当前位置: X-MOL首页全球导师 国内导师 › 朱国普

个人简介

教育背景 2007,哈尔滨工业大学,获博士学位 2004,哈尔滨工业大学,获硕士学位 2002,吉林大学,获学士学位 工作经历 2018.06--至今,中科院深圳先进技术研究院,物联网计算研究中心主任、研究员 2016.01--至今,中科院深圳先进技术研究院,研究员 2010.05--2016.01,中科院深圳先进技术研究院,副研究员 2008.08--2010.04,香港城市大学,Research Associate/Senior Research Associate 2007.11--2010.06,中山大学,博士后 荣誉和奖励 2020年,被聘为厦门大学兼职教授 2020年,入选“广东特支计划”科技创新青年拔尖人才 2019年,被聘为哈尔滨工业大学兼职教授 2015年,入选中科院“青年创新促进会”会员(中科院青年人才计划) 2014年,入选IEEE高级会员 2013年,被认定为深圳市“孔雀计划”B类人才 2013年,以通讯作者身份获国际会议IWDW 2013最佳论文奖 科研项目 1)国家自然科学基金面上项目,61872350,图像锐化检测关键技术研究,2019.01-2022.12, 65万元,在研,主持。 2)国家自然科学基金面上项目,61572489,JPEG压缩检测关键技术研究,2016.01-2019.12, 78万元,已结题,主持。 3)国家自然科学基金青年科学基金项目,61003297,面向认证的图像哈希的特征安全性分析,2011.01-2013.12,18万,已结题,主持。 4)国家自然科学基金-广东联合基金重点项目,U1135001,网络媒体内容服务安全理论与关键技术,2012.01-2015.12,260万,已结题,子项目负责人(所分经费为总经费的15%)。 5)中国博士后科学基金项目(一等资助),20080430116,面向认证的组合图像Hash的算法设计及其性能分析,2008.08-2010.05,5万元,已结题,主持 6)中国科学院“青年创新促进会”会员(中国科学院人才类项目),2015299,2015.01-2018.12,60万元,已结题,主持。 7)深圳市基础研究学科布局项目,JCYJ20170818163403748,面向网络可视媒体的数字版权保护技术研究,2018.04-2021.04,200万,在研,主持。

研究领域

多媒体安全;图像处理;机器学习;多智能体系统

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1] J. Yang, Y. Zhang, G. Zhu*, and S. Kwong, “A Clustering-based Framework for Improving the Performance of JPEG Quantization Step Estimation,” IEEE Transactions on Circuits and Systems for Video Technology, Accepted. [2] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Asynchronous Distributed Finite-time H∞ Filtering in Sensor Networks with Hidden Markovian Switching and Two-channel Stochastic Attacks,” IEEE Transactions on Cybernetics, Accepted. [3] C. Gong, G. Zhu*, and P. Shi, “Adaptive event-triggered and double-quantized consensus of leader-follower multi-agent systems with semi-Markovian jump parameters,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, Accepted. [4] F Ding, G Zhu, M Alazab, X Li, and K Yu,“Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets,” IEEE Consumer Electronics Magazine, Accepted. [5] Y.-G. Wang, G. Zhu*, J. Li, M. Conti, and J. Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 1, pp. 76-87, 2021. [6] Z Liu, G Zhu*, F Ding, and S Kwong, “Weighted visual secret sharing for general access structures based on random grids,” Signal Processing: Image Communication, vol. 92, article ID 116129, 2021. [7] F. Ding, H. Wu, G. Zhu*, and Y.-Q. Shi, “METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 12, pp. 4715-4727, 2020. [8] Z. Liu, G. Zhu*, Y.-G. Wang, J. Yang, and S. Kwong, “A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 4, article ID 118, 2020. [9] B. Zhang, G. Zhu*, and Z. Zhu, “A TV-log nonconvex approach for image deblurring with impulsive noise,” Signal Processing, vol. 174, article ID: 107631, 2020. [10] F. Ding, Y. Shi, G. Zhu*, and Y.-Q. Shi, “Real-time estimation for the parameters of Gaussian filtering via deep learning,” Journal of Real-Time Image Processing, vol. 17, no. 1, pp. 17-22, 2020. [11] C. Gong, G. Zhu*, and Y. Shi, “Exponential stability analysis of time-delay systems based on Taylor expansion-based weighted integral inequality,” International Journal of Systems Science, vol. 50, no. 4, pp. 807-816, 2019. [12] Y.-G. Wang, G. Zhu*, and Y.-Q. Shi “Transportation spherical watermarking,” IEEE Transactions on Image Processing, vol. 27, no. 4, pp. 2063-2077, 2018. [13] Y.-G. Wang, G. Zhu*, S. Kwong, and Y.-Q. Shi “A study on the security levels of spread-spectrum embedding schemes in the WOA framework,” IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2307-2320, 2018. [14] C. Gong, G. Zhu*, and P. Shi, “L2−L∞ filtering for stochastic time-varying delay systems based on the Bessel-Legendre stochastic inequality,” Signal Processing, vol. 145, pp. 26-36, 2018. [15] F. Ding, G. Zhu*, W. Dong, and Y.-Q. Shi, “An efficient weak sharpening detection method for image forensics,” Journal of Visual Communication and Image Representation, vol. 50, pp. 93-99, 2018. [16] J. Yang, G. Zhu*, and Y.-Q. Shi, “Analyzing the effect of JPEG compression on local variance of image intensity,” IEEE Transactions on Image Processing, vol. 25, no. 6, pp. 2647-2656, 2016. [17] Y.-G. Wang and G. Zhu*, “An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy,” Information Sciences, vol. 316, pp. 40-53, 2015. [18] J. Yang, G. Zhu*, J. Huang, and X. Zhao, “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, vol. 41, pp. 90-97, 2015. [19] F. Ding, G. Zhu*, J. Yang, J. Xie, and Y.-Q. Shi, “Edge perpendicular binary coding for USM sharpening detection,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 327-331, 2015. [20] J. Yang#, J. Xie#, G. Zhu*, S. Kwong, and Y.-Q. Shi, “An effective method for detecting double JPEG compression with the same quantization matrix,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1933-1942, 2014. [21] J. Yang, G. Zhu*, J. Wang, and Y.-Q. Shi, “Detecting non-aligned double JPEG compression based on refined intensity difference and calibration,” in Proc. 12th Int. Workshop on Digital-forensics and Watermarking (IWDW), Auckland, New Zealand, 2013 (Best Paper Award). [22] G. Zhu, S. Kwong, J. Huang, and J. Yang, “Random Gray code and its performance analysis for image hashing,” Signal Processing, vol. 91, no. 9, pp. 2178-2193, 2011. [23] G. Zhu, J. Huang, S. Kwong, and J. Yang, “Fragility analysis of adaptive quantization-based image hashing,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 133-147, 2010. [24] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Gradient vector flow active contours with prior directional information,” Pattern Recognition Letters, vol. 31, no. 9, pp. 845-856, 2010. [25] G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166-3173, 2010 (ESI Highly Cited Paper; Over 1,200 citations according to Google scholar). [26] G. Zhu, J. Huang, S. Kwong, and J. Yang, “A study on the randomness measure of image hashing,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 928-932, 2009. [27] G. Zhu, S. Zhang, X. Chen, and C. Wang, “Novel gradient vector flow-based balloon force for active contours,” Journal of Electronic Imaging, vol. 18, no. 2, article ID 023007, 2009. [28] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Anisotropic virtual electric field for active contours,” Pattern Recognition Letters, vol. 29, no. 11, pp. 1659-1666, 2008. [29] G. Zhu, S. Zhang, X. Chen, and C. Wang “Efficient illumination insensitive object tracking by normalized gradient matching,” IEEE Signal Processing Letters, vol. 14, no. 12, pp. 944-947, 2007. [30] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Boundary-based image segmentation using binary level set method,” Optical Engineering, vol. 46, no. 5, article ID: 050501, 2007. [31] G. Zhu, Q. Zeng, and C. Wang, “Efficient edge-based object tracking,” Pattern Recognition, vol. 39, no. 11, pp. 2223-2226, 2006.

学术兼职

担任国际期刊副编辑(Associate Editor),包括:(1) Electronics Letters (IET期刊、SCI期刊), (2) Journal of Information Security and Applications(CCF推荐期刊、SCI期刊). 曾担任 (1) 国家自然科学基金项目会议评审专家;(2) 国家重点研发计划项目绩效评审专家;(3) 澳门科学技术发展基金项目通讯评审专家;(4) 中科院国际大科学计划培育专项通讯评审专家。 曾担任多个国际会议技术委员会(TPC)成员,包括:(1) Int. Joint Conf. on Artificial Intelligence (IJCAI), (2) Int. Workshop on Digital-forensics and Watermarking (IWDW), (3) Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), (4) Int. Workshop on Digital Crime and Forensics (IWDCF), (5) Int. Conf. on Machine Learning and Cybernetics (ICMLC). 曾受邀为20余个国际权威期刊审稿,包括: (1) IEEE Trans. on Image Processing, (2) IEEE Trans. on Information Forensics and Security, (3) IEEE Trans. on Circuits and Systems for Video Technology, (4) IEEE Trans. on Multimedia, (5) IEEE Trans. on Systems, Man and Cybernetics: Systems, (6) IEEE Trans. on Industrial Electronics, (7) IEEE Trans. on Cloud Computing, (8) IEEE Signal Processing Letters, (9) IEEE Internet of Things Journal, (10) IEEE Access, (11) Signal Processing, (12) Journal of Information Security and Applications, (13) Discrete and Continuous Dynamical Systems Series B, (14) Neurocomputing, (15) Soft Computing, (16) Signal Processing: Image Communication, (17) Journal of Visual Communication and Image Representation, (18) Circuits, Systems and Signal Processing, (19) Journal of Global Optimization, (20) Optical Engineering, (21) Journal of Electronic Imaging, (22) Information Sciences, (23) EURASIP Journal on Image and Video Processing, (24) IETE Technical Review, (25) The Visual Computer, (26) IET Image Processing等。

推荐链接
down
wechat
bug