盧偉(中山大學數據科學與計算機學院教授)

本詞條是多義詞,共36個義項
更多義項 ▼ 收起列表 ▲

盧偉,男,博士,籍貫河南,中山大學數據科學與計算機學院 教授、博士生導師,中山大學數據科學與計算機學院網路空間安全研究所副所長。

基本介紹

  • 中文名:盧偉
  • 畢業院校:上海交通大學
  • 學位/學歷:博士
  • 專業方向:計算機軟體與理論
  • 任職院校:中山大學
人物經歷,研究方向,學術獎勵,學術任職,開設課程,學術成果,科研項目,期刊論文,

人物經歷

2002年7月畢業於東北大學自動化專業,獲工學學士學位;
2005年3月畢業於上海交通大學計算機軟體與理論專業,獲工學碩士學位;
2007年4月畢業於上海交通大學計算機軟體與理論專業,獲工學博士學位(Ph.D);
2005年至2006年於香港理工大學計算學系擔任助理研究員;

研究方向

信息安全與取證、信息隱藏、數字水印、隱私保護;
多媒體大數據安全理論和技術;
雲計算環境下數字媒體安全和分析理論與技術;
圖像/視頻/音頻處理,計算機視覺,機器學習,深度學習,數據挖掘;
人像、步態、語音同一性識別和分析;
聲像資料鑑定技術研究和在公檢法司中的套用;
信息安全、安防理論、技術與系統。
Multimedia security, data hiding, digital forensics
Image/Video intelligent analysis, computer vision, deep learning
Big data security, privacy protection

學術獎勵

上海市科學技術獎(自然科學獎),省部級二等獎,排名第二;
The second prize of Shanghai Natural Science Award
ICICIT最佳學生論文獎(best student paper award)

學術任職

中國圖象圖形學學會數字媒體取證與安全專委會委員
中國圖象圖形學學會交通視頻專委會委員
Associate Editor:
Signal Processing (一區)
Journal of Visual Communication and Image Representation (三區)
International Journal of Digital Crime and Forensics
PC member:
2017&2018&2019 International Workshop on Digital Crime and Forensics
2018 International Conference on Security with Intelligent Computing
2017&2018&2019 International Conference on Cloud Computing and Security

開設課程

統計機器學習(研究生),信息安全數學基礎(組合數學與數論),信號與系統,通信原理,模式識別,人工智慧,密碼學與網路安全

學術成果

科研項目

國家自然科學基金通用聯合基金,“實用型二值圖像信息隱藏理論與方法研究”,負責人
國家自然科學基金(NSFC),“基於模式識別技術的數字圖像盲取證研究”,負責人
國家重點研發計畫,“視頻****(一期)”,子課題負責人
國家重點研發計畫(課題類),“面向****”,子課題負責人
國家級科技融合項目,“面向***”,課題負責人
廣東省重點領域研發計畫,“面向政務大數據套用的隱私保護與對抗關鍵技術和系統研究”,課題負責人
廣東省自然科學基金,“數字圖像篡改檢測理論與方法研究”,負責人
廣東省科技計畫,“實用新穎性圖像信息隱藏檢測系統研究”,負責人
廣州市科學研究計畫重點項目,“面向大數據的數字視像取證關鍵技術與系統研究”,負責人
科技成果轉換計畫,“數字聲像資料鑑別分析系統雲平台研發”,負責人
廣東省武警總隊聯合計畫,“廣東省公安邊防總隊執法辦案場所監控智慧型化管理系統”,負責人
中央高校基本科研業務費基金,“數字圖像區域複製篡改取證新理論和新方法研究”,負責人
中山大學青年教師科研啟動基金,“非負矩陣分解及其在信息安全中的套用研究”,負責人
The International Collaborative Research Grant (ICRG) of Hong Kong,“On the Detection of Fake Images/Videos”,協作人

期刊論文

[38]Wei Lu, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang, Yun-Qing Shi, “Secure Halftone Image Steganography Based on Pixel Density Transition”, IEEE Transactions on Dependable and Secure Computing, 2019. Accepted.
[37]Wei Lu, Ruipeng Li, Lingwen Zeng, Junjia Chen, Jiwu Huang, Yun-Qing Shi, “Binary Image Steganalysis Based on Histogram of Structuring Elements”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted.
[36] Yuileong Yeung, Wei Lu, Yingjie Xue, Jiwu Huang, Yun-Qing Shi, “Secure Binary Image Steganography with Distortion Measurement Based on Prediction”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted.
[35] Xianjin Liu, Wei Lu, Qin Zhang, Jiwu Huang, Yun-Qing Shi, “Downscaling Factor Estimation on Pre-JPEG Compressed Images”, IEEE Transactions on Circuits and Systems for Video Technology, 2019. Accepted
[34] Wei Lu, Liyu He, Ruiliang Yang, Yingjie Xue, Hongmei Liu, “Secure Binary Image Steganography based on Fused Distortion Measurement”, IEEE Transactions on Circuits and Systems for Video Technology, 2018. accepted.
[33] Xianjin Liu, Wei Lu, Wanteng Liu, Shangjun Luo, Yaohua Liang, Ming Li, “Image Deblocking Detection Based on a Convolutional Neural Network”, IEEE Access, vol. 7, no. 1, 2019, pp. 26432-26439
[32] Qin Zhang, Wei Lu, Tao Huang, Shangjun Luo, Zhaopeng Xu, Yaohua Liang, “On the Robustness of JPEG Post-Compression to Resampling Factor Estimation”, Signal Processing, 2019
[31]Honglin Ren, Wei Lu, Bing Chen, “Reversible data hiding in encrypted binary images by pixel prediction”, Signal Processing, vol. 165, Dec. 2019, pp. 268–277.
[30] Wanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang, Jinhua Zeng, Shaopei Shi, Mingzhi Mao, “Secure Halftone Image Steganography with Minimizing the Distortion on Pair Swapping”, Signal Processing, 2019, Accepted.
[29] Bing Chen, Xiaotian Wu, Wei Lu, Honglin Ren, “Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism”, Signal Processing, vol. 164, 2019, pp. 48-57.
[28] Qin Zhang, Huimei Xiao, Fei Xue, Wei Lu, Hongmei Liu, Fangjun Huang, “Digital image forensics of non-uniform deblurring”, Signal Processing: Image Communication, 2019, accepted.
[27] Zhaopeng Xu, Wei Lu, Qin Zhang, Yuileong Yeung, Xin Chen, “Gait Recognition Based on Capsule Network”, Journal of Visual Communication and Image Representation, In press, Available online 14 January 2019
[26] Junhong Zhang, Wei Lu, Xiaolin Yin, Wanteng Liu, Yuileong Yeung, “Binary image steganography based on joint distortion measurement”, Journal of Visual Communication and Image Representation, vol. 58, January 2019, Pages 600-605
[25] Huimei Xiao, Wei Lu, Ruipeng Li, Nan Zhong, Yuileong Yeung, Junjia Chen, Fei Xue, Wei Sun, “Defocus blur detection based on multiscale SVD fusion in gradient domain”, Journal of Visual Communication and Image Representation, Volume 59, February 2019, Pages 52-61
[24] Zhaozhi Xie, Wei Lu, Xianjin Liu, Yingjie Xue, Yuileong Yeung, “Copy-move detection of digital audio based on multi-feature decision”, Journal of Information Security and Applications, vol. 43, pp. 37-46, 2018.
[23] Yingjie Xue, Wanteng Liu, Wei Lu, Yuileong Yeung, Xianjin Liu, Hongmei Liu, “Efficient Halftone Image Stegnography Based on Dispersion Degree Optimization”, Journal of Real-Time Image Processing, 2018. Accepted
[22] Xianjin Liu, Wei Lu, Tao Huang, Hongmei Liu, Yingjie Xue, Yuileong Yeung, “Scaling factor estimation on JPEG compressed images by cyclostationarity analysis”, Multimedia Tools and Applications, 2018. Accepted
[21]Junjia Chen, Wei Lu, “Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix”, Computers, Materials & Continua, 2018
[20]Cong Lin, Wei Lu, “Copy-move forgery detection using combined features and transitive matching”, ICCCS2018.
[19]Xinchao Huang, Zihan Liu, Wei Lu, “Fast and Effective Copy-Move Detection of Digital Audio based on Auto Segment” International Journal of Digital Crime and Forensics, vol. 10, no. 5, 2018.
[18]Ruxin Wang, Wei Lu, Jixian Li, “Digital image splicing detection based on Markov feature in QDCT and QWT domain” International Journal of Digital Crime and Forensics, vol. 10, no. 4, 2018
[17]Jialiang Chen, Wei Lu, Yanmei Fang, “Binary Image Steganalysis based on Local Texture Pattern”, Journal of Visual Communication and Image Representation, 2018
[16]Fengjun Zhang, Wei Lu, Hongmei Liu, Fei Xue, “Natural image deblurring based on L0-regularization and kernel shape optimization”, Multimedia Tools and Applications, 2018, Accepted.
[15]Xin Chen, Jian Weng, Wei Lu, "Multi-gait Recognition based on Attribute Discovery", IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, Accepted.
[14]Xin Chen, Jian Weng, Wei Lu, "Deep Manifold Learning Combined with Convolutional Neural Networks for Action Recognition", IEEE Transactions on Neural Networks and Learning Systems, accepted.
[13]Cong Lin, Wei Lu, Wei Sun, Jinhua Zeng, Tianhua Xu, Jian-Huang Lai, "Region duplication detection based on image segmentation and keypoint contexts", Multimedia Tools and Applications, 2017, Accepted.
[12]Fei Xue, Ziyi Ye, Wei Lu, Hongmei Liu, Bin Li, "MSE period based estimation of first quantization step in double compressed JPEG images", Signal Processing: Image Communication, Vol. 57C, September 2017, pp. 76-83
[11]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei, “Steganalysis of content-adaptive binary image data hiding”, Journal of Visual Communication and Image Representation, Volume 46, July 2017, Pages 119-127.
[10]Fan Yang, Jingwei Li, Wei Lu, Jian Weng, "Copy-move forgery detection based on hybrid features", Engineering Applications of Artificial Intelligence, Volume 59, March 2017, pp. 73-83.
[9]Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng, “Steganalysis with CNN Using Multi-channels Filtered Residuals”, International Conference on Cloud Computing and Security, 2017, Nanjing China, pp 110-120.
[8]Zihan Liu, Wei Lu, “Fast Copy-Move Detection of Digital Audio”, IEEE International Conference on Data Science in Cyberspace (DSC), pp. 26-29 June 2017, Shenzhen, China.
[7]Bingwen Feng, Jian Weng, Wei Lu, “Improved Algorithms for Robust Histogram Shape-Based Image Watermarking”, International Workshop on Digital-Forensics and Watermarking (IWDW 2017), Lecture Notes in Computer Science, vol 10431, pp 275-289, 2017.
[6]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei, “Multiple Watermarking Using Multilevel Quantization Index Modulation”, International Workshop on Digital-Forensics and Watermarking (IWDW 2016), Lecture Notes in Computer Science, vol 10082, pp 312-326, 2017.
[5]Jie Li, Wei Lu, "Blind image motion deblurring with L0-regularized priors", Journal of Visual Communication and Image Representation, Volume 40, Part A, October 2016, pp. 14-23.
[4]Qingbo Zhang, Wei Lu, Jian Weng, "Joint image splicing detection in DCT and Contourlet transform domain", Journal of Visual Communication and Image Representation, Volume 40, Part B, October 2016, Pages 449-458.
[3]馮丙文,翁健,盧偉,基於隱私保護的數字圖像取證外包技術框架研究,網路與信息安全學報,2016年第8期,第23-31頁
[2]Jinhua Zeng, Wei Lu, Rui Yang, Xiulian Qiu, Practical tools for digital image forensic authentication, Advanced Multimedia and Ubiquitous Engineering, LNCS, 2016.4
[1]Jingwei Li, Fan Yang, Wei Lu, Wei Sun, "Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching", Multimedia Tools and Applications, vol. 76, no. 20, 2017, pp. 20483-20497.

相關詞條

熱門詞條

聯絡我們