张新鹏

性别: 男

 

学历: 博士研究生

学位: 博士

职称: 教授

政治面貌:中共党员

是否硕士研究生导师:

是否博士研究生导师:

学科专长: 网络空间安全、信号与信息处理

所属学科方向(团队): 网络空间安全

办公室: T815

联系电话:66137263

Email:   xzhang@shu.edu.cn

个人简介(简历)

国家杰出青年科学基金获得者、上海市优秀学术带头人、上海市曙光人才计划、上海市“东方学者”跟踪计划、上海市浦江人才计划、上海市“青年科技启明星”跟踪计划。曾赴美国纽约州立大学宾汉顿分校访问一年,受德国洪堡基金会资助作为资深研究员赴德国康斯坦茨大学访问14 个月。主持国家自然科学基金重点项目、国家863计划等科研项目40余项。发表论文200余篇,被引10000余次,2014年—2019年连续六年入选中国高被引学者(Most Cited Chinese Researchers)榜单。申请发明专利30余项,授权近20项。获上海市自然科学奖二等奖(第一完成人)、中国电子学会自然科学奖二等奖(第二完成人)、安徽省自然科学奖一等奖(第三完成人)、国家级教学成果奖(参加)。担任 IEEE Trans. On Information Forensics and Security (IEEE T-IFS)等国际学术期刊的 Associate Editor、ACM IH&MMSec 等国际学术会议的TPC Chair。

科研方向

多媒体信息安全、人工智能安全、数字图像处理

本科生教学

    人工智能(本科生通识课)

信息时代的思维(本科生新生研讨课)

信息论与编码(本科生)

信息网络与安全(本科生)

多媒体信息安全(本科生高年级研讨课)

研究生培养

已培养博士研究生10余名、硕士研究生50余名。

近期承担的科研项目

(1)      国家自然科学基金重点项目,新型信息隐藏的基础理论与关键技术研究

(2)      国家杰出青年科学基金项目,多媒体信息隐藏

(3)      上海市优秀学术带头人计划,云数据安全处理

近期学术期刊论文

1.         S. Li, X. Zhang, Z. Qian, G. Feng, and Y. Ren, Key Based   Artificial Fingerprint Generation for Privacy Protection, IEEE Trans.   on Dependable and Secure Computing, (to appear)

2.         Y. Du, Z. Yin, and X. Zhang, High Capacity Lossless Data   Hiding in JPEG Bitstream Based on General VLC Mapping, IEEE Trans. on   Dependable and Secure Computing, (to appear)

3.         X. Zhu, S. Li, X. Zhang, L. Liang, A. Kot, and F. Li, Detection   of Spoofing Medium Contours for Face Anti-spoofing, IEEE Trans. on   Circuits and Systems for Video Technology, (to appear)

4.         N. Zhong, Z. Wang, Z. Qian, X. Zhang, and X. Li, Batch   Steganography via Generative Network, IEEE Trans. on Circuits and Systems   for Video Technology, (to appear)

5.         Y. Ren, M. Dong, Z. Qian, X. Zhang, and G. Feng, Efficient   Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server,   IEEE Trans. on Cloud Computing, (to appear)

6.         M. Xu, G. Feng, Y. Ren, and X. Zhang, On Cloud Storage   Optimization of Blockchain with a Clustering-Based Genetic Algorithm, IEEE   Internet of Things Journal, (to appear)

7.         R. Zhu, X. Zhang, M. Shi, and Z. Tang, Secure Neural   Network Watermarking Protocol against Forging Attack, EURASIP Journal on   Image and Video Processing, (to appear)

8.         L. Shi, Z. Wang, Z. Qian, N. Huang, and X. Zhang, Distortion   Function for Emoji Image Steganography, Computers, Materials &   Continua, (to appear)

9.         Y. Ren, X. Zhang, D. Gu, and G. Feng, Efficient   Outsourced Extraction of Histogram Features over Encrypted Images in Cloud, SCIENCE   CHINA Information Sciences, (to appear)

10.     L. Hao, G. Feng, Y. Ren, and X. Zhang, Iris Segmentation Using   Feature Channel Optimization for Noisy Environments, Cognitive   Computation, (to appear)

11.     Y. Yin, H. Wu, and X. Zhang, Neural Visual Social Comment   on Image-Text Content, IETE Technical Review, (to appear)

12.     Y. Hu, Z. Wang, and X. Zhang, Steganography in Social   Networks Based on Behavioral Correlation, IETE Technical Review, (to   appear)

13.     G. Feng, X. Zhang, Y. Ren, Z. Qian, and F. Li,   Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Trans. on   Circuits and Systems for Video Technology, 30, pp. 376-386, 2020.

14.     Y. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li, How to   Extract Image Features Based on Co-occurrence Matrix Securely and Efficiently   in Cloud Computing, IEEE Trans. on Cloud Computing, 8(1), pp. 207-219,   2020.

15.     Z. Yin, Y. Xiang, and X. Zhang, Reversible Data Hiding in   Encrypted Images Based on Multi-MSB Prediction and Huffman Coding, IEEE   Trans. on Multimedia, 22(4), pp. 874-884, 2020.

16.     L. Zhou, G. Feng, L. Shen, and X. Zhang, On Security   Enhancement of Steganography via Generative Adversarial Image, IEEE Signal   Processing Letters, 27, pp. 166-170, 2020.

17.     Z. Wang, X. Zhang, and Z. Qian, Practical Cover Selection   for Steganography, IEEE Signal Processing Letters, 27, pp. 71-75,   2020.

18.     X. Cai, Y. Ren, and X. Zhang, Privacy-Protected Deletable   Blockchain, IEEE Access, 8, pp. 6060-6070, 2020.

19.     H. Yao, H. Wei, C. Qin, and X. Zhang, An Improved First   Quantization Matrix Estimation for Nonaligned Double Compressed JPEG Images, Signal   Processing, 170, 107430, 2020.

20.     Z. Jin, G. Feng, Y. Ren, and X. Zhang, Feature Extraction   Optimization of JPEG Steganalysis Based on Residual Images, Signal   Processing, 170, 107455, 2020.

21.     Y. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang, Reversible   Data Hiding in Encrypted Images Using Adaptive Reversible Integer   Transformation, Signal Processing, 167, 2020.

22.     J. He, Q. Ying, Z. Qian, G. Feng, and X. Zhang,   Semi-structured Data Protection Scheme Based on Robust Watermarking, EURASIP   Journal on Image and Video Processing, 12, 2020.

23.     S. Li, and X. Zhang, Towards Construction   Based Data Hiding: From Secrets to Fingerprint Images, IEEE Trans. on   Image Processing, 28(3), pp. 1482-1497, 2019.

24.     J. Tao, S. Li, X. Zhang, and Z. Wang, Towards Robust   Image Steganography, IEEE Trans. on Circuits and Systems for Video   Technology, 29(2), pp. 594-600, 2019.

25.     Z. Qian, H. Xu, X. Luo, and X. Zhang, New Framework of   Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on   Circuits and Systems for Video Technology, 29(2), pp. 351-362, 2019.

26.     C. Qin, Q. Zhou, F. Cao, J. Dong, and X. Zhang, Flexible   Lossy Compression for Selective Encrypted Image with Image Inpainting, IEEE   Trans. on Circuits and Systems for Video Technology, 29(11), pp.   3341-3355, 2019.

27.     D. Ni, G. Feng, L. Shen, and X. Zhang, Selective Ensemble   Classification of Image Steganalysis via Deep Q Network, IEEE Signal   Processing Letters, 26(7), pp. 1065-1069, 2019.

28.     Q. Ying, Z. Qian, X. Zhang, and D. Ye, Reversible Data   Hiding with Image Enhancement using Histogram Shifting, IEEE Access, 7,   pp. 46506-46521, 2019.

29.     Z. Wang, and X. Zhang, Secure Cover Selection for   Steganography, IEEE Access, 7, pp. 57857-57867, 2019.

30.     Z. Wang, S. Li, and X. Zhang, Towards Improved   Steganalysis: When Cover Selection Is Used in Steganography, IEEE Access,   7, pp. 168914-168921, 2019.

31.     Y. Wang, L. Kong, Z. Qian, G. Feng, X. Zhang, and J.   Zheng, Breaking Permutation-Based Mesh Steganography and Security   Improvement, IEEE Access, 7, pp. 183300-183310, 2019.

32.     C. Qin, X. Qian, W. Hong, and X. Zhang, An Efficient   Coding Scheme for Reversible Data Hiding in Encrypted Image with Redundancy   Transfer, Information Sciences, 487, pp. 176-192, 2019.

33.     Y. Jia, Z. Yin, X. Zhang, and Y. Luo, Reversible Data   Hiding Based on Reducing Invalid Shifting of Pixels in Histogram Shifting, Signal   Processing, 163, pp. 238-246, 2019.

34.     H. Liang, X. Zhang, and H. Cheng, Huffman-Code Based Retrieval   for Encrypted JPEG Images, Journal of Visual Communication and Image   Representation, 61, pp. 149-156, 2019.

35.     L. Du, W. Zhang, H. Fu, W. Ren, and X. Zhang, An Efficient   Privacy Protection Scheme for Data Security in Video Surveillance, Journal   of Visual Communication and Image Representation, 59, pp. 347-362, 2019.

36.     N. Zhong, Z. Qian, Z. Wang, and X. Zhang, Steganography   in Stylized Images, Journal of Electronic Imaging, 28(3), 033005,   2019.

37.     X. Zeng, G. Feng, and X. Zhang, Detection of Double JPEG Compression   Using Modified Dense Net Model, Multimedia Tools and Applications, 78(7),   pp. 8183-8196, 2019.

38.     L. Liu, Z. Wang, Z. Qian, X. Zhang,   and G. Feng, Steganography in Beautified Images, Mathematical   Biosciences and Engineering, 16(4), pp. 2322-2333, 2019.

39.     L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux, and X. Zhang,   Distortion Function for Emoji Image Steganography, Computers, Materials   & Continua, 59(3), pp. 943-953, 2019.

40.     Z. Qian, Z. Wang, X. Zhang, and   G. Feng, Breaking Steganography: Slight Modification with   Distortion Minimization, International Journal of Digital Crime and Forensics, 11(1),   pp. 114-125, 2019.

41.     Z. Wang, Z. Yin, and X. Zhang, Asymmetric Distortion   Function for JPEG Steganography Using Block Artifact Compensation, International Journal of Digital Crime   and Forensics, 11(1), pp. 90-99, 2019.

42.     C. Wang, J. Ni, X. Zhang, and Q. Huang, Efficient   Compression of Encrypted Binary Images Using the Markov Random Field, IEEE   Trans. on Information Forensics & Security, 13(5), pp. 1271-1285,   2018.  

43.     Z. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable   Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on   Dependable and Secure Computing, 15(6), pp. 1055-1067, 2018.

44.     Z. Wang, X. Zhang, and Z. Yin, Joint Cover-Selection and   Payload-Allocation by Steganographic Distortion Optimization, IEEE Signal   Processing Letters, 25(10), pp. 1530-1534, 2018.

45.     F. Li, K. Wu, X. Zhang, J. Lei, and M. Wen, Robust Batch   Steganography in Social Networks With Non-Uniform Payload and Data   Decomposition, IEEE Access, 6, pp. 29912-29925, 2018.

46.     Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, On   Improving Distortion Functions for JPEG Steganography, IEEE Access, 6,   pp. 74917-74930, 2018.

47.     Y. Qiu, H. He, Z. Qian, S. Li, and X. Zhang, Lossless   Data Hiding in JPEG Bitstream Using Alternative Embedding, Journal of   Visual Communication and Image Representation, 52, pp. 86-91, 2018.

48.     C. Qin, X. Chen, X. Luo, X. Zhang, and X.   Sun, Perceptual Image Hashing via Dual-cross Pattern Encoding and   Salient Structure Detection, Information Sciences, 423, pp. 284-302,   2018.

49.     C. Qin, W. Zhang, F. Cao, X. Zhang, and   C.-C. Chang, Separable Reversible Data Hiding in Encrypted Images via   Adaptive Embedding Strategy with Block Selection, Signal   Processing, 153, pp. 109-122, 2018.

50.     H. Yao, C. Qin, Z. Tang, and X. Zhang, A General   Framework for Shiftable Position-Based Dual-image Reversible Data Hiding, EURASIP   Journal on Image and Video Processing, 41, pp. 1-10, 2018.

51.     Z. Qian, L. Pan, N. Huang, and X. Zhang, Constructive   Steganography by Tangles, KSII Transactions on Internet and Information   Systems, 12(8), pp. 3911-3925, 2018.

52.     Z. Qian, N. Huang, S. Li, and X. Zhang, Constructive Steganography Using Texture Synthesis, IETE Technical Review,   35(Sup. 1), pp. 14-22, 2018.

53.     S. Li, X. Chen, Z. Wang, Z. Qian, and X. Zhang,   Data Hiding in Iris Image for Privacy Protection, IETE Technical Review,   35(Sup. 1), pp. 34-41, 2018.

54.     Z. Wang, Z. Yin, and X. Zhang, Distortion Function for   JPEG Steganography Based on Image-Texture and Correlation in DCT Domain, IETE   Technical Review, 35(4), pp. 351-358, 2018.

55.     Q. Wei, Z. Yin, Z. Wang, and X. Zhang, Distortion   Function Based on Residual Blocks for JPEG Steganography, Multimedia Tools   and Applications, 77(14), pp. 17875-17888, 2018.

其他

 
     

版权所有 © 上海大学   沪ICP备09014157   沪公网安备31009102000049号  地址:上海市宝山区上大路99号    邮编:200444   电话查询
 技术支持:上海大学信息化工作办公室   联系我们