研究生培养

黄继武

HUANG JIWU
  • 办公室:
  • 导师类别:博士生导师
  • E-mail:
  • 办公电话:
个人详情

黄继武

工学博士。1962-10出生,我校澳门3044永利特聘教授、博士导师。国家杰出青年科学基金获得者、IEEE Fellow。入选广东省特支计划杰出人才。广东省网络与信息安全产学研创新联盟理事长。分别毕业于西安电子科技大学(电子对抗专业,学士)、清华大学(通信与信息系统专业,硕士)、中国科学院自动化所(模式识别与智能系统专业,博士)。研究兴趣为多媒体取证与安全、信息隐藏。曾主持过包括国家自然科学基金重点项目、国家973课题、国家重点研发计划课题在内的一批科研课题。发表学术论文300多篇,谷歌学术引用20000多次,H-index 75。曾获国家自然科学二等奖(排名第二)、教育部自然科学一等奖(排名第一)、中国计算机学会自然科学一等奖(排名第一)。兼任过IEEE Trans. on Information Forensics and Security AE和本领域重要国际学术会议IEEE WIFS 2014 大会共同主席、IEEE WIFS 2018程序委员会共同主席。

教育

西安电子科技大学电子对抗专业, 工学学士。1982.1

清华大学通信与电子系统专业,工学硕士。1987.12

中科院自动化所模式识别与智能系统专业,工学博士。1998.12

曾任职学术兼职

中山大学教授、信息科学与技术学院院长;教育部信息xxx重点实验室(中山大学)主任、广东省信息安全技术重点实验室(中山大学)主任、广东省智能信息处理重点实验室(我校)主任。

广东省网络与信息安全省部产学研创新联盟理事长(创始);“信息安全”国家重点实验室学术委员会委员。

国家自然科学奖/国家科技进步奖会评专家、国家自然科学基金会评专家/评审组召集人、国家973计划/863计划会评专家

IEEE Trans. on Information Forensics and Security等多种期刊AEIEEE 多媒体取证与安全技术委员会委员;APSIPA(亚太信号与信息处理学会)图像、视频、多媒体技术委员会主席;多个IEEE国际学术会议大会主席、学术委员会主席

学术荣誉

国家杰出青年科学基金获得者, 2003

IEEE Fellow, 2015

广东省“特支计划”杰出人才, 2017

曾主持的主要科研项目

1) NSFC-企业创新联合基金重点项目社交网络虚假媒体内容检测关键技术的研究U19B2022),2020.1-2023.12

2) NSFC-通用技术基础研究联合基金重点项目基于大数据的信息隐藏与对抗技术U1636202),2017.1-2020.12

3) NSFC-广东联合基金重点项目网络媒体内容服务安全理论与关键技术,(U1135001),2012.1-2015.12

4) 国家自然科学基金重点项目数字媒体内容安全关键技术及评测方法的研究60633030)。220万。2007.1-2010.12

5) 国家重点研发计划课题基于免疫的网络动态风险评估与控制技术2020YFB18054042020 .11~2024 10

6) 国家973计划项目课题网络可视媒体安全 2011CB302204, 2011.9-2015.8

7) 国家973计划项目课题基于内容的可视媒体安全2006CB303104),2006.9-2010.8

8) 广东省重点领域研发计划网络信息安全重点专项开放课题面向AI安全的伪造音视频取证分析关键技术,”2019.1~2022.12

9) 阿里巴巴图像篡改检测与定位2020.11.01~2021.10.31

10) 阿里巴巴媒体认证技术认证2017.12~2018.11

科研获奖

可视媒体几何计算的理论与方法。国家自然科学二等奖(第二), 2015

稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一),2004

信息隐藏理论与方法。中国计算机学会科学技术奖自然科学一等奖(第一),  2019

发明专利:

获国家发明专利授权60多件。部分成果在国家有关部门和工业界应用

研究生

培养博士后/博士生40多名、硕士生70多名

论文和学术影响

发表论文350多篇。论文被引用21000多次(google scholar)。H-index: 76

3年发表(录用)的部分论文

[1] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, “CTNet: A convolutional transformer network for color image steganalysis,” Journal of Computer Science and Technology, accepted.

[2] Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. “Detection of deepfake videos using long-distance attention,” IEEE Transactions on Neural Networks and Learning Systems. Accepted

[3] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Secure deep learning framework for moving object detection in compressed video,” IEEE Trans. on Dependable and Secure Computing. Accepted.

[4] Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang, “ReLoc: a restoration-assisted framework for robust image tampering localization,” IEEE Trans. on Information Forensics & Security. vol. 18, pp. 5243-5257, 2023.

[5] Hao-Tian Wu, Xin Cao, Ying Gao, Kaihan Zheng, Jiwu Huang, Jiankun Hu, “Fundus image enhancement based on semi-supervised GAN and anatomical structure preservation,” IEEE Trans. on Emerging Topics in Computational Intelligence. Accepted

[6] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, "CTNet: A Convolutional Transformer Network for Color Image Steganalysis,” Journal of Computer Science and Technology. Accepted

[7] Peijia Zheng, Jiwu Huang, "Non-Interactive Privacy-Preserving Frequent Itemset Mining over Encrypted Cloud Data," IEEE Trans. on Cloud Computing, Accepted

[8] Wei Lu, Jiwu Huang, “Anti-rounding Image Steganography with Separable Fine-tuned Network,” IEEE Trans. on Circuits and Systems for Video Technology. Accepted

[9] Qilin Yin, Wei Lu, Bin Li, Jiwu Huang, “Dynamic difference learning with spatio-temporal correlation for deepfake video detection,” IEEE Trans. on Information Forensics & Security. vol. 18: 4046-4058, 2023.

[10] Wenbo Fang, Junjiang He, Tao Li, Xiaolong Lan, Yang Chen, Wenshan Li, and Jiwu Huang, “Comprehensive Android malware detection based on federated learning architecture,” IEEE Trans. on Information Forensics & Security. vol. 18: 3977-3990, 2023.

[11] Shuanquan Tan, Qiushi Li, Yilin Chen, Bin Li, Jiwu Huang, “STD-NET: search of image steganalytic deep-learning architecture via hierarchical tensor decomposition,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2657-2673, 2023.

[12] Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, and Xiangui Kang, “An adaptive IPM-based HEVC video steganography via minimizing non-additive distortion,” IEEE Trans. on Dependable and Secure Computing. 20(4): 2896-2912, 2023.

[13] Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, and Jiwu Huang, “Adversarial steganography embedding via stego generation and selection,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2375-2389, 2023.

[14] Bingyuan Huang, Sanshuai Cui, Jiwu Huang, and Xiangui Kang, “Discriminative frequency information learning for end-to-end speech anti-spoofing,” IEEE Signal Processing Letters. vol.30, pp. 185-189, Jan., 2023

[15] Weixuan Tang, Bin Li, Weixiang Li, Yuangeng Wang, “Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism,” Science China Information Sciences. vol. 66, 132305:1-14, 2023.

[16] Xianbo Mo, Sunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang, “ReLOAD: using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 18, 1524-1538, 2023

[17] Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang, “Query-efficient adversarial attacks with low perturbation against end-to-end speech recognition systems,” IEEE Trans. on Information Forensics & Security. vol.18, no.1, pp. 351-364, 2023

[18] Weiqi Luo, Jiwu Huang, “Automatic asymmetric embedding cost learning via generative adversarial networks,” ACM MM 2023.

[19] Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang, “Domain-agnostic document authentication against practical recapturing attacks,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 8, pp. 2890-2905, Aug., 2022

[20] Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang, “Document recapture detection based on a unified distortion model of halftone cells,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 7, pp. 2800-2815, July, 2022

[21] Sanshuai Cui, Bingyuan Huang, Jiwu Huang, and Xiangui Kang, “Synthetic speech detection based on local autoregression and variance statistics,” IEEE Signal Processing Letters. vol. 29, no. 7, pp.1462-1466, July, 2022

[22] Yuan Yuan, Gene Cheung, Pascal Frossard, V. H. Zhao, Jiwu Huang, “Landmarking for navigational streaming of stored high-dimensional media,” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5663-5679, Aug., 2022

[23] Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang, “Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5110-5123, Aug., 2022

[24] Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun Q. Shi, “Robust estimation of upscaling factor on double JPEG compressed images,” IEEE Trans. on Cybernetics. vol. 52, no. 10, pp. 10814-10826, Oct., 2022

[25] Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang, “Hybrid deep-learning framework for object-based forgery detection in video.” Signal Processing: Image Communication. vol. 105, 116655, 2022.

[26] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, " Universal Deep Network for Steganalysis of Color Image Based on Channel Representation," IEEE Trans. on Information Forensics and Security, vol. 17, no. 8, pp. 3022-3036, Aug., 2022

[27] Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang, “Self-adversarial training incorporating forgery attention for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol.17, pp.819-834 March 2022

[28] Weixuan Tang, Bin Li, Jin Li, Mauro Barni, Jiwu Huang, “Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge,” IEEE Trans. on. Circuits and Systems for Video. vol.32, no. 6, pp.4081-4095, June 2022

[29] Qiushi Li, Shunquan Tan, Shengda Chen, Bin Li, Jiwu Huang, “One-class double compression detection of advanced videos based on simple Gaussian distribution model,” IEEE Trans. on. Circuits and Systems for Video. 32(4), pp. 2496-2500, Apr. 2022.

[30] Pascal Lefevre, Philippe Carré, Caroline Fontaine, Philippe Gaborit, Jiwu Huang, “Efficient image tampering localization using semi-fragile watermarking and error control codes,” Signal Processing. vol.190, 108342, pp. 1-15, 2022

[31] Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang, “Keyword spotting in the homomorphic encrypted domain using deep complex-valued CNN,” Proc. of ACM Multimedia 2022. accepted.

[32] Shujin Wei, Haodong Li, Jiwu Huang, “Deep video inpainting localization using spatial and temporal traces,” Prof. of IEEE ICASSP 2022.

[33] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Robust privacy-preserving motion detection and object tracking in encrypted streaming video,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 5381-5396, 2021

[34] Minlin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, Jiwu Huang, “A new adversarial embedding method for enhancing image steganography,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 4621-4634, 2021

[35] Lin Zhao, Changsheng Chen, Jiwu Huang, “Deep learning-based forgery attack on document images,” IEEE Trans. on Image Processing. vol. 30, pp. 7964-7979, Sep. 2021

[36] Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang, “MCTSteg: A monte carlo tree search-based reinforcement learning framework for universal non-additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 4306-4320, Sep. 2021.

[37] Peiyu Zhuang, Haodong Li, Shunquan Tan, Bin Li, Jiwu Huang, “Image tampering localization using a dense fully convolutional network,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 2986-2999, 2021

[38] Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang, “CALPA-NET: channel-pruning-assisted deep residual network for steganalysis of digital images,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 131-146, Jan. 2021

[39] Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang, “An automatic cost learning framework for image steganography using deep reinforcement Learning,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 952-967, 2021

[40] Yuangen Wang, Guopu Zhu, Jiwu Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Trans. on Circuits and Systems for Video. vol. 31, no.1, pp. 76-87, Jan. 2021


研究兴趣

多媒体取证、多媒体安全、信息隐藏、多媒体信号处理、模式识别

教授课程

信号与系统、图像信息处理

研究生招生方向

信息与通信工程

研究团队主页

http://media-sec.szu.edu.cn/

近五年主持科研项目清单

1.NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(2012.1-2015.12)(U1135001).

2.国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究”(2007.1-2010.12)(60633030)

3.国家973计划项目“网络媒体智能处理的理论与方法”(2011CB302200)课题4“网络可视媒体安全”(2011CB302204)(2010.1-2014.8)

4.国家973计划项目“可视媒体智能处理的理论与方法”(2006CB303100)课题4“基于内容的可视媒体安全”(2006CB303104)(2006.9-2010.8)

部分期刊论文

1.Shengda Chen, Shunquan Tan, Bin Li, Jiwu Huang, "Automatic Detection of Object-based Forgery in Advanced Video," IEEE Transactions on Circuits and Systems for Video Technology. Accepted

2.Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang, "Reversible Data Hiding in JPEG Image,"IEEE Transactions on Circuits and Systems for Video Technology. Accepted

3.PawełKorus and Jiwu Huang, "Multi-scale fusion for improved localization of malicious tampering in digital images," IEEE Trans. on Image Processing. vol. 25, no.3, pp. 1314-1316

4.Weixuan Tang, Haodong, Li, Weiqi Luo, Jiwu Huang, "Adaptive steganalysis based on embedding probabilities of pixels," IEEE Trans. onInformation Forensics & Security. vol. 11, no.4., pp.734-745, 2016.

5.Weixuan Tang, Bin Li, Weiqi Luo, Jiwu Huang, "Clustering steganographic modification directions for color components," IEEE Signal Processing Letter. vol.23, no.2, pp.197-201, 2016

6.PawełKorus and Jiwu Huang, "Improved tampering localization in digital image forensics based on maximal entropy random walk," IEEE Signal Processing Letter. vol.23, no.1, pp.169-173, 2016

代表性会议论文

1.Qi Yan, Rui Yang, Jiwu Huang, "copy-move detection of audio recording with pitch similarity," Proc.of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

2.Ligang Zheng, Guoping Qiu, Jiwu Huang. Fast and Accurate Nearest Neighbor Search in the Manifolds of Symmetric Positive Definite Matrices. Proc. of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

3.Da Luo, Rui Yang, Jiwu Huang. Detecting double compressed AMR audio using deep learning. Proc. of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

4.Chao Chen, Haodong Li, Weiqi Luo, Rui Yang, Jiwu Huang.Anti-forensics of jpeg detectors via adaptive quantization table replacement. Proc. of 22nd Int. Conf. on Pattern Recognition.

5.Xiaoqing Qiu, Haodong Li, Weiqi Luo and Jiwu Huang. A Universal Image Forensic Strategy Based on Steganalytic Model. Proc. ACM Information Hiding and Multimedia Security Workshop(IH&MMsec) 2014.

6.Weixuan Tang, Haodong Li, Weiqi Luo and Jiwu Huang. Adaptive Steganalysis against WOW Embedding Algorithm. Proc. ACM Information Hiding and Multimedia Security Workshop(IH&MMsec) 2014.

专著

王育民、张彤、黄继武、董庆宽编著。信息隐藏技术——理论与应用。清华大学出版社,ISBN 7302119252. 2006.3

获奖信息

1.稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一),2004

2.可视媒体几何计算的理论与方法。国家自然科学二等奖(第二), 2015

3.Best Student Paper Award, IWDW2008 (Rui Yang, Xiangui Kang, Jiwu Huang. Robust Audio Watermarking Based On Log-polar Frequency Index. IWDW2008), 2008.

4.Best Student Paper Award Nominated. (Ligang Zheng, Guoping Qiu Jiwu Huang, Hao Fu. Salient Covariance For Near-duplicate Image And Video Detection. Prof. of IEEE Int. Conf. on Image Processing, 2585-2588, 2011), 2011

学术服务

Associate Editor, IEEE Trans. on Information Forensics and Security, 2010.8-2014.8

Associate Editor, IEEE Signal Processing, 2016.1~

广东省网络与信息安全省部产学研创新联盟理事长

办公室:N801

电话:2653-0798

E-mail:jwhuang@szu.edu.cn

Baidu
sogou