黄 继 武
工学博士。1962-10出生,365游戏大厅信息工程学院特聘教授、博士导师。国家杰出青年科学基金获得者、IEEE Fellow。入选广东省特支计划杰出人才。广东省网络与信息安全产学研创新联盟理事长。分别毕业于西安电子科技大学(电子对抗专业,学士)、清华大学(通信与信息系统专业,硕士)、中国科学院自动化所(模式识别与智能系统专业,博士)。研究兴趣为多媒体取证与安全、信息隐藏。曾主持过包括国家自然科学基金重点项目、国家973课题、国家重点研发计划课题在内的一批科研课题。发表学术论文300多篇,谷歌学术引用20000多次,H-index 为75。曾获国家自然科学二等奖(排名第二)、教育部自然科学一等奖(排名第一)、中国计算机学会自然科学一等奖(排名第一)。兼任过IEEE Trans. on Information Forensics and Security AE和本领域重要国际学术会议IEEE WIFS 2014 大会共同主席、IEEE WIFS 2018程序委员会共同主席。
教育
西安电子科技大学电子对抗专业, 工学学士。1982.1;
清华大学通信与电子系统专业,工学硕士。1987.12;
中科院自动化所模式识别与智能系统专业,工学博士。1998.12
曾任职、学术兼职
中山大学教授、信息科学与技术学院院长;教育部信息xxx重点实验室(中山大学)主任、广东省信息安全技术重点实验室(中山大学)主任、广东省智能信息处理重点实验室(365游戏大厅)主任。
广东省“网络与信息安全”省部产学研创新联盟理事长(创始);“信息安全”国家重点实验室学术委员会委员。
国家自然科学奖/国家科技进步奖会评专家、国家自然科学基金会评专家/评审组召集人、国家973计划/863计划会评专家
IEEE Trans. on Information Forensics and Security等多种期刊AE;IEEE 多媒体取证与安全技术委员会委员;APSIPA(亚太信号与信息处理学会)图像、视频、多媒体技术委员会主席;多个IEEE国际学术会议大会主席、学术委员会主席
学术荣誉
国家杰出青年科学基金获得者, 2003
IEEE Fellow, 2015
广东省“特支计划”杰出人才, 2017
曾主持的主要科研项目
1) NSFC-企业创新联合基金重点项目“社交网络虚假媒体内容检测关键技术的研究”(U19B2022),2020.1-2023.12。
2) NSFC-通用技术基础研究联合基金重点项目“基于大数据的信息隐藏与对抗技术” (U1636202),2017.1-2020.12。
3) NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(U1135001),2012.1-2015.12。
4) 国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究”(60633030)。220万。2007.1-2010.12
5) 国家重点研发计划课题“基于免疫的网络动态风险评估与控制技术” (2020YFB1805404)2020 .11~2024 10。
6) 国家973计划项目课题“网络可视媒体安全”( 2011CB302204), 2011.9-2015.8。
7) 国家973计划项目课题“基于内容的可视媒体安全”(2006CB303104),2006.9-2010.8。
8) 广东省重点领域研发计划“网络信息安全”重点专项开放课题“面向AI安全的伪造音视频取证分析关键技术,”2019.1~2022.12。
9) 阿里巴巴“图像篡改检测与定位”,2020.11.01~2021.10.31
10) 阿里巴巴“媒体认证技术认证”,2017.12~2018.11。
科研获奖
可视媒体几何计算的理论与方法。国家自然科学二等奖(第二), 2015。
稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一),2004。
信息隐藏理论与方法。中国计算机学会科学技术奖自然科学一等奖(第一), 2019。
发明专利:
获国家发明专利授权60多件。部分成果在国家有关部门和工业界应用
研究生
培养博士后/博士生40多名、硕士生70多名
论文和学术影响
发表论文350多篇。论文被引用21000多次(google scholar)。H-index: 76
近3年发表(录用)的部分论文
[1] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, “CTNet: A convolutional transformer network for color image steganalysis,” Journal of Computer Science and Technology, accepted.
[2] Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang. “Detection of deepfake videos using long-distance attention,” IEEE Transactions on Neural Networks and Learning Systems. Accepted
[3] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Secure deep learning framework for moving object detection in compressed video,” IEEE Trans. on Dependable and Secure Computing. Accepted.
[4] Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang, “ReLoc: a restoration-assisted framework for robust image tampering localization,” IEEE Trans. on Information Forensics & Security. vol. 18, pp. 5243-5257, 2023.
[5] Hao-Tian Wu, Xin Cao, Ying Gao, Kaihan Zheng, Jiwu Huang, Jiankun Hu, “Fundus image enhancement based on semi-supervised GAN and anatomical structure preservation,” IEEE Trans. on Emerging Topics in Computational Intelligence. Accepted
[6] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, "CTNet: A Convolutional Transformer Network for Color Image Steganalysis,” Journal of Computer Science and Technology. Accepted
[7] Peijia Zheng, Jiwu Huang, "Non-Interactive Privacy-Preserving Frequent Itemset Mining over Encrypted Cloud Data," IEEE Trans. on Cloud Computing, Accepted
[8] Wei Lu, Jiwu Huang, “Anti-rounding Image Steganography with Separable Fine-tuned Network,” IEEE Trans. on Circuits and Systems for Video Technology. Accepted
[9] Qilin Yin, Wei Lu, Bin Li, Jiwu Huang, “Dynamic difference learning with spatio-temporal correlation for deepfake video detection,” IEEE Trans. on Information Forensics & Security. vol. 18: 4046-4058, 2023.
[10] Wenbo Fang, Junjiang He, Tao Li, Xiaolong Lan, Yang Chen, Wenshan Li, and Jiwu Huang, “Comprehensive Android malware detection based on federated learning architecture,” IEEE Trans. on Information Forensics & Security. vol. 18: 3977-3990, 2023.
[11] Shuanquan Tan, Qiushi Li, Yilin Chen, Bin Li, Jiwu Huang, “STD-NET: search of image steganalytic deep-learning architecture via hierarchical tensor decomposition,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2657-2673, 2023.
[12] Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, and Xiangui Kang, “An adaptive IPM-based HEVC video steganography via minimizing non-additive distortion,” IEEE Trans. on Dependable and Secure Computing. 20(4): 2896-2912, 2023.
[13] Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, and Jiwu Huang, “Adversarial steganography embedding via stego generation and selection,” IEEE Trans. on Dependable and Secure Computing. 20(3): 2375-2389, 2023.
[14] Bingyuan Huang, Sanshuai Cui, Jiwu Huang, and Xiangui Kang, “Discriminative frequency information learning for end-to-end speech anti-spoofing,” IEEE Signal Processing Letters. vol.30, pp. 185-189, Jan., 2023
[15] Weixuan Tang, Bin Li, Weixiang Li, Yuangeng Wang, “Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism,” Science China Information Sciences. vol. 66, 132305:1-14, 2023.
[16] Xianbo Mo, Sunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang, “ReLOAD: using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 18, 1524-1538, 2023
[17] Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang, “Query-efficient adversarial attacks with low perturbation against end-to-end speech recognition systems,” IEEE Trans. on Information Forensics & Security. vol.18, no.1, pp. 351-364, 2023
[18] Weiqi Luo, Jiwu Huang, “Automatic asymmetric embedding cost learning via generative adversarial networks,” ACM MM 2023.
[19] Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang, “Domain-agnostic document authentication against practical recapturing attacks,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 8, pp. 2890-2905, Aug., 2022
[20] Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang, “Document recapture detection based on a unified distortion model of halftone cells,” IEEE Trans. on Information Forensics & Security. vol. 17, no. 7, pp. 2800-2815, July, 2022
[21] Sanshuai Cui, Bingyuan Huang, Jiwu Huang, and Xiangui Kang, “Synthetic speech detection based on local autoregression and variance statistics,” IEEE Signal Processing Letters. vol. 29, no. 7, pp.1462-1466, July, 2022
[22] Yuan Yuan, Gene Cheung, Pascal Frossard, V. H. Zhao, Jiwu Huang, “Landmarking for navigational streaming of stored high-dimensional media,” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5663-5679, Aug., 2022
[23] Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang, “Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.” IEEE Trans. on. Circuits and Systems for Video. vol. 32, no. 8, pp. 5110-5123, Aug., 2022
[24] Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun Q. Shi, “Robust estimation of upscaling factor on double JPEG compressed images,” IEEE Trans. on Cybernetics. vol. 52, no. 10, pp. 10814-10826, Oct., 2022
[25] Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang, “Hybrid deep-learning framework for object-based forgery detection in video.” Signal Processing: Image Communication. vol. 105, 116655, 2022.
[26] Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang, " Universal Deep Network for Steganalysis of Color Image Based on Channel Representation," IEEE Trans. on Information Forensics and Security, vol. 17, no. 8, pp. 3022-3036, Aug., 2022
[27] Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang, “Self-adversarial training incorporating forgery attention for image forgery localization,” IEEE Trans. on Information Forensics & Security. vol.17, pp.819-834 March 2022
[28] Weixuan Tang, Bin Li, Jin Li, Mauro Barni, Jiwu Huang, “Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge,” IEEE Trans. on. Circuits and Systems for Video. vol.32, no. 6, pp.4081-4095, June 2022
[29] Qiushi Li, Shunquan Tan, Shengda Chen, Bin Li, Jiwu Huang, “One-class double compression detection of advanced videos based on simple Gaussian distribution model,” IEEE Trans. on. Circuits and Systems for Video. 32(4), pp. 2496-2500, Apr. 2022.
[30] Pascal Lefevre, Philippe Carré, Caroline Fontaine, Philippe Gaborit, Jiwu Huang, “Efficient image tampering localization using semi-fragile watermarking and error control codes,” Signal Processing. vol.190, 108342, pp. 1-15, 2022
[31] Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang, “Keyword spotting in the homomorphic encrypted domain using deep complex-valued CNN,” Proc. of ACM Multimedia 2022. accepted.
[32] Shujin Wei, Haodong Li, Jiwu Huang, “Deep video inpainting localization using spatial and temporal traces,” Prof. of IEEE ICASSP 2022.
[33] Xianhao Tian, Peijia Zheng, Jiwu Huang, “Robust privacy-preserving motion detection and object tracking in encrypted streaming video,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 5381-5396, 2021
[34] Minlin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, Jiwu Huang, “A new adversarial embedding method for enhancing image steganography,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 4621-4634, 2021
[35] Lin Zhao, Changsheng Chen, Jiwu Huang, “Deep learning-based forgery attack on document images,” IEEE Trans. on Image Processing. vol. 30, pp. 7964-7979, Sep. 2021
[36] Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang, “MCTSteg: A monte carlo tree search-based reinforcement learning framework for universal non-additive steganography,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 4306-4320, Sep. 2021.
[37] Peiyu Zhuang, Haodong Li, Shunquan Tan, Bin Li, Jiwu Huang, “Image tampering localization using a dense fully convolutional network,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 2986-2999, 2021
[38] Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang, “CALPA-NET: channel-pruning-assisted deep residual network for steganalysis of digital images,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 131-146, Jan. 2021
[39] Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang, “An automatic cost learning framework for image steganography using deep reinforcement Learning,” IEEE Trans. on Information Forensics & Security. vol. 16, pp. 952-967, 2021
[40] Yuangen Wang, Guopu Zhu, Jiwu Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Trans. on Circuits and Systems for Video. vol. 31, no.1, pp. 76-87, Jan. 2021