,2011.01-2013.12,18万,主持; 5. 国家重点研发计划课题,“网络空间抗测绘关键技术研究—抗关键节点与路径分析技术”,2022.12-2025.11,306万,主持; 6. 国家自然科学基金-广东联合基金重点项目,“网络媒体内容服务安全理论与关键技术”,2012.01-2015.12,260万,子项目负责人(负责15%的科研经费); 7. 中国博士后科学基金项目,“面向认证的组合图像Hash的算法设计及其性能分析”,2008.08-2010.05,5万(一等资助),主持; 8. 中国科学院“青年创新促进会”项目(中科院人才类项目),2015.01-2018.12,60万,主持; 9. “广东特支计划”科技创新青年拔尖人才项目,2020.06-2023.06,50万,主持; 10. 广东自然科学基金自由申请项目,“双重JPEG压缩的检测与参数估计”,2013.10-2015.10,5万,主持; 11. 信息安全国家重点实验室开放课题基金,“数字图像的对齐双重压缩检测技术”,2017.01-2018.12,5万,主持; 12. 深圳市基础研究学科布局项目,面向网络可视媒体的数字版权保护技术研究,2018.04-2021.10,200万,主持; 13. 深圳市海外高层次人才创新创业计划(孔雀计划)—技术创新项目,“非侵入式可视媒体认证的理论与技术研究”,2013.04-2015.05,70万,主持; 14. 深圳市基础研究重点项目,“基于压缩与成像机理的数字图像取证技术研究”,2013.07-2015.08,30万,主持; 15. 王宽诚教育基金项目,资助参加国际会议“The 2015 IEEE International Conference on Systems, Man, and Cybernetics”,2015.10.09-2015.10.12,资助范围包括:会议注册费、差旅费和津贴,主持; 16. 委托开发(鹏城实验室),“外借设备位置及运行状态感知的原型系统开发”,2019.11-2021.06,47万,主持; 17. 委托开发(鹏城实验室),“面向多源情境感知的终端原型系统开发”,2019.01-2019.07,19万,主持。 CONTACT INFORMATION 名称 Name: Guopu Zhu Address: No. 92 West Dazhi Street, Nangang District, Harbin Institute of Technology, Harbin, Heilongjiang, China, 150001 E-mail: guopu.zhu@hit.edu.cn; guopu.zhu@gmail.com EDUCATION 名称 Ph.D. Control Science and Engineering, Harbin Institute of Technology, China, 2007. M.S. Navigation, Guidance and Control, Harbin Institute of Technology, China, 2004. B.S. Traffic and Transportation, Jilin University, China, 2002. RESEARCH INTERESTS 名称 Multimedia Security; Machine Learning; Systems and Control. PROFESSIONAL EXPERIENCE 名称 Deputy Director, Key Laboratory of Security Analysis of Network Big Data, Ministry of Industry and Information Technology, China, Since 2022. Professor, School of Computer Science and Technology, Harbin Institute of Technology, China, Since 2021. Director, Center for Internet of Things Computing, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China, 2018-2021. Professor, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China, 2016-2021. Associate Professor, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China, 2010-2016. Research Associate/Senior Research Associate, Department of Computer Science, City University of Hong Kong, Hong Kong, China, 2008-2010. Postdoctoral Research Fellow, School of Information Science and Technology, Sun Yat-sen University, China, 2007-2010. SELECTED PAPERS 名称 [1] B. Zhang, G. Zhu*, Z. Zhu, H. Zhang, Y. Zhou, and S. Kwong, “Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3225525, in press. [2] Y. Zhang, G. Zhu*, X. Wang, X. Luo, Y. Zhou, H. Zhang, and L. Wu, “CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/Target Distinguishment,” IEEE Transactions on Circuits and Systems for Video Technology, DOI: 10.1109/TCSVT.2022.3220630, in press. [3] J. You#, Y.-G. Wang#, G. Zhu*, L. Wu, H. Zhang, and S. Kwong, “Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys,” IEEE Transactions on Multimedia, DOI: 10.1109/TMM.2022.3147379, in press. [4] F. Ding, Z. Shen, G. Zhu*, S. Kwong, Y. Zhou, and S. Lyu, “ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3210294, in press. [5] B. Zhang, G. Zhu*, Z. Zhu, and S. Kwong, “Alternating direction method of multipliers for nonconvex log total variation image restoration,” Applied Mathematical Modelling, vol. 114, pp. 338-359, 2023. [6] S. Wang, Z. Zhang, G. Zhu*, X. Zhang, Y. Zhou, and J. Huang, “Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 351-364, 2022. [7] J. Chang, G. Zhu*, H. Zhang, Y. Zhou, X. Luo, and L. Wu, “Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 8, pp. 5055-5067, 2022. [8] Z. Liu, G. Zhu*, F. Ding, X. Luo, S. Kwong, and P. Li, “Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 18, no. 3s, article ID 148, 2022. [9] Y. Zhang, G. Zhu*, L. Wu, S. Kwong, H. Zhang, and Y. Zhou, “Multi-task SE-Network for Image Splicing Localization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 7, pp. 4828-4840, 2022. [10] F. Ding, G. Zhu*, Y. Li, X. Zhang, P. K. Atrey, and S. Lyu, “Anti-Forensics for Face Swapping Videos via Adversarial Training,” IEEE Transactions on Multimedia, vol. 24, pp. 3429-3441, 2022. [11] Y. He, G. Zhu*, C. Gong, P. Shi, “Stability Analysis for Hybrid Time-delay Systems with Double Degrees,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7444-7456, 2022. [12] Y. He, X. Zhao, G. Zhu*, and C. Gong, “Stability Analysis of Hybrid Time-Delay Systems Using Homogeneity Property,” ISA Transactions, vol. 129, part A, pp. 128-137, 2022. [13] F.-Z. Ou, Y.-G. Wang, J. Li, G. Zhu, and S. Kwong, “A Novel Rank Learning Based No-Reference Image Quality Assessment Method,” IEEE Transactions on Multimedia, vol. 24, pp. 4197-4211, 2022. [14] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Asynchronous Distributed Finite-time H∞ Filtering in Sensor Networks with Hidden Markovian Switching and Two-channel Stochastic Attacks,” IEEE Transactions on Cybernetics, vol. 52, no. 3 pp. 1502-1514, 2022. [15] J. Yang, G. Zhu*, Y. Luo, S.Kwong, X. Zhang, and Y. Zhou, “Forensic Analysis of JPEG-domain Enhanced Images via Coefficient Likelihood Modeling,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1006-1019, 2022. [16] J. You#, Y-G. Wang#, G. Zhu*, and S. Kwong, “Truncated Robust Natural Watermarking with Hungarian Optimization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 483-495, 2022. [17] F. Ding, G. Zhu, M.Alazab, X. Li, and K. Yu, “Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets,” IEEE Consumer Electronics Magazine, vol. 11, no. 2, pp. 42-50, 2022 (Highly Cited Paper). [18] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Distributed Fault Detection and Control for Markov Jump Systems Over Sensor Networks With Round-Robin Protocol,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 8, pp. 3422-3435, 2021. [19] C. Gong, G. Zhu*, and P. Shi, “Adaptive event-triggered and double-quantized consensus of leader-follower multi-agent systems with semi-Markovian jump parameters,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 9, pp. 5867-5879, 2021. [20] J. Yang, Y. Zhang, G. Zhu*, and S. Kwong, “A Clustering-based Framework for Improving the Performance of JPEG Quantization Step Estimation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 4, pp. 1661-1672, 2021. [21] Y.-G. Wang, G. Zhu*, J. Li, M. Conti, and J. Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 1, pp. 76-87, 2021. [22] Y. Zhang, F.Ding, S. Kwong, and G. Zhu*, “Feature pyramid network for diffusion-based image inpainting detection,” Information Sciences, vol. 572, pp. 29-42, 2021. [23] Z. Liu, G. Zhu*, F. Ding, and S.Kwong, “Weighted visual secret sharing for general access structures based on random grids,” Signal Processing: Image Communication, vol. 92, article ID 116129, 2021. [24] C. Li, R. Cong, S. Kwong, J. Hou, H. Fu, G. Zhu, D. Zhang, and Q. Huang, “ASIF-Net: Attention Steered Interweave Fusion Network for RGB-D Salient Object Detection,” IEEE Transaction on Cybernetics, vol. 51, no. 1, pp. 88-100, 2021 (Highly Cited Paper). [25] F. Ding, H. Wu, G. Zhu*, and Y.-Q. Shi, “METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 12, pp. 4715-4727, 2020. [26] Z. Liu, G. Zhu*, Y.-G. Wang, J. Yang, and S. Kwong, “A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 4, article ID 118, 2020. [27] B. Zhang, G. Zhu*, and Z. Zhu, “A TV-log nonconvex approach for image deblurring with impulsive noise,” Signal Processing, vol. 174, article ID: 107631, 2020. [28] Y.-G. Wang, G. Zhu*, and Y.-Q. Shi, “Transportation spherical watermarking,” IEEE Transactions on Image Processing, vol. 27, no. 4, pp. 2063-2077, 2018. [29] Y.-G. Wang, G. Zhu*, S. Kwong, and Y.-Q. Shi, “A study on the security levels of spread-spectrum embedding schemes in the WOA framework,” IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2307-2320, 2018. [30] C. Gong, G. Zhu*, and P. Shi, “L2-L∞ filtering for stochastic time-varying delay systems based on the Bessel-Legendre stochastic inequality,” Signal Processing, vol. 145, pp. 26-36, 2018. [31] J. Yang, G. Zhu*, and Y.-Q. Shi, “Analyzing the effect of JPEG compression on local variance of image intensity,” IEEE Transactions on Image Processing, vol. 25, no. 6, pp. 2647-2656, 2016. [32] Y.-G. Wang and G. Zhu*, “An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy,” Information Sciences, vol. 316, pp. 40-53, 2015. [33] J. Yang, G. Zhu*, J. Huang, and X. Zhao, “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, vol. 41, pp. 90-97, 2015. [34] F. Ding, G. Zhu*, J. Yang, J. Xie, and Y.-Q. Shi, “Edge perpendicular binary coding for USM sharpening detection,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 327-331, 2015. [35] J. Yang#, J. Xie#, G. Zhu*, S. Kwong, and Y.-Q. Shi, “An effective method for detecting double JPEG compression with the same quantization matrix,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1933-1942, 2014. [36] Y.-G. Wang, G. Zhu, and J. Huang, “An improved sample projection approach for image watermarking,” Digital Signal Processing, vol. 24, pp. 135-143, 2014. [37] J. Yang, G. Zhu*, J. Wang, and Y.-Q. Shi, “Detecting non-aligned double JPEG compression based on refined intensity difference and calibration,” in Proc. 12th Int. Workshop on Digital-forensics and Watermarking (IWDW), Auckland, New Zealand, 2013 (Best Paper Award). [38] G. Zhu, S. Kwong, J. Huang, and J. Yang, “Random Gray code and its performance analysis for image hashing,” Signal Processing, vol. 91, no. 9, pp. 2178-2193, 2011. [39] G. Zhu, J. Huang, S. Kwong, and J. Yang, “Fragility analysis of adaptive quantization-based image hashing,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 133-147, 2010. [40] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Gradient vector flow active contours with prior directional information,” Pattern Recognition Letters, vol. 31, no. 9, pp. 845-856, 2010. [41] G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166-3173, 2010 (Over 1,500 citations according to Google scholar). [42] G. Zhu, J. Huang, S. Kwong, and J. Yang, “A study on the randomness measure of image hashing,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 928-932, 2009. [43] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Anisotropic virtual electric field for active contours,” Pattern Recognition Letters, vol. 29, no. 11, pp. 1659-1666, 2008. [44] G. Zhu, S. Zhang, X. Chen, and C. Wang “Efficient illumination insensitive object tracking by normalized gradient matching,” IEEE Signal Processing Letters, vol. 14, no. 12, pp. 944-947, 2007. [45] G. Zhu, Q. Zeng, and C. Wang, “Efficient edge-based object tracking,” Pattern Recognition, vol. 39, no. 11, pp. 2223-2226, 2006. PROFESSIONAL ACTIVITIES 名称 Associate Editor for International Journals: (1) IEEE Transactions on Cybernetics; (2) IEEE Systems Journal; (3) Journal of Information Security and Applications (Elsevier); (4) Electronics Letters (IET). Reviewer for International Journals: (1) IEEE Trans. on Image Processing; (2) IEEE Trans. on Information Forensics and Security; (3) IEEE Trans. on Circuits and Systems for Video Technology; (4) IEEE Trans. on Multimedia; (5) IEEE Trans. on Systems, Man and Cybernetics: Systems; (6) ACM Trans. on Multimedia Computing, Communications and Applications; (7) IEEE Trans. on Industrial Electronics; (8) IEEE Trans. on Cloud Computing; (9) IEEE Signal Processing Letters; (10) IEEE Internet of Things Journal; and more.

上一篇:叶麟     下一篇:楚盈