近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
[1] J. Yang, Y. Zhang, G. Zhu*, and S. Kwong, “A Clustering-based Framework for Improving the Performance of JPEG Quantization Step Estimation,” IEEE Transactions on Circuits and Systems for Video Technology, Accepted.
[2] C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Asynchronous Distributed Finite-time H∞ Filtering in Sensor Networks with Hidden Markovian Switching and Two-channel Stochastic Attacks,” IEEE Transactions on Cybernetics, Accepted.
[3] C. Gong, G. Zhu*, and P. Shi, “Adaptive event-triggered and double-quantized consensus of leader-follower multi-agent systems with semi-Markovian jump parameters,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, Accepted.
[4] F Ding, G Zhu, M Alazab, X Li, and K Yu,“Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets,” IEEE Consumer Electronics Magazine, Accepted.
[5] Y.-G. Wang, G. Zhu*, J. Li, M. Conti, and J. Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 1, pp. 76-87, 2021.
[6] Z Liu, G Zhu*, F Ding, and S Kwong, “Weighted visual secret sharing for general access structures based on random grids,” Signal Processing: Image Communication, vol. 92, article ID 116129, 2021.
[7] F. Ding, H. Wu, G. Zhu*, and Y.-Q. Shi, “METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 12, pp. 4715-4727, 2020.
[8] Z. Liu, G. Zhu*, Y.-G. Wang, J. Yang, and S. Kwong, “A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 4, article ID 118, 2020.
[9] B. Zhang, G. Zhu*, and Z. Zhu, “A TV-log nonconvex approach for image deblurring with impulsive noise,” Signal Processing, vol. 174, article ID: 107631, 2020.
[10] F. Ding, Y. Shi, G. Zhu*, and Y.-Q. Shi, “Real-time estimation for the parameters of Gaussian filtering via deep learning,” Journal of Real-Time Image Processing, vol. 17, no. 1, pp. 17-22, 2020.
[11] C. Gong, G. Zhu*, and Y. Shi, “Exponential stability analysis of time-delay systems based on Taylor expansion-based weighted integral inequality,” International Journal of Systems Science, vol. 50, no. 4, pp. 807-816, 2019.
[12] Y.-G. Wang, G. Zhu*, and Y.-Q. Shi “Transportation spherical watermarking,” IEEE Transactions on Image Processing, vol. 27, no. 4, pp. 2063-2077, 2018.
[13] Y.-G. Wang, G. Zhu*, S. Kwong, and Y.-Q. Shi “A study on the security levels of spread-spectrum embedding schemes in the WOA framework,” IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2307-2320, 2018.
[14] C. Gong, G. Zhu*, and P. Shi, “L2−L∞ filtering for stochastic time-varying delay systems based on the Bessel-Legendre stochastic inequality,” Signal Processing, vol. 145, pp. 26-36, 2018.
[15] F. Ding, G. Zhu*, W. Dong, and Y.-Q. Shi, “An efficient weak sharpening detection method for image forensics,” Journal of Visual Communication and Image Representation, vol. 50, pp. 93-99, 2018.
[16] J. Yang, G. Zhu*, and Y.-Q. Shi, “Analyzing the effect of JPEG compression on local variance of image intensity,” IEEE Transactions on Image Processing, vol. 25, no. 6, pp. 2647-2656, 2016.
[17] Y.-G. Wang and G. Zhu*, “An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy,” Information Sciences, vol. 316, pp. 40-53, 2015.
[18] J. Yang, G. Zhu*, J. Huang, and X. Zhao, “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, vol. 41, pp. 90-97, 2015.
[19] F. Ding, G. Zhu*, J. Yang, J. Xie, and Y.-Q. Shi, “Edge perpendicular binary coding for USM sharpening detection,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 327-331, 2015.
[20] J. Yang#, J. Xie#, G. Zhu*, S. Kwong, and Y.-Q. Shi, “An effective method for detecting double JPEG compression with the same quantization matrix,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1933-1942, 2014.
[21] J. Yang, G. Zhu*, J. Wang, and Y.-Q. Shi, “Detecting non-aligned double JPEG compression based on refined intensity difference and calibration,” in Proc. 12th Int. Workshop on Digital-forensics and Watermarking (IWDW), Auckland, New Zealand, 2013 (Best Paper Award).
[22] G. Zhu, S. Kwong, J. Huang, and J. Yang, “Random Gray code and its performance analysis for image hashing,” Signal Processing, vol. 91, no. 9, pp. 2178-2193, 2011.
[23] G. Zhu, J. Huang, S. Kwong, and J. Yang, “Fragility analysis of adaptive quantization-based image hashing,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 133-147, 2010.
[24] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Gradient vector flow active contours with prior directional information,” Pattern Recognition Letters, vol. 31, no. 9, pp. 845-856, 2010.
[25] G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166-3173, 2010 (ESI Highly Cited Paper; Over 1,200 citations according to Google scholar).
[26] G. Zhu, J. Huang, S. Kwong, and J. Yang, “A study on the randomness measure of image hashing,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 928-932, 2009.
[27] G. Zhu, S. Zhang, X. Chen, and C. Wang, “Novel gradient vector flow-based balloon force for active contours,” Journal of Electronic Imaging, vol. 18, no. 2, article ID 023007, 2009.
[28] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Anisotropic virtual electric field for active contours,” Pattern Recognition Letters, vol. 29, no. 11, pp. 1659-1666, 2008.
[29] G. Zhu, S. Zhang, X. Chen, and C. Wang “Efficient illumination insensitive object tracking by normalized gradient matching,” IEEE Signal Processing Letters, vol. 14, no. 12, pp. 944-947, 2007.
[30] G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Boundary-based image segmentation using binary level set method,” Optical Engineering, vol. 46, no. 5, article ID: 050501, 2007.
[31] G. Zhu, Q. Zeng, and C. Wang, “Efficient edge-based object tracking,” Pattern Recognition, vol. 39, no. 11, pp. 2223-2226, 2006.
学术兼职
担任国际期刊副编辑(Associate Editor),包括:(1) Electronics Letters (IET期刊、SCI期刊), (2) Journal of Information Security and Applications(CCF推荐期刊、SCI期刊).
曾担任 (1) 国家自然科学基金项目会议评审专家;(2) 国家重点研发计划项目绩效评审专家;(3) 澳门科学技术发展基金项目通讯评审专家;(4) 中科院国际大科学计划培育专项通讯评审专家。
曾担任多个国际会议技术委员会(TPC)成员,包括:(1) Int. Joint Conf. on Artificial Intelligence (IJCAI), (2) Int. Workshop on Digital-forensics and Watermarking (IWDW), (3) Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), (4) Int. Workshop on Digital Crime and Forensics (IWDCF), (5) Int. Conf. on Machine Learning and Cybernetics (ICMLC).
曾受邀为20余个国际权威期刊审稿,包括: (1) IEEE Trans. on Image Processing, (2) IEEE Trans. on Information Forensics and Security, (3) IEEE Trans. on Circuits and Systems for Video Technology, (4) IEEE Trans. on Multimedia, (5) IEEE Trans. on Systems, Man and Cybernetics: Systems, (6) IEEE Trans. on Industrial Electronics, (7) IEEE Trans. on Cloud Computing, (8) IEEE Signal Processing Letters, (9) IEEE Internet of Things Journal, (10) IEEE Access, (11) Signal Processing, (12) Journal of Information Security and Applications, (13) Discrete and Continuous Dynamical Systems Series B, (14) Neurocomputing, (15) Soft Computing, (16) Signal Processing: Image Communication, (17) Journal of Visual Communication and Image Representation, (18) Circuits, Systems and Signal Processing, (19) Journal of Global Optimization, (20) Optical Engineering, (21) Journal of Electronic Imaging, (22) Information Sciences, (23) EURASIP Journal on Image and Video Processing, (24) IETE Technical Review, (25) The Visual Computer, (26) IET Image Processing等。