个人简介(简历) 国家杰出青年科学基金获得者、上海市优秀学术带头人、上海市曙光人才计划、上海市“东方学者”跟踪计划、上海市浦江人才计划、上海市“青年科技启明星”跟踪计划。曾赴美国纽约州立大学宾汉顿分校访问一年,受德国洪堡基金会资助作为资深研究员赴德国康斯坦茨大学访问14 个月。主持国家自然科学基金重点项目、国家863计划等科研项目40余项。发表论文200余篇,被引10000余次,2014年—2019年连续六年入选中国高被引学者(Most Cited Chinese Researchers)榜单。申请发明专利30余项,授权近20项。获上海市自然科学奖二等奖(第一完成人)、中国电子学会自然科学奖二等奖(第二完成人)、安徽省自然科学奖一等奖(第三完成人)、国家级教学成果奖(参加)。担任 IEEE Trans. On Information Forensics and Security (IEEE T-IFS)等国际学术期刊的 Associate Editor、ACM IH&MMSec 等国际学术会议的TPC Chair。 科研方向 多媒体信息安全、人工智能安全、数字图像处理 本科生教学 人工智能(本科生通识课) 信息时代的思维(本科生新生研讨课) 信息论与编码(本科生) 信息网络与安全(本科生) 多媒体信息安全(本科生高年级研讨课) 研究生培养 已培养博士研究生10余名、硕士研究生50余名。 近期承担的科研项目 (1) 国家自然科学基金重点项目,新型信息隐藏的基础理论与关键技术研究 (2) 国家杰出青年科学基金项目,多媒体信息隐藏 (3) 上海市优秀学术带头人计划,云数据安全处理 近期学术期刊论文 1. S. Li, X. Zhang, Z. Qian, G. Feng, and Y. Ren, Key Based Artificial Fingerprint Generation for Privacy Protection, IEEE Trans. on Dependable and Secure Computing, (to appear) 2. Y. Du, Z. Yin, and X. Zhang, High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping, IEEE Trans. on Dependable and Secure Computing, (to appear) 3. X. Zhu, S. Li, X. Zhang, L. Liang, A. Kot, and F. Li, Detection of Spoofing Medium Contours for Face Anti-spoofing, IEEE Trans. on Circuits and Systems for Video Technology, (to appear) 4. N. Zhong, Z. Wang, Z. Qian, X. Zhang, and X. Li, Batch Steganography via Generative Network, IEEE Trans. on Circuits and Systems for Video Technology, (to appear) 5. Y. Ren, M. Dong, Z. Qian, X. Zhang, and G. Feng, Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server, IEEE Trans. on Cloud Computing, (to appear) 6. M. Xu, G. Feng, Y. Ren, and X. Zhang, On Cloud Storage Optimization of Blockchain with a Clustering-Based Genetic Algorithm, IEEE Internet of Things Journal, (to appear) 7. R. Zhu, X. Zhang, M. Shi, and Z. Tang, Secure Neural Network Watermarking Protocol against Forging Attack, EURASIP Journal on Image and Video Processing, (to appear) 8. L. Shi, Z. Wang, Z. Qian, N. Huang, and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, (to appear) 9. Y. Ren, X. Zhang, D. Gu, and G. Feng, Efficient Outsourced Extraction of Histogram Features over Encrypted Images in Cloud, SCIENCE CHINA Information Sciences, (to appear) 10. L. Hao, G. Feng, Y. Ren, and X. Zhang, Iris Segmentation Using Feature Channel Optimization for Noisy Environments, Cognitive Computation, (to appear) 11. Y. Yin, H. Wu, and X. Zhang, Neural Visual Social Comment on Image-Text Content, IETE Technical Review, (to appear) 12. Y. Hu, Z. Wang, and X. Zhang, Steganography in Social Networks Based on Behavioral Correlation, IETE Technical Review, (to appear) 13. G. Feng, X. Zhang, Y. Ren, Z. Qian, and F. Li, Diversity-based Cascade Filters for JPEG Steganalysis, IEEE Trans. on Circuits and Systems for Video Technology, 30, pp. 376-386, 2020. 14. Y. Ren, X. Zhang, G. Feng, Z. Qian, and F. Li, How to Extract Image Features Based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing, IEEE Trans. on Cloud Computing, 8(1), pp. 207-219, 2020. 15. Z. Yin, Y. Xiang, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding, IEEE Trans. on Multimedia, 22(4), pp. 874-884, 2020. 16. L. Zhou, G. Feng, L. Shen, and X. Zhang, On Security Enhancement of Steganography via Generative Adversarial Image, IEEE Signal Processing Letters, 27, pp. 166-170, 2020. 17. Z. Wang, X. Zhang, and Z. Qian, Practical Cover Selection for Steganography, IEEE Signal Processing Letters, 27, pp. 71-75, 2020. 18. X. Cai, Y. Ren, and X. Zhang, Privacy-Protected Deletable Blockchain, IEEE Access, 8, pp. 6060-6070, 2020. 19. H. Yao, H. Wei, C. Qin, and X. Zhang, An Improved First Quantization Matrix Estimation for Nonaligned Double Compressed JPEG Images, Signal Processing, 170, 107430, 2020. 20. Z. Jin, G. Feng, Y. Ren, and X. Zhang, Feature Extraction Optimization of JPEG Steganalysis Based on Residual Images, Signal Processing, 170, 107455, 2020. 21. Y. Qiu, Z. Qian, H. Zeng, X. Lin, and X. Zhang, Reversible Data Hiding in Encrypted Images Using Adaptive Reversible Integer Transformation, Signal Processing, 167, 2020. 22. J. He, Q. Ying, Z. Qian, G. Feng, and X. Zhang, Semi-structured Data Protection Scheme Based on Robust Watermarking, EURASIP Journal on Image and Video Processing, 12, 2020. 23. S. Li, and X. Zhang, Towards Construction Based Data Hiding: From Secrets to Fingerprint Images, IEEE Trans. on Image Processing, 28(3), pp. 1482-1497, 2019. 24. J. Tao, S. Li, X. Zhang, and Z. Wang, Towards Robust Image Steganography, IEEE Trans. on Circuits and Systems for Video Technology, 29(2), pp. 594-600, 2019. 25. Z. Qian, H. Xu, X. Luo, and X. Zhang, New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on Circuits and Systems for Video Technology, 29(2), pp. 351-362, 2019. 26. C. Qin, Q. Zhou, F. Cao, J. Dong, and X. Zhang, Flexible Lossy Compression for Selective Encrypted Image with Image Inpainting, IEEE Trans. on Circuits and Systems for Video Technology, 29(11), pp. 3341-3355, 2019. 27. D. Ni, G. Feng, L. Shen, and X. Zhang, Selective Ensemble Classification of Image Steganalysis via Deep Q Network, IEEE Signal Processing Letters, 26(7), pp. 1065-1069, 2019. 28. Q. Ying, Z. Qian, X. Zhang, and D. Ye, Reversible Data Hiding with Image Enhancement using Histogram Shifting, IEEE Access, 7, pp. 46506-46521, 2019. 29. Z. Wang, and X. Zhang, Secure Cover Selection for Steganography, IEEE Access, 7, pp. 57857-57867, 2019. 30. Z. Wang, S. Li, and X. Zhang, Towards Improved Steganalysis: When Cover Selection Is Used in Steganography, IEEE Access, 7, pp. 168914-168921, 2019. 31. Y. Wang, L. Kong, Z. Qian, G. Feng, X. Zhang, and J. Zheng, Breaking Permutation-Based Mesh Steganography and Security Improvement, IEEE Access, 7, pp. 183300-183310, 2019. 32. C. Qin, X. Qian, W. Hong, and X. Zhang, An Efficient Coding Scheme for Reversible Data Hiding in Encrypted Image with Redundancy Transfer, Information Sciences, 487, pp. 176-192, 2019. 33. Y. Jia, Z. Yin, X. Zhang, and Y. Luo, Reversible Data Hiding Based on Reducing Invalid Shifting of Pixels in Histogram Shifting, Signal Processing, 163, pp. 238-246, 2019. 34. H. Liang, X. Zhang, and H. Cheng, Huffman-Code Based Retrieval for Encrypted JPEG Images, Journal of Visual Communication and Image Representation, 61, pp. 149-156, 2019. 35. L. Du, W. Zhang, H. Fu, W. Ren, and X. Zhang, An Efficient Privacy Protection Scheme for Data Security in Video Surveillance, Journal of Visual Communication and Image Representation, 59, pp. 347-362, 2019. 36. N. Zhong, Z. Qian, Z. Wang, and X. Zhang, Steganography in Stylized Images, Journal of Electronic Imaging, 28(3), 033005, 2019. 37. X. Zeng, G. Feng, and X. Zhang, Detection of Double JPEG Compression Using Modified Dense Net Model, Multimedia Tools and Applications, 78(7), pp. 8183-8196, 2019. 38. L. Liu, Z. Wang, Z. Qian, X. Zhang, and G. Feng, Steganography in Beautified Images, Mathematical Biosciences and Engineering, 16(4), pp. 2322-2333, 2019. 39. L. Shi, Z. Wang, Z. Qian, N. Huang, P. Puteaux, and X. Zhang, Distortion Function for Emoji Image Steganography, Computers, Materials & Continua, 59(3), pp. 943-953, 2019. 40. Z. Qian, Z. Wang, X. Zhang, and G. Feng, Breaking Steganography: Slight Modification with Distortion Minimization, International Journal of Digital Crime and Forensics, 11(1), pp. 114-125, 2019. 41. Z. Wang, Z. Yin, and X. Zhang, Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation, International Journal of Digital Crime and Forensics, 11(1), pp. 90-99, 2019. 42. C. Wang, J. Ni, X. Zhang, and Q. Huang, Efficient Compression of Encrypted Binary Images Using the Markov Random Field, IEEE Trans. on Information Forensics & Security, 13(5), pp. 1271-1285, 2018. 43. Z. Qian, H. Zhou, X. Zhang, and W. Zhang, Separable Reversible Data Hiding in Encrypted JPEG Bitstreams, IEEE Trans. on Dependable and Secure Computing, 15(6), pp. 1055-1067, 2018. 44. Z. Wang, X. Zhang, and Z. Yin, Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization, IEEE Signal Processing Letters, 25(10), pp. 1530-1534, 2018. 45. F. Li, K. Wu, X. Zhang, J. Lei, and M. Wen, Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition, IEEE Access, 6, pp. 29912-29925, 2018. 46. Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, On Improving Distortion Functions for JPEG Steganography, IEEE Access, 6, pp. 74917-74930, 2018. 47. Y. Qiu, H. He, Z. Qian, S. Li, and X. Zhang, Lossless Data Hiding in JPEG Bitstream Using Alternative Embedding, Journal of Visual Communication and Image Representation, 52, pp. 86-91, 2018. 48. C. Qin, X. Chen, X. Luo, X. Zhang, and X. Sun, Perceptual Image Hashing via Dual-cross Pattern Encoding and Salient Structure Detection, Information Sciences, 423, pp. 284-302, 2018. 49. C. Qin, W. Zhang, F. Cao, X. Zhang, and C.-C. Chang, Separable Reversible Data Hiding in Encrypted Images via Adaptive Embedding Strategy with Block Selection, Signal Processing, 153, pp. 109-122, 2018. 50. H. Yao, C. Qin, Z. Tang, and X. Zhang, A General Framework for Shiftable Position-Based Dual-image Reversible Data Hiding, EURASIP Journal on Image and Video Processing, 41, pp. 1-10, 2018. 51. Z. Qian, L. Pan, N. Huang, and X. Zhang, Constructive Steganography by Tangles, KSII Transactions on Internet and Information Systems, 12(8), pp. 3911-3925, 2018. 52. Z. Qian, N. Huang, S. Li, and X. Zhang, Constructive Steganography Using Texture Synthesis, IETE Technical Review, 35(Sup. 1), pp. 14-22, 2018. 53. S. Li, X. Chen, Z. Wang, Z. Qian, and X. Zhang, Data Hiding in Iris Image for Privacy Protection, IETE Technical Review, 35(Sup. 1), pp. 34-41, 2018. 54. Z. Wang, Z. Yin, and X. Zhang, Distortion Function for JPEG Steganography Based on Image-Texture and Correlation in DCT Domain, IETE Technical Review, 35(4), pp. 351-358, 2018. 55. Q. Wei, Z. Yin, Z. Wang, and X. Zhang, Distortion Function Based on Residual Blocks for JPEG Steganography, Multimedia Tools and Applications, 77(14), pp. 17875-17888, 2018. 其他 |