当前位置: X-MOL首页全球导师 国内导师 › 田晖

个人简介

招生专业:① 计算机科学与技术\软件工程(学硕);②电子信息(计算机技术、专硕、全日制\非全日制)③ 智能检测(博士研究生). 博士,教授,博士生、硕士生导师,现任计算机学院副院长、厦门市数据安全与区块链技术重点实验室主任。2010年12月获华中科技大学计算机系统结构专业博士学位,其中2007年和2008年在清华大学电子系从事访问研究;2010年12月起在华侨大学计算机科学与技术学院从事教学与科研工作,2012年9月遴选为硕士生导师,2014年1月晋升副教授,2017年6月试聘教授,2017年12月破格晋升教授,2020年7月遴选为博士生导师;2016年11月至2019年6月任网络与信息安全系主任;2016年2月至2017年2月获国家公派在新加坡国立大学(National University of Singapore)计算机学院从事访问研究。 近年来,主持国家自然科学基金项目4项(含促进海峡两岸科技合作联合基金重点项目子课题一项),福建省自然科学基金项目3项,福建省教育厅中青年教育科研项目1项,华侨大学中央科研业务费项目1项;作为主要技术骨干参与国家自然科学基金项目、福建省产学研重大项目、福建省重点科技计划项目等课题10余项;先后入选首批华侨大学中青年教师科技创新人才资助计划、厦门市重点人才、福建省高校杰出科研人才培育计划项目、福建省高校新世纪优秀人才支持计划。在国内外著名期刊和知名学术会议上发表学术论文80余篇,其中SCI检索40余篇次,EI检索70余篇次;申请发明专利35项(获得授权20项),获得软件著作权4项;参与编写专著1项,编写教材1项。曾荣获第二届中国青少年科技创新奖(个人),中国电子学会科学技术奖二等奖(2013),厦门市第七届自然科学优秀学术论文一等奖(2012),泉州市第八届自然科学优秀学术论文一等奖(2014),福建省第十一届自然科学优秀学术论文二等奖(2014),2012-2014学年度华侨大学优秀教师称号(2014)及2014-2016学年度华侨大学科研先进个人(2016)。 ※主要科研项目: 国家自然科学基金面上项目、61972168、基于深度学习和信息融合的网络语音流信息隐藏通用检测理论与方法、2020.01-2023.12、主持、在研。 武汉光电国家研究中心开放课题基金项目、2018WNLOKF009、基于区块链的云存储安全审计研究、2019.01-2021.12、主持、在研。 信息安全国家重点实验室开放课题基金项目、2019-ZD-09、面向5G语音通信的隐写及其检测技术、2019.01-2020.12、主持、在研。 国家自然科学基金(NSFC-通用技术基础研究联合基金)、U1536115、基于即时通讯的隐蔽信道快速检测理论与方法、2016.01-2018.12、主持、已结题。 国家自然科学基金(促进海峡两岸科技合作联合基金)重点项目、U1405254、云数据安全审计的理论模型与新方法研究、2015/01-2018/12、子课题主持、已结题。 福建省自然科学基金面上项目、2018J0109、面向企业级云存储的数据安全审计技术研究、2018.01-2020.12、主持、在研。 国家自然科学基金青年项目、61302094、面向网络流媒体隐蔽通信的非均衡隐写方法研究、2014/01-2016/12、主持、已结题。 福建省自然科学基金面上项目、2014J01238、基于网络流媒体的非均衡多维隐蔽通信技术研究、2014.01-2015.12、主持、已结题。 ※主要发明专利: [1]. 田晖, 郭舒婷, 刘进, 陈永红, 黄永峰, 陈维斌, 陈锻生. 一种面向IP语音的最低有效位分级隐写方法,中国发明专利, 授权时间:2017年2月22日,专利号:ZL201410227422.2. [2]. 田晖, 卢璥, 郭舒婷, 秦界, 刘进, 黄永峰, 陈永红, 陈维斌, 陈锻生. 一种基于速率调制的IP语音隐写方法,中国发明专利,授权时间:2017年3月1日,专利号:ZL201410295357.7. [3]. 田晖, 郭舒婷, 秦界, 卢璥, 刘进, 黄永峰, 陈永红, 陈维斌, 陈锻生. 一种基于最佳相似度匹配的IP语音隐写方法,中国发明专利,授权时间:2017年4月5日,专利号:ZL201410431440.2. [4]. 田晖, 吴彦鹏, 卢璥, 黄永峰, 陈永红, 王田, 蔡奕侨, 刘进. 一种基于比特组合的低速率语音最低有效位隐写检测方法,中国发明专利, 授权时间:2018年3月9日,,专利号: ZL201410743434.0. [5]. 周可, 田晖, 刘进. 基于流加密的IP语音隐蔽通信方法,中国发明专利,授权时间:2010年12月,专利号:ZL2009100 60498.X. [6]. 周可, 田晖, 刘进. 基于m序列的IP语音隐蔽通信方法,中国发明专利,授权时间:2010年12月,专利号:ZL200910060 499.4. [7]. 王田, 苏耕民, 钟必能, 陈永红, 蔡奕侨, 田晖, 王成. 一种行车跟随方法和系统,中国发明专利, 授权时间:2018年5月, ZL201510236744.8. [8]. 陈永红,王珊,田晖,王田,蔡奕侨.一种基于网络流水印的网络主动追踪方法及系统,中国发明专利,专利号: ZL201510386446.7,授权日期:20180525. [9]. 陈永红,蒋堃,侯雪艳,王珊,陈欣,田晖,王田,蔡奕侨.一种多级负载预测与云资源弹性配置方法与监控配置系统,中国发明专利,专利号: ZL201510043131.2, 授权日期:20180417. [10]. 田晖, 董浩,卢璥,陈永红,王田,蔡奕侨.一种基于网络拓扑结构图的隐写方法,中国发明专利,专利申请号:201710711957.0,公开(公告)号 : CN107612678A,公开(公告)日: 2018.01.19. [11]. 田晖, 董浩, 卢璥, 杜勇前, 陈永红, 王田, 蔡奕侨. 一种基于Visio网络拓扑结构图自生成的隐写方法, 中国发明专利,专利申请号:201710711957.0. [12]. 田晖,陈文琪,卢璥,陈永红,王田,蔡奕侨. 一种云存储服务中多副本数据的公开审计方法,专利申请号:201810015840.3,公开(公告)号 : CN108229208A,公开(公告)日 : 2018.06.29. [13]. 陈永红,郭伟鹏,田晖,王田,蔡奕侨.一种基于云计算的入侵检测方法与系统,中国发明专利,申请号: CN201510870283.X,公开(公告)号: CN105376251A. [14]. 陈永红,侯雪艳,田晖,王田,蔡奕侨.一种基于双重冗余的主动网络流数字水印方法,中国发明专利,申请号: CN201510703425.3,公开(公告)号: CN105404797A. [15]. 陈永红,侯雪艳,田晖,王田,蔡奕侨.一种利用信息熵和哈希函数进行网络数据流零水印提取的方法,中国发明专利,申请号: CN201510701787.9,公开(公告)号: CN105429940A. [16]. 陈永红,蒋堃,侯雪艳,田晖,王田,蔡奕侨.一种云计算系统的能效监控和管理方法与系统,中国发明专利,申请号: CN201410335946.3,公开(公告)号: CN104113596A. [17]. 陈永红,蒋堃,侯雪艳,田晖,王田,蔡奕侨.一种私有云的云监控系统及方法,中国发明专利,申请号: CN201410481851.2,公开(公告)号: CN104301389A. [18]. 王田,钟必能,王成,陈永红,田晖,蔡奕侨, 吴尤可.一种基于UDP传输实现监控功能的应用层协议,中国发明专利,申请号: CN201510008776.2,公开(公告)号: CN104580212A. [19]. 王田,董宇,蔡奕侨,陈永红,田晖.一种移动循迹监控系统,中国发明专利,申请号: CN201410647822.9,公开(公告)号: CN104378591A. [20]. 王田,蔡奕侨,钟必能,陈永红,田晖,张国亮.一种轻量级的多方会议混音方法和装置,中国发明专利,申请号: CN201410414450.5,公开(公告)号: CN104167210A. ※软件著作权: [1]. 田晖,陈航宇,陈剑.基于海量多媒体信息隐藏的安全存储系统V1.0,计算机软件著作权,登记号: 2015SR001049. [2]. 田晖,赖跃进,丁殿成,陈钊懿,秦界,雷丽楠,陈翼红,丁左丞.面向智能手机的安全短消息通信及管理系统[简称:MI信] V1.0,计算机软件著作权,登记号: 2015SR079588. [3]. 田晖,陈航宇,陈剑.基于“移动终端—个人计算机”的开放资源共享平台V1.0,计算机软件著作权,登记号: 2014SR138547. [4]. 田晖,李新宇,祝峰,任昆鹏,常宽.基于可信第三方的云数据安全审计系统CloudAudit V1.0,计算机软件著作权,登记号: 2017SR502638.

研究领域

网络与信息安全、人工智能安全、区块链、云计算安全、多媒体内容安全、数字隐写及分析、数字取证等.

主要从事网络与信息安全、人工智能安全、区块链、云计算安全、多媒体内容安全、数字隐写及分析、数字取证等方面的研究工作。

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1]. Hui Tian*, Fulin Nan, Hong Jiang, Chin-Chen Chang, Jianting Ning, Yongfeng Huang. Public Auditing for Shared Cloud Data with Efficient and Secure Group Management. Information Sciences, 2019, 472: 107-125. (SCI & EI, IF2018 = 4.305, SCI 2区/小类1区) [2]. Wenqi Chen, Hui Tian*, Chin-Chen Chang, Fulin Nan, and Jing Lu. Adjacency-Hash-Table based Public Auditing for Data Integrity in Mobile Cloud Computing, Wireless Communications and Mobile Computing, Vol. 2018, Article ID 3471312, 12 pages, DOI: 10.1155/2018/3471312. (SCI & EI, IF2018= 0.869, SCI 4区) [3]. Jie Liu, Hui Tian*, Chin-Chen Chang, Tian Wang, Yonghong Chen and Yiqiao Cai. Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test, Symmetry, 2018, 10, 336, DOI: 10.3390/sym10080336. (SCI & EI, IF2018= 1.256, SCI 4区) [4]. Hui Tian*, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, Yonghong Chen. Public Auditing for Trusted Cloud Storage Services, IEEE Security & Privacy, 2019, 17(1), DOI: 10.1109/MSEC.2018.2875880. (SCI & EI, IF2017= 1.382) [5]. Hui Tian*, Jun Sun, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen. Detecting Bitrate Modulation Based Covert Voice-over-IP Communication, IEEE Communications Letters, 2018, 22(6): 1196-1199. (SCI & EI, IF2018= 2.723, SCI 3区) [6]. Hui Tian*, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen.Public Audit for Operation Behavior Logs With Error Locating In Cloud Storage, Soft Computing, DOI:10.1007/s00500-018-3038-8, Feb. 2018. (SCI & EI, IF2018= 2.367, SCI 3区) [7]. Hui Tian*, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage, IEEE Transactions on Services Computing. 2017, 10(5): 701-714. (IF2017= 3.520, SCI 2区(大类)/1区(小类), TOP期刊) [8]. Hui Tian*, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu. Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs, Signal Processing, 2017, 134C: 9-22. (SCI & EI, IF2017= 3.110, SCI 2区) [9]. Hui Tian*, Jun Sun, Chin-Chen Chang, Jie Qin and Yonghong Chen. Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation, IEEE Communications Letters, 2017, 21(4): 749-752. (SCI & EI, IF2017= 1.988, SCI 3区) [10]. Hui Tian*, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu. Distributed Steganalysis of Compressed Speech, Soft Computing, 2017, 21(3): 795-804. (SCI & EI, IF2017= 2.472, SCI 3区) [11]. Hui Tian*, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang. Enabling Public Auditability for Operation Behaviors in Cloud Storage, Soft Computing, 2017, 21(8): 2175-2187. (SCI & EI, IF2017= 2.472, SCI 3区) [12]. Hui Tian*, Jun Sun, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai. Detecting Steganography of Adaptive Multi-Rate Speech with Unknown Embedding Rate, Mobile Information Systems, vol. 2017, article no. 5418978, 18 pages, 2017. (SCI & EI, IF2016= 1.462, SCI 3区) [13]. Hui Tian*, Jie Qin, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen. Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography, Journal of Internet Technology, 2017, 18(3): 99-107. (SCI & EI,IF2017= 1.930, SCI 4区) [14]. Hui Tian*, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen and Yiqiao Cai. Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics, Security and Communication Networks, 2016, 9(15): 2934-2944. (SCI & EI, IF2016= 0.72,SCI 4区) [15]. Hui Tian*, Jie Qin, Yongfeng Huang, Yonghong Chen,Tian Wang, Jin Liu, Yiqiao Cai. Optimal Matrix Embedding for Voice-over-IP Steganography, Signal Processing, 2015, 117: 33–43. (SCI & EI, IF = 2.238,SCI3区) [16]. Hui Tian*, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu,Tian Wang, Yonghong Chen, Yiqiao Cai. Improved Adaptive Partial-Matching Steganography for Voice over IP, Computer Communications, 2015, 2015, 70(c): 95-108. (SCI & EI, IF = 1.695,SCI3区) [17]. Hui Tian*, Jin Liu, Songbin Li. Improving Security of Quantization-Index-Modulation Steganography in Low Bit-rate Speech Streams, Multimedia Systems, 2014, 20(2): 143-154. (SCI & EI, IF = 0.876,SCI4区) [18]. Hui Tian*, Hong Jiang, Ke Zhou, Dan Feng. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography, The Computer Journal (Oxford University Press), 2012, 55(6): 702 − 716. (CCF B类期刊,SCI&EI, IF = 1.181, SCI3区,该论文获第十一届福建省自然科学优秀学术论文二等奖) [19]. Hui Tian*, Hong Jiang, Ke Zhou, Dan Feng. Adaptive Partial-Matching Steganography for Voice over IP Using Triple M Sequences, Computer Communications, 2011, 34 (18): 2236 − 2247. (SCI & EI, IF = 1.352, SCI3区,该论文获第七届厦门市自然科学优秀学术论文一等奖) [20]. Hui Tian*, Ke Zhou, Dan Feng. Dynamic Matrix Encoding Strategy for Voice-over-IP Steganography, Journal of Central South University of Technology, 2010, 17(6): 1285 − 1292. (SCI & EI, IF = 0.434) [21]. Tian Wang, Yang Li, Yonghong Chen, Hui Tian*, Yiqiao Cai, Weijia Jia, Baowei Wang. Fog-Based Evaluation Approach for Trustworthy Communication in Sensor Cloud System, IEEE Communications Letters, 21(11): 2532-2535. (SCI & EI, IF2017= 1.988, SCI 3区) [22]. Tian Wang, Jiandian Zeng, Md Zakirul Alam Bhuiyan, Hui Tian*, Yiqiao Cai, Yonghong Chen, Bineng Zhong. Trajectory Privacy Preservation based on a Fog Structure in Cloud Location Services, IEEE Access, 2017:5(1):7692-7701.(SCI & EI检索,IF2017= 3.244, SCI 3区) [23]. Tian Wang, Zhen Peng, Wenzheng Xu, Junbin Liang, Guojun Wang, Hui Tian*, Yiqiao Cai, and Yonghong Chen, Cascading Target Tracking Control in Wireless Camera Sensor and Actuator Networks, Asian Journal of Control, 2017, 19(4): 1350-1364. (SCI & EI检索,IF = 1.421,SCI 3区) [24]. Jin Liu, Hui Tian, Jing Lu, Yonghong Chen. Neighbor-Index-Division Steganography Based on QIM Method for G.723.1 Speech Streams, Journal of Ambient Intelligence and Humanized Computing, 2016, 7(1): 139-147. (SCI & EI, IF = 0.835,SCI 4区) [25]. Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen. Reliable Wireless Connections for Fast-moving Rail Users Based on A Chained Fog Structure, Information Sciences, 2017, 379: 160-176. (SCI & EI, IF2017= 4.832, SCI 2区) [26]. Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang. The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc & Sensor Wireless Networks 2017, 37(1-4): 95-115. (SCI & EI, SCI4区) [27]. Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian. Intrusion Detection in WSN with an Improved NSA Based on the DE-CMOP, KSII Transactions on Internet and Information Systems, 2017, 11(1): 5574-5591. [28]. Tian Wang, Wenhua Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang. Interoperable localization for mobile group users. Computer Communications, 2017,105: 53-65. (SCI & EI, SCI 3区) [29]. Yiqiao Cai, Guo Sun, Tian Wang, Hui Tian, Yonghong Chen, Jiahai Wang. Neighborhood-Adaptive Differential Evolution for Global Numerical Optimization. Applied Soft Computing, 2017, 59: 659-706. (SCI & EI, IF2017= 3.541, SCI 2区) [30]. Yonghong Chen, Ning Zhang, Hui Tian, Tian Wang, Yiqiao Cai. A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Communications Letters, 2016, 20(12): 2414 - 2417. (SCI & EI, SCI 3区) [31]. Yiqiao Cai, Jingliang Liao, Tian Wang, Yonghong Chen, Hui Tian. Social Learning Differential Evolution. Information Sciences, 2018, vol. 433-434: 464-509. (SCI & EI, SCI 2区) [32]. Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki and Hui Tian. Trends in Modern Information Hiding: Techniques, Applications and Detection, Security and Communication Networks, 2016, 9(8): 703-704. (SCI & EI, IF = 0.72,SCI 4区) [33]. Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian. Improving Differential Evolution with A New Selection Method of Parents for Mutation, Frontiers of Computer Science, 2016, 10(2): 246-269. (SCI & EI, IF = 0.434,SCI 4区) [34]. Yiqiao Cai, Meng Zhao, Jingliang Liao, Tian Wang, Hui Tian, Yonghong Chen. Neighborhood Guided Differential Evolution, Soft Computing, 2016, 21(16): 4769-4812. (SCI & EI, IF = 1.271,SCI 3区) [35]. Yiqiao Cai, Jiahai Wang, Yonghong Chen, Tian Wang, Hui Tian, Wei Luo., Adaptive Direction Information in Differential Evolution for Numerical Optimization, Soft Computing, 2016, 29(2): 465-494. (SCI & EI, IF = 1.271,SCI 3区) [36]. Tian Wang*, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen, Hui Tian, Junbin Liang, and Bineng Zhong. Extracting Target Detection Knowledge Based on Spatio-temporal Information in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, Volume 2016 (2016), Article ID 5831471, 11 pages. (SCI & EI, IF = 0.665,SCI 4区) [37]. Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong. Maximizing Real-time Streaming Services Based on a Multi-Servers Networking Framework, Computer Networks, 2015, 93(1):199-212. (SCI & EI, IF = 1.256,SCI 3区) [38]. Jingliang Liao, Yiqiao Cai, Tian Wang, Hui Tian, Yonghong Chen, Cellular Direction Information Based Differential Evolution For Numerical Optimization: An Empirical Study, Soft Computing, 2016, 20(7): 2801-2827. (SCI & EI, IF = 1.271,SCI 3区) [39]. Tian Wang, Weijia Jia, Bineng Zhong, Hui Tian, Guoliang Zhang. BlueCat: An Infrastructure-Free System for Relative Mobile Localization, Ad Hoc & Sensor Wireless Networks, 2015, 29(1-4): 133-152. (SCI & EI, IF = 0.435,SCI 4区) [40]. Jin Liu, Hui Tian, Ke Zhou*, Frame-Bitrate-Change Based Steganography for Voice-over-IP, Journal of Central South University, 2014, 21: 4544-4552. (SCI & EI, IF = 0.520,SCI 4区) [41]. Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai. Steganalysis of Prediction Mode Modulated Data-Hiding Algorithms in H.264/AVC Video Stream, Annals of Telecommunications - annales des télécommunications, 2014, 69 (7):461-473. (SCI & EI, IF = 0.69,SCI 4区) [42]. Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian. Network forensics and Challenges for Cybersecurity, Annals of Telecommunications - annales des télécommunications, 2014, 69(7): 345-346. (SCI & EI, IF = 0.699,SCI 4区) [43]. Hui Tian*, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai. StegoNote: Steganography in Guitar Music Using Note Modulation, International Journal of Nework Security, 2018. (已录用,EI源刊) [44]. Fulin Nan, Hui Tian*, Tian Wang, Yiqiao Cai and Yonghong Chen. A Collusion-Resistant Public Auditing Scheme for Shared Cloud Data. International Journal of Information Technology and Management, 2017. (已录用) [45]. Zhaohua Zhu, Hui Tian*, Chin-Chen Chang, Yonghong Chen, Tian Wang, Yiqiao Cai. StegTab: Steganography in Guitar Tablatures, Journal of Information Hiding and Multimedia Signal Processing, 2018, 9(4): 904-917. (EI). [46]. Hui Tian*, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai. A High-capacity Covering Code for Voice-over-IP Steganography, International Journal of Information Technology and Web Engineering, 2015, 10(3), 46-63. (EI). [47]. Hui Tian*, Ronglie Guo, Jing Lu, Yonghong Chen. Implementing Covert Communication over Voice Conversations with Windows Live Messenger, Advances in Information Sciences and Service Sciences, 2012, 4(4): 18 − 26. (EI,该论文获第八届泉州市自然科学优秀学术论文一等奖) [48]. Hui Tian*, Ke Zhou, Jing Lu. A VoIP-Based Covert Communication Scheme Using Compounded Pseudorandom Sequence, International Journal of Advancements in Computing Technology, 2012, 4(1): 223 − 230. (EI) [49]. Jin Liu, Ke Zhou, Hui Tian*, Chunhua Li, Efficient Least-significant-bits Steganography for VoIP, International Journal of Advancements in Computing Technology, 2012, 4(10): 297-305. (EI) [50]. Xin Chen, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai. A Blind Detection Model for Tracing Back a Single-packet from Mixed Traffic by Determining Parameters of Features' Windows, Journal of Information & Computational Science, 2015, 12(16): 6209-6218. (EI) [51]. Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang, Hui Tian. Differential Evolution Enhanced with Composite Population Information Based Mutation Operators, Journal of Digital Information Management 2015, 13(4), 210-223.(EI) [52]. 田晖*,陈羽翔,黄永峰,卢璥.基于Shamir秘密共享的云端多副本审计,华中科技大学学报(自然科学版), 2016, 44(3): 77-82 (EI). [53]. 田晖*,郭舒婷,秦界,黄永峰,陈永红,卢璥.基于可量化性能分级的自适应IP语音隐写方法,电子学报, 2016, 44(11): 2735-2741. (EI) [54]. 周长利,田晖,马春光,杨松涛.路网环境下基于伪随机置换的LBS隐私保护方法研究,通信学报,2017, 38(6): 19-29. [55]. 王田,吴群,文晟,蔡奕侨,田晖,陈永红,无线传感网中移动式蠕虫的抑制与清理,电子与信息学报, 2016, 38(9): 2202-2207. (EI)

学术兼职

现为IEEE高级会员(IEEE Senior Member)、中国计算机学会(CCF)高级会员、CCF互联网专委会委员、CCF信息存储技术专委会委员、中国电子学会(CIE)会员和ACM会员。先后担任IWCC2013和IWCC2014国际学术会议的共同主席(co-chair), IWCC2017, WTMC2017, INCoS 2016, WTMC2016, BioSTAR2016, BCSN 2015, ICACT2012, IWCC2012, ICCCT2012, ICACT2011等多个国际学术会议的程序委员会委员,担任SCI和EI检索国际期刊Security and Communication Networks (Wiley), Annals of Telecommunications (Springer), EURASIP Journal on Information Security (EURASIP)和Advances in Multimedia的客座编辑以及International Journal of Advancements in Computing Technology和Journal of Cyber Security and Mobility的编委,且多次应邀担任国际著名期刊IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Industrial Informatics, IEEE Security & Privacy, Communications of the ACM, Computer & Security, Computers & Electrical Engineering, Transactions on Emerging Telecommunications Technologies, Multimedia Systems, Security and Communication Networks, International Journal of Communication Systems等的审稿人。

推荐链接
down
wechat
bug