康顯桂,男,博士,中山大學計算機學院教授,博士導師,兼任廣東省信息安全重點實驗室副主任。先後畢業於北京大學、南京大學、中山大學,並取得學士、碩士、博士學位。美國大學博士後和訪問學者經歷。廣東省優秀博士論文獲得者、多次國際會議最佳論文獲得者、IEEE期刊編委。
多年從事信息取證、 信息隱藏、區塊鏈等信息安全方面的研究,主持各類科研項目20多項,包括主持國家自然科學基金面上以上項目5項、國家重點研發計畫課題2項、廣東省自然科學基金重點項目1項,作為骨幹成員參加國家973計畫項目、國家自然科學基金重點項目和國家自然科學基金-廣東省聯合基金重點項目等多項,在數字多媒體信息安全方向發表論文100多篇(章),在IEEE/ACM Transactions和CCF A類等權威期刊上以第一作者/通訊作者發表20多篇論文,獲得本領域國際學術會議論文最佳獎3項,作為骨幹成員獲教育部提名國家科學技術獎自然科學一等獎1 項,已經獲得相關專利授權10項,研究成果Google學術被引用次數3000多次。在加拿大蒙特婁舉行的2017年IEEE GlobalSIP盛會上做了深度學習與信息安全方面的傑出演講(Distinguished Talk)和2019年本領域重要國際會議International Workshop on Digital-Forensics and Watermarking (IWDW)上作主旨演講,且研究成果獲得本領域重要國際會議International Workshop on Digital-Forensics and Watermarking (IWDW)的2008年、2013年及2018年共三次最佳論文獎。
基本介紹
- 中文名:康顯桂
- 畢業院校:中山大學
- 學位/學歷:博士
- 職業:教師
- 職務:中山大學博士導師
- 職稱:中山大學計算機學院教授
研究領域
人物經歷
工作經歷
海外經歷
人物任職
教授課程
獲獎記錄
- 獲得本領域重要國際會議IWDW 2013的最佳學生論文獎 (Best Student Paper Award,論文通訊作者):Hui Zeng, 康顯桂*, “Camera Source Identification Game with incomplete information” in Proc. of International Workshop on Digital-forensics and Watermarking, IWDW 2013, 2013/10/01-2013/10/03, Auckland, New Zealand, 2013;
- 獲得本領域重要國際會議IWDW 2008的最佳學生論文獎 (Best Student Paper Award,論文通訊作者):Rui Yang, 康顯桂*, Jiwu Huang. "Robust Audio Watermarking Based On Log-polar Frequency Index", in Proc. of International Workshop on Digital-forensics and Watermarking, IWDW 2008, Busan, Korea, 2008;
- 穩健數字水印方法,教育部提名國家科學技術獎自然科學一等獎;
- 2005年廣東省優秀博士論文獎;
- 獲得本領域重要國際會議IWDW 2018的最佳論文獎 (Best Paper Award,論文通訊作者):Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun Q. Shi, “Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis,” in 17th Proc. of International Workshop on Digital-forensics and Watermarking, IWDW 2018, 2018/10/22 - 2018/10/24, Jeju, Korea, 2018;
- 獲得環太平洋國家信號與信息處理協會(APSIPA)2018年傑出講者獎(distinguished lecturer);
- 陳藝芳,康顯桂等的論文報告“ Automated Design of Neural Network Architectures with Reinforcement Learning for Detection of Global Manipulations”獲得第一屆中國圖像圖形學會中國媒體取證與安全大會最佳論文報告獎。
代表性論著
- J. Wang, X. Yin, J. Huang, X. Kang*, “An Adaptive IPM-based HEVC Video Steganography via Minimizing Non-additive Distortion", IEEE Transactions on Dependable and Secure Computing(CCF A), vol. 18, no. 4, pp. 1~18,2022.
- B. Huang, S. Cui, J. Huang, X. Kang*, Discriminative Frequency Information Learning for End-to-End Speech Anti-spoofing, IEEE Signal Processing Letters, accepted. 2023
- S. Cui, B. Huang, J. Huang, X. Kang*, “Synthetic Speech Detection Based on Local Autoregression and Variance Statistics,” IEEE Signal Processing Letters, Vol. 27, 2022.
- J. Yu, Y. He, Q. Yan, X. Kang*, "SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation," IEEE Transactions on Information Forensic and Security(CCF A), vol. 16, pp. 5093-5107, 2021.
- J. Yang, D. Ruan, J. Huang, X. Kang*, Y. Q. Shi, “An embedding cost learning framework using GAN,” IEEE Transactions on Information Forensic and Security(CCF A), vol. 15, pp. 839-851, 2020.
- Y. Chen, Z. Wang, X. Kang*, Z. J. Wang, Automated Design of Neural Network Architectures with Reinforcement Learning for Detection of Global Manipulations, IEEE Journal of Selected Topics in Signal Processing(中科院一區期刊), vol. 14, no. 5, , pp. 997~1011, Aug. 2020.
- X. Lin, X. Kang*, “Robust electricnetwork frequency estimation with rank reduction and linear prediction,” ACM Transactions on Multimedia Computing Communications and Applications, vol.14, No.4, Article 84, 2018.
- H. Zeng, J. Liu, J. Yu, X. Kang*, Z. J. Wang, Y. Q. Shi, “A framework of camera source identification Bayesian game,” IEEE Transactions on Cybernetics(中科院一區期刊), vol. 47, no.7, pp. 1757-1768, Jul. 2017.
- X. Lin, J. Liu, X. Kang*, “Audio recapture detection with convolutional neural networks,” IEEE Transactions on Multimedia(CCF A), vol.18, no.8, pp. 1480~1487, Aug. 2016.
- X. Kang, M. C. Stamm, A. Peng, K. J. R. Liu, “Robust median filtering forensics using an autoregressive model,” IEEE Transactions on Information Forensic and Security(CCF A), vol. 8, no. 9, pp. 1456-1468, Sept. 2013.
- X. Kang, Y. Li, Z. Qu, J. Huang, “Enhancing source camera identification performance with a camera reference phase sensor pattern noise,” IEEE Transactions on Information Forensic and Security(CCF A), vol. 7, no. 2, pp. 393-402, Apr. 2012.
- X. Kang, J. Huang, W. Zeng, “Efficient general print-scanning resilient data hiding based on uniform log-polar mapping,” IEEE Transactions on Information Forensic and Security(CCF A), vol. 5, no. 1, pp. 1-12, Mar. 2010.
- X. Kang, R. Yang, J. Huang, “Geometric invariant audio watermarking based on an LCM feature,” IEEE Transactions on Multimedia(CCF A), vol.13, no.2, pp.181-190, Apr. 2011.
- X. Kang, J. Huang, Y. Q. Shi, Y. Lin, “A DWT-DFT composite watermarking scheme robust to affine transform and JPEG compression,” IEEE Transactions on Circuit and System for Video Technology, vol. 13, no. 8, pp. 776-786, Aug. 2003.
- X. Kang, J. Huang, W. Zeng, “Improving robustness of quantization-based image watermarking via adaptive receiver,” IEEE Transactions on Multimedia(CCF A), vol. 10, no. 6, pp. 953-959, Oct. 2008.
- J. Chen, X. Kang*, Y. Liu, Z. J. Wang, “Median filtering forensics based on convolutional neural networks,” IEEE Signal Processing Letters, vol. 22, no.11, pp. 1849-1853, Nov. 2015.(高被引論文。代碼: https://github.com/XianguiKang/Media-Filtering-Forensics_DL)
- D. Lin, Y. Wang, W. Tang, X. Kang, “Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning,” IEEE Signal Processing Letters, vol. 29, no. 6, pp. 2557-2561, 2022.
- X. Kang, J. Huang, “Non-ambiguity of blind watermarking: a revisit with analytical resolution,” Science in China: Series F, vol. 52, no.2, pp. 267-285, Feb. 2009. (CCF A)
- H. Zeng, J. Yu, X. Kang*, S. Lyu, “Countering JPEG anti-forensics based on noise level estimation,” Science in China: Series F, vol. 61, no. 3, Article 032103, Mar. 2018. (CCF A)
- 彭安傑, 曾輝, 康顯桂*, “基於多方向差分的重採樣取證技術,” 中國科學: 信息科學, vol. 46, pp. 627-642, 2016. (CCF A)
- 彭安傑, 康顯桂*, “基於濾波殘差多方向差分的中值濾波取證技術,” 計算機學報, vol. 39, no. 3, pp. 503-515, 2016. (CCF A)
- 康顯桂, 黃繼武, 曾文軍, 施雲慶, “數字媒體水印非協定模糊性,” 中國科學(F輯:信息科學), vol. 39, no. 04, pp. 397-404, 2009. (CCF A)
- 趙慧明, 康顯桂, 黃繼武, “基於非對稱數據結構實現信息隱藏通信的方法研究,” 電子學報, vol. 37, no. 6, pp. 1362-1366, 2009. (國內一級期刊)
- 楊群生, 黃繼武, 康顯桂, 王舟, “圖像處理中直方圖加權濾波,” 電子學報, vol. 32, no. 7, pp. 1108-1111, 2004. (國內一級期刊)
- 康顯桂, 黃繼武, 林彥, 楊群生, “抗仿射變換的擴頻圖象水印算法,” 電子學報, vol. 32, no. 1, pp. 8-12, 2004. (國內一級期刊)
- 康顯桂, 黃繼武, “對幾何變換魯棒的圖像水印算法,” 自動化學報, vol. 29, no. 5, pp. 709-715, 2003. (國內一級期刊)
- Y. Lan, F. Shang, J. Yang, X. Kang*, E. Li “Robust Image Steganography: Hiding Messages in Frequency Coefficients", The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI, CCF A), Washington DC, USA, Feb. 7 - 14, 2023.
- A. Luo, E.Li, Y.Liu, X. Kang* and Z. J. Wang, “A CAPSULE NETWORK BASED APPROACH FOR DETECTION OF AUDIO SPOOFING, ATTACKS,” in proc. of International Conference on Acoustics, Speech, and Signal Processing 2021 (ICASSP 2021), pp. 6059 ~ 6063, Toronto, ON, Canada, 6~11 June 2021. (語音音頻信號處理領域頂級會議)
- X. Jia, J. Wang, Y. Liu, X. Kang*, Y. Q. Shi, “A LAYERED EMBEDDING-BASED SCHEME TO COPE WITH INTRA-FRAME DISTORTION DRIFT IN IPM-BASED HEVC STEGANOGRAPHY,” in proc. of International Conference on Acoustics, Speech, and Signal Processing 2021 (ICASSP 2021), pp. 2720~2724, Toronto, ON, Canada, 6~11 June 2021.
- J. Yang, H. Zheng, X. Kang*, Y. Q. Shi, “Approaching optimal embedding in audio steganography with GAN,” in proc. of International Conference on Acoustics, Speech, and Signal Processing 2020 (ICASSP 2020), Barcelona, Spain, 2020-5-02 to 2020-05-04. (CCF B)
- Y. Wei, Y. Chen, X. Kang*, Z. J. Wang, L. Xiao, “Auto-generating neural networks with reinforcement learning for multi-purpose image forensics," in proc. of IEEE International Conference on Multimedia and Expo 2020 (ICME 2020), London, UK, 2020-7-06 to 2020-7-10. (CCF B)
- S. Cui, E. Li, X. Kang*, “Autoregressive model based smoothing forensics of very short speech clips,” in proc. of IEEE International Conference on Multimedia and Expo 2020 (ICME 2020), London, UK, 2020-7-06 to 2020-7-10. (CCF B)
- Y. Chen, Z. Lyu, X. Kang*, Z. J. Wang, “A rotation-invariant convolutional neural network for image enhancement forensics,” in proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 2018 (ICASSP 2018), Calgary, Canada, 2018-4-15 to 2018-4-20. (CCF B)
- H. Zheng, X. Li, D. Ruan, X. Kang*, Y.-Q. Shi, “Comparison of DCT and Gabor filters in residual extraction of CNN based JPEG steganalysis,” in proc. of 17th International Workshop on Digital-forensics and Watermarking (IWDW 2018), Jeju, Korea, 2018-10-22 to 2018-10-24. (Best Paper Award)
- X. Lin, X. Kang*, “Supervised audio tampering detection using an autoregressive model,” in proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 2017 (ICASSP 2017), New Orleans, USA, 2017-3-5 to 2017-3-9. (CCF B)
- H. Zeng, X. Kang*, “Countering anti-forensics of median filtering,” in proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 2014 (ICASSP 2014), Florence, Italy, 2014-5-4 to 2014-5-9. (CCF B)
- Z. Qu, X. Kang*, J. Huang, Y. Li, “Forensic sensor pattern noise extraction from large image dataset,” in proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 2013 (ICASSP 2013), Vancouver, Canada, 2013-5-26 to 2013-5-31. (CCF B)
- H. Zeng, X. Kang*, “Camera source identification game with incomplete information,” in proc. of International Workshop on Digital-forensics and Watermarking 2013 (IWDW 2013), Auckland, New Zealand, 2013-10-01 to 2013-10-03. (Best Student Paper)
- X. Kang, X. Xu, A. Peng, W. Zeng, “Scalable lossy compression for pixel-value encrypted images,” in proc. of IEEE Data Compression Conference 2012 (DCC 2012), Snowbird, Utah, USA, 2012-4-10 to 2012-4-12. (CCF B)
- R. Yang, X. Kang*, J. Huang. “Robust audio watermarking based on log-polar frequency index,” in proc. of International Workshop on Digital-forensics and Watermarking 2008 (IWDW 2008), Busan, Korean, 2008-11-10 to 2008-11-12 (Best Student Paper).