基本信息
董晶 女 硕导 中国科学院自动化研究所
电子邮件: jdong@nlpr.ia.ac.cn
通信地址: 中关村东路95号智能化大厦1504
邮政编码: 100190
电子邮件: jdong@nlpr.ia.ac.cn
通信地址: 中关村东路95号智能化大厦1504
邮政编码: 100190
研究领域
人工智能,大数据,模式识别,信息安全,数字取证
招生信息
招收对象:希望招收有自驱力,语言表达能力良好、愿意从事科研事业的学生。课题组的硕士博士都是按照研究方向统一培养培养,培养目标包括三个方面:
i)具有优良的做人做事习惯,认真负责、积极向上、刻苦努力;
ii) 能够较为独立的完成科研任务,并撰写高质量的科研论文;
iii) 不仅能够做有趣的研究更要做有用的技术,让研究成果在重要的产业实践中发挥作用,优先考虑动手能力强的同学(国际国内相关竞赛获奖经验者优先)。
研究领域:计算机视觉、多媒体取证与安全、计算机图形学、人工智能。联系我之前,至少简单浏览一下我们课题组主页近几年的论文,一方面方便了解我们在做什么,另一方面方便后续面试中有更好的表现。
招生专业
081203-计算机应用技术
招生方向
人工智能,大数据,模式识别,信息安全,数字取证
教育背景
2005-09--2010-07 中科院自动化研究所 博士研究生2001-09--2005-06 中南大学 学士学位
专利与奖励
专利成果
[1] 王伟, 董晶, 彭勃, 杨嵩林, 王建文. 人脸活体检测对抗鲁棒性的评估方法及装置. CN: CN114241587A, 2022-03-25.[2] 董晶, 王伟, 彭勃, 何子文, 项伟, 谭铁牛. 基于视觉对抗重构的DeepFake防御方法和系统. CN: CN114005170A, 2022-02-01.[3] 董晶, 王伟, 彭勃, 王建文. 基于三维人脸分解的换脸与重演方法及装置. CN: CN113344777A, 2021-09-03.[4] 董晶, 王伟, 彭勃, 何子文, 谭铁牛. 对抗样本图像的确定方法、装置、电子设备及存储介质. CN: CN113313132A, 2021-08-27.[5] 董晶, 王伟, 彭勃, 王建文, 项伟, 樊红兴. 抗JPEG压缩的伪造图像检测方法. CN: CN113255571A, 2021-08-13.[6] 王伟, 董晶, 彭勃, 李东泽, 马天翔. 一种基于操控解耦身份表示的人脸匿名方法. CN: CN113033511A, 2021-06-25.[7] 董晶, 王伟, 彭勃, 张时润. 针对人脸篡改图像特点分布的图像识别方法、系统及设备. CN: CN112949469A, 2021-06-11.[8] 董晶, 王伟, 彭勃, 管伟楠, 谭铁牛. 基于人脸三维形状的换脸伪造检测方法、系统及设备. CN: CN112949464A, 2021-06-11.[9] 董晶, 王伟, 彭勃, 卞明运. 基于多尺度深度特征融合的人脸深度篡改图像的检测方法. CN: CN111539942B, 2021-08-31.[10] 董晶, 王伟, 彭勃, 轩心升, 王建文. 用于检测多类型深度网络生成图像的方法、系统、装置. CN: CN110942034A, 2020-03-31.[11] 董晶, 王伟, 彭勃, 轩心升, 王建文. 计算机生成图像的检测方法、系统、装置. CN: CN110428006A, 2019-11-08.[12] 谭铁牛, 董晶, 王伟, 彭勃. 基于视频的非接触式脉搏实时估计方法及设备. CN: CN109247923A, 2019-01-22.[13] 谭铁牛, 董晶, 王伟, 郝杰东. 基于目标体图像的目标体检索方法、系统及装置. CN: CN108874889A, 2018-11-23.[14] 谭铁牛, 董晶, 王伟, 彭勃. 基于透视失真特性的人脸图像鉴伪方法、存储、处理设备. CN: CN107292269A, 2017-10-24.[15] 谭铁牛, 董晶. 图像篡改检测方法及装置. CN: CN107133951B, 2020-02-28.[16] 谭铁牛, 董晶, 王伟, 彭勃. 图像篡改取证方法及装置. CN: CN107025647A, 2017-08-08.[17] 谭铁牛, 董晶, 王伟, 叶奎, 徐金东. 图像篡改检测方法及装置. CN: CN106846303A, 2017-06-13.[18] 谭铁牛, 董晶, 王伟, 彭勃. 一种基于光照方向不一致性的图像拼接检测方法. CN: CN105678308A, 2016-06-15.[19] 谭铁牛, 董晶, 王伟, 许锡锴. 一种基于局部学习的信息隐藏检测方法. CN: CN104899606A, 2015-09-09.[20] 谭铁牛, 董晶, 王伟, 钱银龙. 基于深度学习的图像隐写检测方法. CN: CN104778702A, 2015-07-15.[21] 谭铁牛, 董晶, 王伟. 一种基于DCT系数的图像篡改定位方法. CN: CN103679626A, 2014-03-26.[22] 谭铁牛, 董晶, 许锡锴. 基于视频像素时空相关性的通用视频隐写分析方法. CN: CN103281473A, 2013-09-04.[23] 谭铁牛, 董晶, 王再冉. 水印的嵌入和提取方法. CN: CN102890814A, 2013-01-23.[24] 谭铁牛, 董晶, 关晴骁. 基于对称邻域信息的盲隐写分析方法. CN: CN102722858A, 2012-10-10.[25] 谭铁牛, 董晶, 王伟. 基于图像色度的彩色数字图像篡改检测方法. CN: CN102959588A, 2013-03-06.[26] 谭铁牛, 董晶. 一种基于图像灰度游程直方图分析的盲信息隐藏检测方法. CN: CN101615286A, 2009-12-30.[27] 王伟, 董晶, 彭勃, 杨嵩林, 吕月明. 说话人视频的编辑帧生成方法、装置、电子设备及介质. CN: CN117156081A, 2023-12-01.[28] 董晶, 王伟, 彭勃, 王建文, 吕月明, 江玥, 杨嵩林. 基于跨模态风格学习的图像生成方法及装置. CN: CN117315090A, 2023-12-29.[29] 王伟, 董晶, 彭勃, 项伟, 卓文琦. 图像鉴伪模型训练方法、图像鉴伪方法、装置及电子设备. CN: CN117133039A, 2023-11-28.[30] 彭勃, 董晶, 王伟, 王建文. 人脸鉴伪取证方法及装置、电子设备及存储介质. CN: CN115410260A, 2022-11-29.[31] 董晶, 王伟, 彭勃, 王丽, 王建文, 项伟, 宋宗泽. 基于生成模型的人脸对抗口罩样本生成方法和系统. CN: CN114898450A, 2022-08-12.[32] 董晶, 王伟, 彭勃, 何子文, 项伟, 谭铁牛. 基于视觉对抗重构的DeepFake防御方法和系统. CN: CN114005170B, 2022-03-25.
出版信息
发表论文
(1) DeltaEdit: Exploring Text-free Training for Text-Driven Image Manipulation, CVPR2023, 2023, 第 11 作者(2) CFFT-GAN: Cross-domain Feature Fusion Transformer for Exemplar-based Image Translation, AAAI 2023, 2023, 第 11 作者(3) Semantic 3D-aware Portrait Synthesis and Manipulation Based on Compositional Neural Radiance Field, AAAI, 2023, 第 11 作者(4) Temporal sparse adversarial attack on sequence-based gait recognition, PATTERN RECOGNITION, 2023, 第 3 作者(5) Transferable Sparse Adversarial Attack, IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, 第 3 作者(6) DesignerGAN: Sketch Your Own Photo, ICPR2022, 2022, 第 11 作者(7) AdaDeId: Adjust Your Identity Attribute Freely, ICPR2022, 2022, 第 11 作者(8) Revisiting ensemble adversarial attack, Signal Processing: Image Communication (2022), 2022, 第 3 作者(9) 基于空洞卷积和注意力机制的深度伪造检测, Deepfake detection based on dilated convolution and attention mechanism, 现代电子技术, 2022, 第 4 作者(10) A Unified Framework for High Fidelity Face Swap and Expression Reenactment, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 第 11 作者(11) 基于空洞卷积的低质量人脸深度伪造图片检测, Detection of low���quality facial deepfake image based on void convolution, 现代电子技术, 2021, 第 4 作者(12) Exploring Adversarial Fake Images on Face Manifold, IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, 第 4 作者(13) SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with-action, COMPUTER VISION AND IMAGE UNDERSTANDING (CVIU), 2021, 第 4 作者(14) MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation, IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, 第 11 作者(15) 视觉对抗样本生成技术概述, A Brief Introduction to Visual Adversarial Samples, 信息安全学报, 2020, 第 2 作者(16) Face Recognition Based on SVM Optimized by the Improved Bacterial Foraging Optimization Algorithm, INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2019, 第 4 作者(17) New Graph-Theoretic Approach to Social Steganography, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics, 2019, 第 1 作者(18) Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 第 4 作者(19) Deep-matem: tem query image based cross-modal retrieval for material science literature, MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 第 4 作者(20) DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval, 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, 第 2 作者(21) Non-uniform watermark sharing based on optimal iterative btc for image tampering recovery, IEEE MULTIMEDIA, 2018, 第 4 作者(22) Reversible data hiding in encrypted image with separable capability and high embedding capacity, INFORMATION SCIENCES, 2018, 第 4 作者(23) Feature Pyramid Deep Matching and Localization Network for Image Forensics, 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, 第 2 作者(24) Reversible Embedding to Covers Full of Boundaries, CLOUD COMPUTING AND SECURITY, PT IV, 2018, 第 3 作者(25) Ensemble Reversible Data Hiding, 2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, 第 3 作者(26) Reversible data hiding in encrypted image with separable capability and high embedding capacity, INFORMATION SCIENCES, 2018, 第 4 作者(27) Image Forensics Based on Planar Contact Constraints of 3D Objects, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 第 11 作者(28) Feature learning for steganalysis using convolutional neural networks, MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 第 11 作者(29) Global Perception Feedback Convolutional Neural Networks, 2017, 第 3 作者(30) 图像隐写分析研究新进展, Recent Advances in Image Steganalysis, 图像与信号处理, 2017, 第 1 作者(31) High Capacity Reversible Data Hiding with Contrast Enhancement, COMPUTER VISION, PT II, 2017, 第 11 作者(32) MFC: A Multi-scale Fully Convolutional Approach for Visual Instance Retrieval, 2017, 第 3 作者(33) High Capacity Reversible Data Hiding with Contrast Enhancement, COMPUTER VISION, PT II, 2017, 第 4 作者(34) Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces, 2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, 第 3 作者(35) MFC: A MULTI-SCALE FULLY CONVOLUTIONAL APPROACH FOR VISUAL INSTANCE RETRIEVAL, 2017 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW), 2017, 第 11 作者(36) Optimized 3D Lighting Environment Estimation for Image Forgery Detection, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 第 11 作者(37) Adaptive Histogram Shifting Based Reversible Data Hiding, 2017, 第 1 作者(38) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy, SIGNAL PROCESSING, 2017, 第 4 作者(39) Influence Evaluation for Image Tampering Using Saliency Mechanism, COMPUTER VISION, PT I, 2017, 第 11 作者(40) Image Forgery Detection Based on Semantic Image Understanding, COMPUTER VISION, PT I, 2017, 第 1 作者(41) SSGAN: Secure Steganography Based on Generative Adversarial Networks, 2017, 第 1 作者(42) Image Forgery Detection Based on Semantic Image Understanding, COMPUTER VISION, PT I, 2017, 第 11 作者(43) Improved 3D Lighting Environment Estimation for Image Forgery Detection, PROCEEDINGS OF IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY, 2016, 第 3 作者(44) Quantization based watermarking methods against valumetric distortions, INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2016, 第 3 作者(45) Automatic Detection of 3D Lighting Inconsistencies Via a Facial Landmark Based Morphable Model, PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2016, 第 3 作者(46) Learning and transferring representations for image steganalysis using convolutional neural network, PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2016, 第 2 作者(47) AUTOMATIC DETECTION OF 3D LIGHTING INCONSISTENCIES VIA A FACIAL LANDMARK BASED MORPHABLE MODEL, 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, 第 3 作者(48) An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted Fusion, PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2016, 第 11 作者(49) Perceptual image hashing with selective sampling for salient structure features, DISPLAYS, 2016, 第 3 作者(50) LEARNING AND TRANSFERRING REPRESENTATIONS FOR IMAGE STEGANALYSIS USING CONVOLUTIONAL NEURAL NETWORK, 2016 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2016, 第 11 作者(51) Deep Learning for Steganalysis via Convolutional Neural Networks, PROC. SPIE, ELECTRONIC IMAGING, MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 第 2 作者(52) Deep learning for steganalysis via convolutional neural networks, MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 第 11 作者(53) LOCAL CORRELATION PATTERN FOR IMAGE STEGANALYSIS, 2015 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2015, 第 11 作者(54) ROBUST STEGANALYSIS BASED ON TRAINING SET CONSTRUCTION AND ENSEMBLE CLASSIFIERS WEIGHTING, 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2015, 第 2 作者(55) Detection of computer generated faces in videos based on pulse signal, PROCEEDINGS OF IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2015, 第 3 作者(56) Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System, DIGITAL-FORENSICS AND WATERMARKING, 2015, 第 2 作者(57) Robust steganalysis based on training set construction and ensemble classifiers weighting, ICIP2015, 2015, 第 2 作者(58) Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary Tasks, PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2015, 第 3 作者(59) Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System, DIGITALFORENSICSANDWATERMARKINGIWDW2014, 2015, 第 11 作者(60) Local correlation pattern for image steganalysis, PROCEEDINGS OF IEEE CHINA SUMMIT AND INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2015, 第 2 作者(61) Improved 3D Lighting Environment Estimation for Image Forgery Detection, 2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015, 第 3 作者(62) Improved Robust Watermarking Based on Rational Dither Modulation, CHINESE CONFERENCE ON IMAGE AND GRAPHICS TECHNOLOGIES, 2014, 第 2 作者(63) Exploring DCT Coefficient Quantization Effects for Local Tampering Detection, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 第 2 作者(64) Effects of Fragile and Semi-Fragile Watermarking on Iris Recognition Systems, Int. Workshop Digit. Watermarking (IWDW2014), 2014, 第 1 作者(65) An effective watermarking method against valumetric distortions, PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING4, 2014, 第 2 作者(66) Two Notes from Experimental Study on Image Steganalysis, PROC. INTERNATIONAL CONFERENCE ON INTELLIGENCE COMPUTING, 2013, 第 1 作者(67) Video steganalysis based on the constraints of motion vectors, ICIP2013, 2013, 第 2 作者(68) VIDEO STEGANALYSIS BASED ON THE CONSTRAINTS OF MOTION VECTORS, 2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, 第 2 作者(69) CASIA Image Tampering Detection Evaluation Database, PROCEEDINGS OF 2013 IEEE CHINA SUMMIT AND INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING, 2013, 第 1 作者(70) UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS, 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, 第 2 作者(71) UNIVERSAL SPATIAL FEATURE SET FOR VIDEO STEGANALYSIS, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2012, 第 2 作者(72) An effective image steganalysis method based on neighborhood information of pixels, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2011, 第 1 作者(73) Blind quantitative steganalysis based on feature fusion and gradient boosting, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), 2011, 第 1 作者(74) Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise, DIGITAL WATERMARKING, 2011, 第 2 作者(75) Exploring DCT coefficient quantization effect for image tampering localization, IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2011, 第 3 作者(76) New developments in color image tampering detection, IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS: NANO-BIO CIRCUIT FABRICS AND SYSTEMS(ISCAS), 2010, 第 1 作者(77) New Developments in Color Image Tampering Detection, 2010 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, 2010, 第 3 作者(78) Image tampering detection based on stationary distribution of markov chain, PROCEEDINGS OF 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, 第 3 作者(79) Evaluation of feature sets for steganalysis of JPEG image, IEEE YOUTH CONFERENCE ON INFORMATION, COMPUTING AND TELECOMMUNICATION (YC-ICT), 2010, 第 2 作者(80) IMAGE TAMPERING DETECTION BASED ON STATIONARY DISTRIBUTION OF MARKOV CHAIN, 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, 第 2 作者(81) EFFECTIVE IMAGE SPLICING DETECTION BASED ON IMAGE CHROMA, 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, 第 2 作者(82) A Survey of Passive Image Tampering Detection, DIGITAL WATERMARKING, 2009, 第 2 作者(83) Run-Length and Edge Statistics Based Approach for Image Splicing Detection, DIGITAL WATERMARKING, 2009, 第 11 作者(84) Effective image splicing detection based on image chroma, PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2009, 第 2 作者(85) Multi-class blind steganalysis based on image run-length analysis, DIGITAL WATERMARKING, 2009, 第 11 作者(86) Effects of Watermarking on Iris Recognition Performance, PROC. THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, 2008, 第 1 作者(87) Fusion Based Blind Image Steganalysis by Boosting Feature Selection, DIGITAL WATERMARKING, PROCEEDINGS, 2008, 第 11 作者(88) BLIND IMAGE STEGANALYSIS BASED ON RUN-LENGTH HISTOGRAM ANALYSIS, 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, 第 11 作者(89) Security enhancement of biometrics, cryptography and data hiding by their combinations, PROC. 5TH INTERNATIONAL CONFERENCE ON VISUAL INTFORMATION ENGINEERING, 2008, 第 1 作者(90) Blind Image Steganalysis Based on Run-length Histogram Analysis, PROC. IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2008, 第 1 作者(91) Effects of Watermarking on Iris Recognition Performance, 2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, 第 11 作者(92) Fusion Based Blind Image Steganalysis by Boosting Feature Selection, PROC. INTERNATIONAL WORKSHOP OF DIGITAL WATERMARKING, 2007, 第 1 作者
科研活动
科研项目
( 1 ) 人工智能伪造音视频鉴别技术研究, 负责人, 国家任务, 2022-01--2024-12( 2 ) 互联网环境应用验证项目, 负责人, 国家任务, 2021-07--2023-12( 3 ) 网络流媒体内容伪造鉴定技术研发, 负责人, 境内委托项目, 2020-09--2021-03( 4 ) 网络多媒体鉴伪关键技术研究, 参与, 国家任务, 2020-07--2023-06( 5 ) 讲话人视频智能合成与编辑关键技术, 负责人, 境内委托项目, 2019-12--2022-12( 6 ) 基础教育教学数据采集和分析研究, 负责人, 境内委托项目, 2019-01--2019-12( 7 ) 视觉大数据中人员信息分析及增强, 负责人, 中国科学院计划, 2019-01--2020-06( 8 ) 基于深度对抗学习的隐蔽通信新方法研究, 负责人, 国家任务, 2018-01--2021-12( 9 ) 人工智能与机器人教育, 负责人, 境内委托项目, 2017-09--2020-12( 10 ) IBM学院奖科研基金, 负责人, 境内委托项目, 2017-01--2018-01( 11 ) 中国科学院青年创新促进会, 负责人, 中国科学院计划, 2017-01--2020-12( 12 ) 高强度噪声隐藏下的目标识别及其应用研究, 负责人, 研究所自主部署, 2017-01--2018-12( 13 ) 应对大数据分析的情景融合个性化隐写理论与方法, 负责人, 国家任务, 2017-01--2020-12( 14 ) 群体视觉大数据的透彻感知关键技术, 负责人, 国家任务, 2016-07--2020-06( 15 ) 基于迁移学习的隐写分析新方法研究, 负责人, 国家任务, 2016-01--2018-12( 16 ) 低嵌入率下的图像信息隐藏检测新方法研究, 负责人, 研究所自主部署, 2016-01--2017-12( 17 ) 基于分布式信息源编码的加密域图像可逆信息隐藏模型及方法研究, 负责人, 研究所自主部署, 2016-01--2017-12( 18 ) 基于样本多样性的图像隐写分析优化方法研究, 负责人, 境内委托项目, 2014-05--2015-11( 19 ) 基于图像分析的隐写分析方法, 负责人, 国家任务, 2014-04--2015-04( 20 ) 图像操作历史的智能检测研究, 负责人, 研究所自主部署, 2014-01--2015-12( 21 ) 基于深度学习的隐写分析新方法研究, 负责人, 国家任务, 2014-01--2016-12( 22 ) 文档格式分析研究, 负责人, 国家任务, 2013-06--2014-06( 23 ) 基于图像空域隐写分析新方法研究, 负责人, 国家任务, 2012-04--2013-04( 24 ) 数字版权服务关键支撑技术研究, 负责人, 国家任务, 2012-01--2014-12( 25 ) 面向公共安全的社会感知数据处理, 参与, 国家任务, 2012-01--2016-12( 26 ) 面向数字安全的海量多媒体理解与推荐, 负责人, 研究所自主部署, 2011-08--2012-08( 27 ) 基于视频隐写分析新方法研究, 负责人, 国家任务, 2011-04--2012-04
参与会议
(1)科研发展之路 国际电气电子工程师协会马来西亚分会全球精英论坛 2017-09-17(2)介绍IEEE亚太区女工程师委员会的相关活动计划 赴悉尼参加国际电气电子工程师协会2017年度全球分会代表大会并赴麦考瑞大学交流访问 2017-08-10(3)隐写及隐写分析进展报告 2016智能信息隐藏及多媒体信号处理研讨会 2016-11-20(4)AUTOMATIC DETECTION OF 3D LIGHTING INCONSISTENCIES VIA A FACIAL LANDMARK BASED MORPHABLE MODEL 2016年图像处理国际会议 2016-09-24(5)Robust Steganalysis Based on Training Set Construction and Ensemble Classifiers Weighting 2015年图像处理国际会议 2015-09-26
指导学生
已指导学生
轩心升 硕士研究生 085211-计算机技术
樊红兴 硕士研究生 085211-计算机技术
赵冰浩 硕士研究生 081203-计算机应用技术
阮博文 硕士研究生 085410-人工智能
魏弘毅 硕士研究生 085400-电子信息
现指导学生
董北北 硕士研究生 081203-计算机应用技术
刘通 硕士研究生 085400-电子信息
晋小川 硕士研究生 081203-计算机应用技术