个人简介
教育经历
2011/7 - 2012/7,新加坡南洋理工大学,公派留学联合培养,导师:Prof. Chang Chip-Hong, IEEE Fellow
2010/9 - 2014/4,东南大学,信息与通信工程(信息安全方向),博士,导师:胡爱群教授
2008/9 - 2010/7,东南大学,信息与通信工程(信息安全方向),硕士(保博),导师:胡爱群教授
2004/9 - 2008/7,西南交通大学,电子信息工程,学士(四次获特等奖学金,保研)
工作经历
2024/04 – 至今, 华东师范大学,通信与电子工程学院,教授
2014/05 – 2024/03, 南京航空航天大学,计算机科学与技术学院,先后讲师、副教授
社会兼职
一、专委委员
中国人工智能学会人工智能与安全专业委员会委员;
ACM南京分会执行委员会委员;
中国图象图形学学会数字媒体取证与安全专委会委员;
中国人工智能学会青年工作委员会委员;
CAAI智能信息网络专委会委员;
江苏省计算机学会信息安全专委会委员;
江苏省计算机学会网络与分布计算专业委员会委员;
江苏省人工智能学会智能与安全专委会委员;
江苏省网络空间安全学会数据安全专委会委员;
IEEE Senior Member;CCF Senior Member;CSIG高级会员;ACM会员;CAAI会员;CSIG会员;中国密码学会会员
二、程序委员会委员
2015: ICCCS2015;CBD2015;
2016: CBD2016;
2017: IEEE GLOBECOM2017;
2018: IEEE GLOBECOM2018;CBD2018;IEEE COMNETSAT2018;全国硬件安全论坛;
2019: IEEE GLOBECOM2019;IEEE COMNETSAT2019;IEEE GCC2019;IEEE MENACOMM'19;SSCC-2019;3ICT'19;CFTC2019;ICCCN2019-BDMLS workshop;CBD 2019;SSCC-CIS-2019;
2020: ICCCN-BDMLS workshop2020;CCF CTC2020;CBD2020;ACM TURC 2020;3ICT2020;Globecom2020;ATS 2020
2021:ACM TURC 2021;AITS 2021;SIoTEC 2021;ATS 2021;Globecom2021 CISS;CBD2021
2022:Globecom2022 CISS;AITS2022 (B类会议DSN的workshop);ATS2022;CBD2022;
2023:ICCSI 2023;Globecom 2023 CISS;ATS2023;AsianHOST2023;TRIDENTCOM2023;CBD2023
2024: Globecom 2024 CISS
三、审稿人
期刊(任70余个SCI期刊的长期审稿人):
IEEE Transactions on Information Forensics & Security;
IEEE Transactions on Dependable and Secure Computing;
IEEE Transactions on Neural Networks and Learning Systems;
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;
IEEE Transactions on Circuits and Systems I: Regular Papers.
IEEE Transactions on Circuits and Systems II: Express Briefs.
IEEE Transactions on Emerging Topics in Computing;
IEEE Transactions on Multimedia;
IEEE Transactions on Circuits and Systems for Video Technology;
IEEE Transactions on Industrial Informatics;
IEEE Transactions on Artificial Intelligence;
IEEE Transactions on Software Engineering;
IEEE Transactions on Image Processing;
IEEE Transactions on VLSI Systems;
IEEE Transactions on Sustainable Computing;
IEEE Transactions on Reliability;
IEEE Transactions on Big Data;
IEEE Transactions on Services Computing;
IEEE Transactions on Systems, Man and Cybernetics: Systems;
IEEE Transactions on Consumer Electronics;
ACM Transactions on Design Automation of Electronic Systems;
IEEE Journal on Selected Areas in Communications;
IEEE Signal Processing Letters;
IEEE Embedded Systems Letters;
Pattern Recognition;
Information Sciences;
IEEE Internet of Things;
Computer Networks;
IEEE Open Journal of Signal Processing;
Journal of Systems Architecture;
IEEE Access;
ACM Journal on Emerging Technologies in Computing Systems;
IET Computers & Digital Techniques;
IET Cyber-Physical Systems: Theory & Applications;
Electronics Letters;
Computers and Security;
Journal of Information Security and Applications;
Future Generation Computer Systems;
Knowledge and Information Systems;
Knowledge-Based Systems;
Information Fusion;
Frontiers of Computer Science;
Neural Networks;
Neurocomputing;
Advanced Engineering Informatics;
Integration, the VLSI Journal;
Peer-to-Peer Networking and Applications;
Image and Vision Computing;
Engineering Applications of Artificial Intelligence;
Signal, Image and Video Processing;
China Communications;
Security and Communication Networks;
Applied Intelligence;
Neural Computing and Applications;
Connection Science;
Computer;
Expert Systems With Applications;
Computer Modeling in Engineering and Sciences;
Scientific Reports;
Wireless Communications and Mobile Computing;
International Journal of Distributed Sensor Networks;
Defence Technology;
Journal of Intelligent & Fuzzy Systems;
Journal of Internet Technology;
Chinese Journal of Electronics;
Digital Signal Processing;
Computers, Materials & Continua;
ICT Express;
Microprocessors and Microsystems;
EURASIP Journal on Wireless Communications and Networking;
Journal of Semiconductors;
Journal of King Saud University - Computer and Information Sciences;
Journal of Sensors;
IETE Journal of Research;
Information Security Journal: A Global Perspective;
International Journal of Automation and Computing;
Software: Practice and Experience;
Recent Patents on Computer Science;
Recent Patents on Engineering;
Recent Advances in Computer Science and Communications;
Journal of Current Science and Technology;
国家自然科学基金(面上、青年);
教育部学位中心学位论文评审;
Review applications for the Estonian Research Council(评审爱沙尼亚研究委员会基金)
计算机学报(CCF中文A类);
计算机研究与发展(CCF中文A类);
计算机科学(CCF中文B类);
信息安全学报(CCF中文B类);
《北京航空航天大学学报》
国际会议:
IEEE WCNC2013; ICCCS2015;CBD2015; CHES2016;CBD2016; IEEE ISCAS2017;IEEE MWSCAS2017;IEEE ASAP2017;ISPACS2017;CBD2017;IEEE GLOBECOM2017; IEEE GLOBECOM2018;IEEE MWSCAS2018;CBD2018; IEEE ISCAS2019;ISVLSI 2019;IEEE MWSCAS 2019;CFTC2019;IEEE MENACOMM'19;ICCCN2019-BDMLS workshop;MLICOM 2019;IEEE Globecom2019;IEEE COMNETSAT 2019;CBD 2019;3ICT'19;SSCC-2019;ISCAS2020;ICCCN-BDMLS workshop2020;ACM TURC 2020;CCF CTC2020;Globecom2020;CBD2020;AJCAI2020;ATS 2020;3ICT2020;AITS 2021;SIoTEC 2021;ATS 2021;Globecom2021 CISS;CBD2021;ISCAS 2022;Globecom2022 CISS;CVPR 2022;ECCV 2022; ATS 2022;CBD2022;3rd CSIG Chinese Congress on Media Forensics and Security 2022;CVPR 2023;ICCV2023;Globecom 2023;ICCSI 2023;ATS2023;AsianHOST2023;CBD2023;CVPR 2024;ISCAS 2024;ECCV 2024;ACCV 2024;
研究领域
1. 计算机视觉、机器学习、人工智能、深度学习、大数据、图像处理中的安全问题及对抗
2. 人工智能安全:1)鲁棒/安全/隐私的人工智能系统,包括五类攻防:训练集中毒、训练集后门、对抗样本、模型窃取、泄露敏感数据;2)人工智能在网络空间安全攻防中的应用
3. 硬件安全、硬件木马设计与检测
4. 深度学习模型水印及授权控制
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
One-to-N & N-to-One: Two Advanced Backdoor Attacks against Deep Learning Models. IEEE Transactions on Dependable and Secure Computing. 2020, SCI, CCF A, IF 7.329
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption . IEEE Transactions on Emerging Topics in Computing,2022,SCI,IF 7.691
Untargeted Backdoor Attack against Deep Neural Networks with Imperceptible Trigger. IEEE Transactions on Industrial Informatics, 2023, SCI,中科院1区,IF 12.3
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Transactions on Artificial Intelligence, 2021.
Use the Spear as a Shield: An Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. IEEE Transactions on Emerging Topics in Computing,2022,SCI, IF 7.691
An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features. IEEE Transactions on Artificial Intelligence, 2024.
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Transactions on Visualization and Computer Graphics . 2023, SCI,CCF A 类
Localization of Conventional Inpainting With Feature Enhancement Network. IEEE Transactions on Big Data, 2022, SCI
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting. IEEE Transactions on Neural Networks and Learning Systems. 2023, SCI, 中科院 1 区
PRNU-based Image Forgery Localization With Deep Multi-Scale Fusion. ACM Transactions on Multimedia Computing Communications and Applications, 2022, SCI
Detection of Recolored Image by Texture Features in Chrominance Components. ACM Transactions on Multimedia Computing, Communications, and Applications. 2022, https://doi.org/10.1145/3571076,SCI
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. Information Sciences . 中科院1区, SCI, 2023
LOPA: A Linear Offset Based Poisoning Attack Method Against Adaptive Fingerprint Authentication System. Computers & Security. 99, 2020, 102046, pp.1-13. SCI, CCF B, IF 4.438
PTB: Robust Physical Backdoor Attacks against Deep Neural Networks in Real World. Computers & Security, 2022. SCI, CCF B, IF 4.438
Dataset Authorization Control: Protect the Intellectual Property of Dataset via Reversible Feature Space Adversarial Examples. Applied Intelligence. 2022. SCI, 中科院 2 区,IF 5.3.
Active Intellectual Property Protection for Deep Neural Networks through Stealthy Backdoor and Users' Identities Authentication. Applied Intelligence, 2022. SCI, 中科院 2 区, IF 5.3
Compression-Resistant Backdoor Attack against Deep Neural Networks. Applied Intelligence, 2023. SCI, 中科院2区, IF 5.3.
Imperceptible and Multi-Channel Backdoor Attack. Applied Intelligence, 2023. SCI, 中科院 2 区, IF 5.3.
NaturalAE: Natural and robust physical adversarial examples for object detectors. Journal of Information Security and Applications. 57 (2021) 102694, 1-12. SCI, CCF C, IF 3.872
Backdoors Hidden in Facial Features: A Novel Invisible Backdoor Attack against Face Recognition Systems. Peer-to-Peer Networking and Applications. 2021, 14:1458–1474. SCI, CCF C, IF 3.307
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. Journal of Information Security and Applications. 2021. SCI, CCF C, IF 3.872
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Computers & Digital Techniques, 2023, SCI
Ten years of hardware Trojans: a survey from the attacker's perspective. IET Computers & Digital Techniques. 2020, Vol. 14, Iss. 6, pp. 231-246. SCI
DPAEG: A Dependency Parse Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Security and Communication Networks. 2020, Volume 2020, Article ID 5890820:1-15. SCI, CCF C
Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access, 2020, Vol 8, pp. 74720-74742. SCI
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2020. EI, CCF C
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper). In Proceedings of the Great Lakes Symposium on VLSI 2021 (GLSVLSI '21). EI, CCF C, Session邀请报告和Invited Paper
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021). EI, CCF C
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. 24th Information Security Conference (ISC) 2021. EI, CCF C, 录用率 24%.
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. IEEE AICAS,2022. EI,Session 邀请报告和邀请论文.
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TURC'20: Proceedings of the ACM Turing Celebration Conference - China. May 2020, Pages 231–235. EI, 被推荐扩展到期刊.
Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue. PRNU-based Image Forgery Localization With Convolutional Neural Network. IEEE 24th International Workshop on Multimedia Signal Processing. 2022, EI
ActiveGuard: Active Intellectual Property Protection for Deep Neural Networks via Adversarial Examples based User Fingerprinting. AAAI 2022 workshop, International Workshop on Practical Deep Learning in the Wild. EI
傅志彬 ; 祁树仁 ; 张玉书 ; 薛明富. 基于稠密连接的深度修复定位网络 . 信息网络安全, 2022 年第 7 期, 84-93. CCF T3
陈诺,祁树仁,张玉书,薛明富,花忠云. 基于通道间相关性的图像重着色检测. 网络与信息安全学报,2022,第8 卷第5 期,167-178. CCF中文C类
祁树仁,张玉书,薛明富,花忠云 . 面向多畸变稳健性的图像归因算法. 信息网络安全. 2023, 23(04), 30-38. CCF计算领域高质量科技期刊分级目录T3类