删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

中山大学信息科学与技术学院研究生导师介绍黄继武

中山大学 免费考研网/2012-10-21

黄继武
  • 基本情况
  • 性别:男研究方向:多媒体信息安全、数字水印与信息隐藏、多媒体信号处理办公电话:39943301/39332715电子邮件:isshjw@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~isshjw
  • 详细介绍
  • 基本情况

    工学博士。教授、博士导师。中山大学信息科学与技术学院院长。

    国家杰出青年科学基金获得者。

    教育情况

    西安电子科技大学电子对抗专业,工学学士;

    清华大学通信与电子系统专业,工学硕士;

    中国科学院自动化研究所模式识别与智能系统专业,工学博士。

    研究兴趣

    多媒体取证、数字水印与信息隐藏、多媒体信息安全、多媒体信号处理

    主要学术活动与兼职

    Associateeditor,IEEETransactionsonInformationForensicsandSecurity

    Associateeditor,EURASIPJournalonInformationSecurity(Hindawi),

    Associateeditor,LNCSTransactionsonDataHidingandMultimediaSecurity(Springer)

    编委:计算机学报、通信学报、软件学报、自动化学报、计算机研究与发展。

    BoG(BoardofGovernors)成员,Asia-PacificSignalandInformationProcessingAssociation(APSIPA)

    IEEE电路与系统学会(CASS)多媒体系统与应用技术委员会(MSATC)成员(2002~)

    IEEE信号处理学会(SPS)信息取证与安全技术委员会(IFSTC)成员(2012.1~2014.12)

    IEEECircuits&SystemsSocietyGuangzhouChapter主席,2008-2011

    IEEESignalProcessingSocietyGuangzhouChapte5主席,2010-现在

    信息安全国家重点实验室学术委员会委员

    主讲课程

    图象信息处理、信息处理技术应用、信号与系统

    研究生、博士后招生

    硕士生、博士生、博士后:计算机科学与技术、信息与通信工程

    近年所承担的主要科研项目

    1)NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(2012.1-2015.12)(U1135001).

    2)国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究”(2007.1-2010.12)(60633030)

    3)国家973计划项目“网络媒体智能处理的理论与方法”(2011CB302200)课题4“网络可视媒体安全”(2011CB302204)(2010.1-2014.8)

    4)国家973计划项目“可视媒体智能处理的理论与方法”(2006CB303100)课题4“基于内容的可视媒体安全”(2006CB303104)(2006.9-2010.8)。

    获奖

    稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一)。

    BestStudentPaperAward,IWDW2008(RuiYang,XianguiKang,JiwuHuang.RobustAudioWatermarkingBasedOnLog-polarFrequencyIndex.IWDW2008),2008.(第三)

    近年著作和章节

    [1]王育民、张彤、黄继武、董庆宽编著。信息隐藏技术——理论与应用。清华大学出版社,ISBN7302119252.2006.3。

    [1]Y.Q.Shi,J.Huang,andH.K.Lee.SpreadSpectrumVideoDataHiding,InterleavingandSynchronization.IntelligentWatermarkingTechniques,Chapter18,pp.515-558,WorldScientificPublishingCompany.

    [2]XianguiKang,JiwuHuang,Yun.Q.Shi.ImageDataHidingRobusttoBothGeometricDistortionandJPEGCompression.MultimediaSecurityHandbook(Ed.BorkoFurhtandDarkoKirovski),Chapter15,pp.467-492.CRCPress.2004.

    [3]FangjunHuang,BinLi,Y.Q.Shi,JiwuHuang,GuorongXuan,“ImageSteganalysis”,IntelligentMultimediaAnalysisforSecurityApplications,(Ed.HusrevTahaSencar),Chapter3,pp.275-303,Springer,2010.

    部分期刊论文

    [1]YanqiangLei,WeiqiLuo,YuangenWang,JiwuHuang.VideoSequenceMatchingBasedontheInvarianceofColorCorrelation.IEEETrans.onCircuitsandSystemsforVideoTechnology.(accepted)

    [2]ChuntaoWang,JiangqunNi,JiwuHuang.AnInformedWatermarkingSchemeUsingHiddenMarkovModelintheWaveletDomain.IEEETrans.onInformationForensics&Security.(accepted)

    [3]RuiYang,ZhenhuaQu,JiwuHuang.ExposingMP3AudioForgeriesUsingFrameOffsets.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)

    [4]JianLi,HongmeiLiu,JiwuHuang,YunQ.shi.ReferenceIndex-BasedH.264VideoWatermarkingScheme.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)

    [5]XianguiKang,YanxiangLi,ZhenhuaQu,JiwuHuang.nhancingSourceCameraIdentificationPerformancewithaCameraReferencePhaseSensorPatternNoise.IEEETrans.onInformationForensics&Security(accepted)

    [6]GuopuZhu,SamKwong,JiwuHuang,andJianquanYang.RandomGrayCodeandItsPerformanceAnalysisforImageHashing.SignalProcessing.91(2011)2178–2193.

    [7]YanqingLei,YunagenWang,JiwuHuang.RobustImageHashinRadonTransformDomainforAuthentication.SignalProcessing:ImageCommunication.26(2011)280–288

    [8]ShijunXiang,JianquanYang,JiwuHuang,“PerceptualVideoHashingRobustAgainstGeometricDistortions,”ScienceChina:InformationSciences.(accepted)

    [9]XianguiKang,Member,IEEE,RuiYang,StudentMember,IEEE,andJiwuHuang.GeometricInvariantAudioWatermarkingBasedonanLCMFeature.IEEETrans.onMultimedia,13(2):181-190,April,2011.

    [10]WeiqiLuo,JiwuHuang.SecurityAnalysisonSpatial±1SteganographyforJPEGDecompressedImages.IEEESignalProcessingLetters,18(1):39-42,2011.

    [11]FangjunHuang,WeiqiLuo,JiwuHuang.SteganalysisofJPEGsteganographywithcomplementaryembeddingstrategy.IETInformationSecurity,5(1):10-18.2011

    [12]WeiqiLuo,JiwuHuang.AMoreSecureSteganographyBasedonAdaptivePixel-ValueDifferencingScheme.MultimediaToolsandApplications.Volume52,Issue2,Page407-430,2011

    [13]HongmeiLiu,XinzhiYao,JiwuHuang:Minoritycodeswithimprovedembedding
    efficiencyforlargepayloads.MultimediaToolsApplications.52(2-3):431-443(2011)

    [14]FangjunHuang,JiwuHuang,YunQ.Shi.DetectingDoubleJPEGCompressionwiththeSameQuantizationMatrix.IEEETrans.onInformationForensics&Security,5(4):838-856.

    [15]WeiqiLuo,YuangenWang,JiwuHuang.DetectionofQuantizationArtifactsandItsApplicationstoTransformEncoderIdentification.IEEETrans.onInformationForensics&Security,5(4):810-815,2010

    [16]FangjunHuang,JiwuHuang,YunQ.Shi.AnExperimentalStudyontheSecurityPerformanceofYASS.IEEETrans.onInformationForensics&Security,5(3):374-380

    [17]WeiqiLuo,JiwuHuang.JPEGErrorAnalysisandItsApplicationstoDigitalImageForensics.IEEETrans.onInformationForensics&Security,5(3):480-491

    [18]WeiqiLuo,FangjunHuang,JiwuHuang.EdgeAdaptiveImageSteganographyBasedonLSBMatchingRevisited.IEEETrans.onInformationForensics&Security,5(2):201-214,2010.

    [19]XianguiKang,JiwuHuang,WenjunZeng.EfficientGeneralPrint-ScanningResilientDataHidingBasedonUniformLog-polarMapping.IEEETrans.onInformationForensics&Security,5(1):1-12,2010.

    [20]GuopuZhu,JiwuHuang,SamKwong,JianquanYang.FragilityAnalysisofAdaptiveQuantizationBasedImageHashing.IEEETrans.onInformationForensics&Security,5(1):133-147,2010.

    [21]YongWang,ShaoquanWu,andJiwuHuang.AudioWatermarkingSchemeRobustagainstDesynchronizationBasedontheDyadicWaveletTransform,EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID232616,17pages

    [22]HongmeiLiu,XinzhiYaoandJiwuHuang.“Semi-FragileZernikeMoment-BasedImageWatermarkingforAuthentication”EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID341856,17pages

    [23]YongWang,JiwuHuang.RobustAVSAudioWatermarking.ScienceChina:InformationSciences.53(3):607-618.2010

    [24]GuopuZhu,JiwuHuang,SamKwong,JianquanYang.AStudyontheRandomnessMeasureofImage.IEEETrans.onInformationForensics&Security,4(4):928-932,2009

    [25]BinLi,JiwuHuang,YunQ.Shi.SteganalysisofYASS.IEEETrans.onInformationForensics&Security,4(3):369-382,2009.

    [26]XianguiKang,JiwuHuang,WenjunZeng,YunQ.Shi.Non-ambiguityofBlindWatermarking:aRevisitwithAnalyticalResolution.ScienceinChinaSeriesF:InformationSciences.52(2):276-285,2009.2.

    [27]FengPan,JiongbinChen,JiwuHuang.DiscriminatingComputerGraphicsImagesandNaturalImagesUsingFractalGeometry.ScienceinChinaSeriesF:InformationSciences.52(2):329-337,2009.2.

    [28]FangJunHuang,JiwuHuang:CalibrationbaseduniversalJPEGsteganalysis.ScienceinChinaSeriesF:InformationSciences,52(2):260-268(2009)

    [29]XianguiKang,JiwuHuang,WenjunZeng.ImprovingRobustnessofQuantization-BasedImagewatermarkingviaAdaptiveReceiver.IEEETrans.onMultimedia,vol.10,no.6,pp.953-959,Oct.2008.

    [30]ShijunXiang,Hyoung-JoongKim,JiwuHuang.InvariantImageWatermarkingBasedontheStatisticalFeaturesintheLow-FrequencyDomain.IEEETrans.onCircuitsandSystemsforVideoTechnology,18(6):777-790,2008.

    [31]ShijunXiang,HJKimandJiwuHuang“AudioWatermarkingRobusttoTime-ScaleModificationandMP3Compression”SignalProcessing,vol.88,pp.2372-2388.2008.

    [32]BinLi,YanmeiFangandJiwuHuang.SteganalysisofMultiple-BaseNotationalSystemSteganography.IEEESignalProcessingLetter,vol.15,pp.493-496.2008

    [33]ShijunXiang,JiwuHuang.Histogram-BasedAudioWatermarkingagainstTime-ScaleModificationsandCroppingAttacks.IEEETrans.onMultimedia.9(7):1357-1372,2007.

    [34]NingBi;QiyuSun;DarenHuang;ZhihuaYang;JiwuHuang.RobustImageWatermarkingBasedonMultibandWaveletsandEmpiricalModeDecomposition.IEEETrans.onImageProcessing.2007,16(8):1956-1966.

    [35]LUOWeiqi,QUZhenhua,PANFeng,HUANGJiwu.ASurveyofPassiveTechnologyforDigitalImageForensics.FrontiersofComputerScienceinChina.1(2):166-179.2007

    [36]YongjianHu,SamKwong,JiwuHuang.Anewmethodofreversiblevisiblewatermarking.IEEETrans.onCircuitsandSystemsforVideoTechnology.16(1):129-133,2006.

    [37]JunhuiHe,JiwuHuang.Steganalysisofstochasticmodulationsteganography.ScienceinChina:SeriesFInformationSciences,2006,49(3):273-285.

    [38]ShaoquanWu,JiwuHuang,DarenHuang,YunQ.Shi,EfficientlySelf-SynchronizedAudioWatermarkingforAssuredAudioDataTransmission.IEEETrans.onBroadcasting.2005,51(1):69-76.

    [39]XianguiKang,JiwuHuang,YunQ.Shi,YanLin.ADWT-DFTcompositewatermarkingschemerobusttobothaffinetransformandJPEGcompression.IEEETrans.onCircuitsandSystemsforVideoTechnology.2003,13(8):776-786.

    [40]JiwuHuang,YunQ.Shi.ReliableInformationBitHiding.IEEETrans.onCircuitsandSystemsforVideoTechnology.2002,12(10):916-920.

    [41]JunquanHu,JiwuHuang,DarenHuang.YunQ.Shi,ImageFragileWatermarkingBasedonFusionofMulti-ResolutionTamperDetection.IEEElectronicsLetters.2002,38(24):1512-1513.

    [42]JiwuHuang,YunQ.Shi,YiShi,EmbeddingimagewatermarksinDCcomponents,IEEETrans.onCircuitsandSystemsforVideoTechnology.2000,10(6),pp.974-979.

    部分会议论文

    [1]LigangZheng,GuopingQiu,JiwuHuang.EfficientCoarse-To-FineNear-DuplicateImageDetectionInRiemannianManifold.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)

    [2]DaLuo,WeiqiLuo,RuiYang,JiwuHuang.CompressionHistoryIdentificationforDigitalAudioSignal.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)

    [3]PeijiaZheng,JiwuHuang.ImplementationoftheDiscreteWaveletTransformandMultiresolutionAnalysisintheEncryptedDomain.ACMMultimedia2011,pp.413-422.

    [4]LigangZheng,GuopingQiu,JiwuHuang.SalientCovarianceForNear-duplicateImageAndVideoDetection.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2585-2588,2011.

    [5]HaotianWu,JiwuHuang.SecureJPEGsteganographybyLSB+matchingandmulti-bandembedding.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2793-2796,2011.

    [6]Yuan-GenWang,YanqiangLei,JiwuHuang.Animagecopydetectionschemebasedonradontransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010

    [7]ChuntaoWang,JiangqunNi,HuashuoZhuo,JiwuHuang.Ageometricallyresilientrobustimagewatermarkingschemeusingdeformablemulti-scaletransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010

    [8]JianCao,JiwuHuang,JiangqunNi.SpreadSpectrumWatermarkingtoAchieveaTrade-offBetweenSecurityandRobustness.Proc.ofInt.WorkshoponInformationHiding2010

    [9]JianCao,JiwuHuang.ProvablySecureSpread-spectrumWatermarkingSchemesintheKnownMessageAttack.Proc.ofInt.WorkshoponInformationHiding2010

    [10]DongZhang,JiangqunNi,QipingZeng,Dah-JyeLee,andJiwuHuang.SecurityAnalysisofISSWatermarkingUsingNaturalSceneStatistics.Proc.ofInt.WorkshoponInformationHiding2010

    [11]RuiYang,YunQ.Shi,JiwuHuang.Detectingdoublecompressionofaudiosignal.Proc.IS&T/SPIEElectronicImaging2010:MediaForensicsandSecurityXII,2010.1

    [12]ZhenhuaQu,GuopingQiu,andJiwuHuang.DetectDigitalImageSplicingwithVisualCues.Proc.of11thInt.WorkshoponInformationHiding.LNCS5806,pp.247-261,2009

    [13]XinzhiYao,HongmeiLiu,WeiRui,JiwuHuang.Content-basedauthenticationalgorithmforbinaryimages.Proc.of2007IEEEInt.Conf.onImageProcessing,pp.2893-2896,2009

    [14]RuiYang,YunQ.Shi,JiwuHuang.DefeatingFake-QualityMP3.Proc.ofthe11thACMWorkshoponMultimediaandSecurity,pp.117-124,2009

    [15]YongWang,JiwuHuang.RobustAVSAudioWatermarking.Proc.of8thIntWorkshoponDigitalProcessing,LNCS5703,pp.29-38,2009

    [16]ChongChen,JiangqunNi,JiwuHuang:TemporalStatisticBasedVideoWatermarkingSchemeRobustagainstGeometricAttacksandFrameDropping.Proc.of8thInt.WorkshoponDigitalWatermarking,LNCS5703,pp.81-95,2009

    [17]JiangqunNi,RongyueZhang,JiwuHuang.WatermarkingSecurityIncorporatingNaturalSceneStatistics.Proc.of10thInt.WorkshoponInformationHiding.LNCS5284,pp.132-146,2008.

    [18]ZhenhuaQu,WeiqiLuo,JiwuHuang,“Aconvolutivemixingmodelforshifteddoublejpegcompressionwithapplicationtopassiveimageauthentication,”Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2008,1661-1664.

    [19]FangjunHuang,BinLi,JiwuHuang.UniversalJPEGsteganalysisbasedonmicroscopicandmacroscopiccalibration.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2068-2071,2008

    [20]FangjunHuang,YunQ.Shi,JiwuHuang.AstudyonsecurityperformanceofYASS.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2084-2087,2008.

    [21]XianguiKang,XiongZhong,JiwuHuang,WenjunZeng.Anefficientprint-scanningresilientdatahidingschemebasedonanovelLPM.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2080-2083,2008

    [22]WeiqiLuo,MinWu,JiwuHuang.MPEGrecompressiondetectionbasedonblockartifacts.Proc.ofSPIE:Security,Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.68190X-68190X-12,2008.

    [23]BinLi,JiwuHuang,YunQ.Shi.Texturalfeaturebaseduniversalsteganalysis.Proc.ofSPIE:Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.681912-681912-12,2008

    [24]BinLi,YunQ.Shi,JiwuHuang:SteganalysisofYASS.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:139-148,2008

    [25]RuiYang,ZhenhuaQu,JiwuHuang:Detectingdigitalaudioforgeriesbycheckingframeoffsets.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:21-26,2008

    [26]ChuntaoWang,JiangqunNi,JiwuHuang,RongyueZhang,MeiyingHuang.Robustandhighcapacityimagewatermarkingbasedonjointlycodingandembeddingoptimization.Proc.of9thInt.WorkshoponInformationHiding.LNCS4567,pp.65-79.2007

    [27]WeiqiLuo,ZhenhuaQu,JiwuHuang,GuopingQiu.Anovelmethodfordetectingcroppedandrecompressedimageblock.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II217-220.

    [28]JiangqunNi,ChuntaoWang,JiwuHuang,RongyueZhang,MeiyingHuang.AGA-basedjointcodingandembeddingoptimizationforrobustandhighcapacityimagewatermarking.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II181-184.

    [29]HongmeiLiu,WeiRui,JiwuHuang.BinaryimageauthenticationusingZernikemoments.Proc.of2007IEEEInt.Conf.onImageProcessing,vol.1,pp.385-388.

    [30]BinLi,FangjunHuang,JiwuHuang.SteganalysisofLSBGreedyEmbeddingAlgorithmforJPEGImagesUsingCoefficientSymmetry.Proc.ofIEEE2007Int.Conf.onImageProcessing.vol.1,pp.413-416,2007

    [31]FangjunHuang,BinLi,JiwuHuang.Attacklsbmatchingsteganographybycountingalterationrateofthenumberofneighbourhoodgraylevels.Proc.of2007IEEEInt.Conf.onImageProcessing.vol.1,pp.401-404,2007

    [32]XianguiKang,ChunhuiLiu,WenjunZeng,JiwuHuang,CongbaiLiu.FastandAutomaticWatermarkResynchronizationbasedonZernikeMoments.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050E-1-10

    [33]YongWang,ShaoquanWu,JiwuHuang.Audiowatermarkingrobusttogeometricaldistortionsbasedondyadicwavelettransform.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050A-1-12.

    [34]ShunquanTan,JiwuHuang,andYunQ.Shi.SteganalysisofEnhancedBPCSSteganographyUsingtheHilbert-HuangTransformBasedSequentialAnalysis.Proc.of6thIntWorkshoponDigitalWatermarking,LNCS5041,pp.143-157,2007

    [35]BinLi,FangjunHuang,ShunquanTan,JiwuHuang,YunQ.Shi.EffectofCodingPatternonCompressionDomainBasedUniversalJPEGSteganalysis.Proc.of6thInt.WorkshoponDigitalWatermarking,LNCS5041,pp.112-126,2007

    联系办法

    实验室:广州大学城中山大学东校区实验楼B-502。

    Tel:020-39332715,Fax:020-39332716

    Email:isshjw@mail.sysu.edu.cn

    JiwuHuang

    ________________________________________________________________________________

    PositionandContactInformation

    Professoranddean,SchoolofInformationScienceandTechnology,SunYat-senUniversity,China.

    Address:Dr.JiwuHUANG

    SchoolofInformationScienceandTechnology

    SunYat-SenUniversity

    GuangzhouHighEducationMegaCity,PanyuDistrict

    Guangzhou,510006

    P.R.China

    Tel:(86)20-39332715(o)

    Fax:(86)20-39332716

    Email:isshjw@mail.sysu.edu.cn

    ________________________________________________________________________________

    Education:

    Ph.D.PatternRecognitionandIntelligentSystem,

    InstituteofAutomation,ChineseAcademyofScience,China,1998

    M.S.ElectronicEngineering,TsinghuaUniversity,China,1987

    B.S.ElectronicEngineering,XidianUniversity,China,1982,

    ________________________________________________________________________________

    RESEARCHINTERESTING:

    DigitalWatermarkingandDataHiding,MultimediaForensicsandSecurity,MultimediaSignalProcessing

    ________________________________________________________________________________

    HONORANDAWARDS:

    1.Thefirst-gradeawardinteaching,GuangdongProvinceGovernment,China,2010

    2.Thebeststudentpaperaward,8thInternationalWorkshoponDigitalWatermarking(Pusan,Korea)in2008.

    3.Thefirst-gradeawardinscienceresearch,theNationalMinistryofEducation,China,2004

    4.ChinaNationalFundsforDistinguishedYoungScientists,NSFofChina,2003

    5.TheBestPaperAwardinNatureScienceinGuangdongProvince,2001

    6.Thefirst-gradeawardforexcellentjournalpaper,ChinaSocietyandTechnologyAssociation,2009

    ________________________________________________________________________________

    RECENTRESEARCHGRANTS(PI)

    1.“SecurityTechnologyandEvaluationforDigitalMedia,”NSFofChina,2007.1~2010.12.

    2.“SecurityforVisualMediainNetworks,”NationalBasicResearchProgramofChina(973program),theMinistryofScienceandTechnology,China,2010.1~2014.8.

    3.“ContentSecurityforVisualMedia,”NationalBasicResearchProgramofChina(973program),theMinistryofScienceandTechnology,China,2006.9~2010.8.

    ________________________________________________________________________________

    ProfessionalActivities

    AssociateEditor,IEEETrans.onInformationForensicsandSecurity

    AssociateEditor,EURASIPJournalonInformationSecurity(Hindawi),2008-present

    AssociateEditor,LNCSTransactionsonDataHidingandMultimediaSecurity(Springer-Verlag)2006-present

    MemberofMultimediaSystemsandApplicationsTechnicalCommittee,IEEECircuitsandSystemsSociety,2002-present

    MemberofInformationForensicsandSecurityTechnicalCommittee,IEEESignalProcessingSociety,2012.1-2014.12

    Chair,GuangzhouChapterofIEEECircuitsandSystemsSociety,2008-present

    Chair,GuangzhouChapterofIEEESignalProcessingSociety,2010-present

    BoGmember,AsiaPacificSignalandInformationProcessingAssociation(APSIPA),2009-present

    President,GuangdongAssociationofImageandGraphics,China,2001-2009.

    ________________________________________________________________________________

    BOOKandBOOKCHAPTERs

    1.YuminWang,TongZhang,JiwuHuang,QingkuanDong.InformationHidingTechnology:TheoryandApplications.TsinghuaUniversityPress,2006

    2.Y.Q.Shi,J.Huang,andH.K.Lee.SpreadSpectrumVideoDataHiding,InterleavingandSynchronization.IntelligentWatermarkingTechniques,Chapter18,pp.515-558,WorldScientificPublishingCompany.

    3.XianguiKang,JiwuHuang,Yun.Q.Shi.ImageDataHidingRobusttoBothGeometricDistortionandJPEGCompression.MultimediaSecurityHandbook(Ed.BorkoFurhtandDarkoKirovski),Chapter15,pp.467-492.CRCPress.2004.

    4.FangjunHuang,BinLi,Y.Q.Shi,JiwuHuang,GuorongXuan,“ImageSteganalysis”,IntelligentMultimediaAnalysisforSecurityApplications,(Ed.HusrevTahaSencar),Chapter3,pp.275-303,Springer,2010.

    ________________________________________________________________________________

    SOMESELECTEDJOURNALPAPERS

    1.YanqiangLei,WeiqiLuo,YuangenWang,JiwuHuang.VideoSequenceMatchingBasedontheInvarianceofColorCorrelation.IEEETrans.onCircuitsandSystemsforVideoTechnology.(accepted)

    2.ChuntaoWang,JiangqunNi,JiwuHuang.AnInformedWatermarkingSchemeUsingHiddenMarkovModelintheWaveletDomain.IEEETrans.onInformationForensics&Security.(accepted)

    3.RuiYang,ZhenhuaQu,JiwuHuang.ExposingMP3AudioForgeriesUsingFrameOffsets.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)

    4.JianLi,HongmeiLiu,JiwuHuang,YunQ.shi.ReferenceIndex-BasedH.264VideoWatermarkingScheme.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)

    5.XianguiKang,YanxiangLi,ZhenhuaQu,JiwuHuang.nhancingSourceCameraIdentificationPerformancewithaCameraReferencePhaseSensorPatternNoise.IEEETrans.onInformationForensics&Security(accepted)

    6.GuopuZhu,SamKwong,JiwuHuang,andJianquanYang.RandomGrayCodeandItsPerformanceAnalysisforImageHashing.SignalProcessing.91(2011)2178–2193.

    7.YanqingLei,YunagenWang,JiwuHuang.RobustImageHashinRadonTransformDomainforAuthentication.SignalProcessing:ImageCommunication.26(2011)280–288

    8.ShijunXiang,JianquanYang,JiwuHuang,“PerceptualVideoHashingRobustAgainstGeometricDistortions,”ScienceChina:InformationSciences.(accepted)

    9.XianguiKang,Member,IEEE,RuiYang,StudentMember,IEEE,andJiwuHuang.GeometricInvariantAudioWatermarkingBasedonanLCMFeature.IEEETrans.onMultimedia,13(2):181-190,April,2011.

    10.WeiqiLuo,JiwuHuang.SecurityAnalysisonSpatial±1SteganographyforJPEGDecompressedImages.IEEESignalProcessingLetters,18(1):39-42,2011.

    11.FangjunHuang,WeiqiLuo,JiwuHuang.SteganalysisofJPEGsteganographywithcomplementaryembeddingstrategy.IETInformationSecurity,5(1):10-18.2011

    12.WeiqiLuo,JiwuHuang.AMoreSecureSteganographyBasedonAdaptivePixel-ValueDifferencingScheme.MultimediaToolsandApplications.Volume52,Issue2,Page407-430,2011

    13.HongmeiLiu,XinzhiYao,JiwuHuang:Minoritycodeswithimprovedembedding
    efficiencyforlargepayloads.MultimediaToolsApplications.52(2-3):431-443(2011)

    14.FangjunHuang,JiwuHuang,YunQ.Shi.DetectingDoubleJPEGCompressionwiththeSameQuantizationMatrix.IEEETrans.onInformationForensics&Security,5(4):838-856.

    15.WeiqiLuo,YuangenWang,JiwuHuang.DetectionofQuantizationArtifactsandItsApplicationstoTransformEncoderIdentification.IEEETrans.onInformationForensics&Security,5(4):810-815,2010

    16.FangjunHuang,JiwuHuang,YunQ.Shi.AnExperimentalStudyontheSecurityPerformanceofYASS.IEEETrans.onInformationForensics&Security,5(3):374-380

    17.WeiqiLuo,JiwuHuang.JPEGErrorAnalysisandItsApplicationstoDigitalImageForensics.IEEETrans.onInformationForensics&Security,5(3):480-491

    18.WeiqiLuo,FangjunHuang,JiwuHuang.EdgeAdaptiveImageSteganographyBasedonLSBMatchingRevisited.IEEETrans.onInformationForensics&Security,5(2):201-214,2010.

    19.XianguiKang,JiwuHuang,WenjunZeng.EfficientGeneralPrint-ScanningResilientDataHidingBasedonUniformLog-polarMapping.IEEETrans.onInformationForensics&Security,5(1):1-12,2010.

    20.GuopuZhu,JiwuHuang,SamKwong,JianquanYang.FragilityAnalysisofAdaptiveQuantizationBasedImageHashing.IEEETrans.onInformationForensics&Security,5(1):133-147,2010.

    21.YongWang,ShaoquanWu,andJiwuHuang.AudioWatermarkingSchemeRobustagainstDesynchronizationBasedontheDyadicWaveletTransform,EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID232616,17pages

    22.HongmeiLiu,XinzhiYaoandJiwuHuang.“Semi-FragileZernikeMoment-BasedImageWatermarkingforAuthentication”EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID341856,17pages

    23.YongWang,JiwuHuang.RobustAVSAudioWatermarking.ScienceChina:InformationSciences.53(3):607-618.2010

    24.GuopuZhu,JiwuHuang,SamKwong,JianquanYang.AStudyontheRandomnessMeasureofImage.IEEETrans.onInformationForensics&Security,4(4):928-932,2009

    25.BinLi,JiwuHuang,YunQ.Shi.SteganalysisofYASS.IEEETrans.onInformationForensics&Security,4(3):369-382,2009.

    26.XianguiKang,JiwuHuang,WenjunZeng,YunQ.Shi.Non-ambiguityofBlindWatermarking:aRevisitwithAnalyticalResolution.ScienceinChinaSeriesF:InformationSciences.52(2):276-285,2009.2.

    27.FengPan,JiongbinChen,JiwuHuang.DiscriminatingComputerGraphicsImagesandNaturalImagesUsingFractalGeometry.ScienceinChinaSeriesF:InformationSciences.52(2):329-337,2009.2.

    28.FangJunHuang,JiwuHuang:CalibrationbaseduniversalJPEGsteganalysis.ScienceinChinaSeriesF:InformationSciences,52(2):260-268(2009)

    29.XianguiKang,JiwuHuang,WenjunZeng.ImprovingRobustnessofQuantization-BasedImagewatermarkingviaAdaptiveReceiver.IEEETrans.onMultimedia,vol.10,no.6,pp.953-959,Oct.2008.

    30.ShijunXiang,Hyoung-JoongKim,JiwuHuang.InvariantImageWatermarkingBasedontheStatisticalFeaturesintheLow-FrequencyDomain.IEEETrans.onCircuitsandSystemsforVideoTechnology,18(6):777-790,2008.

    31.ShijunXiang,HJKimandJiwuHuang“AudioWatermarkingRobusttoTime-ScaleModificationandMP3Compression”SignalProcessing,vol.88,pp.2372-2388.2008.

    32.BinLi,YanmeiFangandJiwuHuang.SteganalysisofMultiple-BaseNotationalSystemSteganography.IEEESignalProcessingLetter,vol.15,pp.493-496.2008

    33.ShijunXiang,JiwuHuang.Histogram-BasedAudioWatermarkingagainstTime-ScaleModificationsandCroppingAttacks.IEEETrans.onMultimedia.9(7):1357-1372,2007.

    34.NingBi;QiyuSun;DarenHuang;ZhihuaYang;JiwuHuang.RobustImageWatermarkingBasedonMultibandWaveletsandEmpiricalModeDecomposition.IEEETrans.onImageProcessing.2007,16(8):1956-1966.

    35.LUOWeiqi,QUZhenhua,PANFeng,HUANGJiwu.ASurveyofPassiveTechnologyforDigitalImageForensics.FrontiersofComputerScienceinChina.1(2):166-179.2007

    36.YongjianHu,SamKwong,JiwuHuang.Anewmethodofreversiblevisiblewatermarking.IEEETrans.onCircuitsandSystemsforVideoTechnology.16(1):129-133,2006.

    37.JunhuiHe,JiwuHuang.Steganalysisofstochasticmodulationsteganography.ScienceinChina:SeriesFInformationSciences,2006,49(3):273-285.

    38.ShaoquanWu,JiwuHuang,DarenHuang,YunQ.Shi,EfficientlySelf-SynchronizedAudioWatermarkingforAssuredAudioDataTransmission.IEEETrans.onBroadcasting.2005,51(1):69-76.

    39.XianguiKang,JiwuHuang,YunQ.Shi,YanLin.ADWT-DFTcompositewatermarkingschemerobusttobothaffinetransformandJPEGcompression.IEEETrans.onCircuitsandSystemsforVideoTechnology.2003,13(8):776-786.

    40.JiwuHuang,YunQ.Shi.ReliableInformationBitHiding.IEEETrans.onCircuitsandSystemsforVideoTechnology.2002,12(10):916-920.

    41.JunquanHu,JiwuHuang,DarenHuang.YunQ.Shi,ImageFragileWatermarkingBasedonFusionofMulti-ResolutionTamperDetection.IEEElectronicsLetters.2002,38(24):1512-1513.

    42.JiwuHuang,YunQ.Shi,YiShi,EmbeddingimagewatermarksinDCcomponents,IEEETrans.onCircuitsandSystemsforVideoTechnology.2000,10(6),pp.974-979.

    ________________________________________________________________________________

    SOMESELECTEDCONFERENCEPAPERS

    1.LigangZheng,GuopingQiu,JiwuHuang.EfficientCoarse-To-FineNear-DuplicateImageDetectionInRiemannianManifold.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)

    2.DaLuo,WeiqiLuo,RuiYang,JiwuHuang.CompressionHistoryIdentificationforDigitalAudioSignal.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)

    3.PeijiaZheng,JiwuHuang.ImplementationoftheDiscreteWaveletTransformandMultiresolutionAnalysisintheEncryptedDomain.ACMMultimedia2011,pp.413-422.

    4.LigangZheng,GuopingQiu,JiwuHuang.SalientCovarianceForNear-duplicateImageAndVideoDetection.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2585-2588,2011.

    5.HaotianWu,JiwuHuang.SecureJPEGsteganographybyLSB+matchingandmulti-bandembedding.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2793-2796,2011.

    6.Yuan-GenWang,YanqiangLei,JiwuHuang.Animagecopydetectionschemebasedonradontransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010

    7.ChuntaoWang,JiangqunNi,HuashuoZhuo,JiwuHuang.Ageometricallyresilientrobustimagewatermarkingschemeusingdeformablemulti-scaletransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010

    8.JianCao,JiwuHuang,JiangqunNi.SpreadSpectrumWatermarkingtoAchieveaTrade-offBetweenSecurityandRobustness.Proc.ofInt.WorkshoponInformationHiding2010

    9.JianCao,JiwuHuang.ProvablySecureSpread-spectrumWatermarkingSchemesintheKnownMessageAttack.Proc.ofInt.WorkshoponInformationHiding2010

    10.DongZhang,JiangqunNi,QipingZeng,Dah-JyeLee,andJiwuHuang.SecurityAnalysisofISSWatermarkingUsingNaturalSceneStatistics.Proc.ofInt.WorkshoponInformationHiding2010

    11.RuiYang,YunQ.Shi,JiwuHuang.Detectingdoublecompressionofaudiosignal.Proc.IS&T/SPIEElectronicImaging2010:MediaForensicsandSecurityXII,2010.1

    12.ZhenhuaQu,GuopingQiu,andJiwuHuang.DetectDigitalImageSplicingwithVisualCues.Proc.of11thInt.WorkshoponInformationHiding.LNCS5806,pp.247-261,2009

    13.XinzhiYao,HongmeiLiu,WeiRui,JiwuHuang.Content-basedauthenticationalgorithmforbinaryimages.Proc.of2007IEEEInt.Conf.onImageProcessing,pp.2893-2896,2009

    14.RuiYang,YunQ.Shi,JiwuHuang.DefeatingFake-QualityMP3.Proc.ofthe11thACMWorkshoponMultimediaandSecurity,pp.117-124,2009

    15.YongWang,JiwuHuang.RobustAVSAudioWatermarking.Proc.of8thIntWorkshoponDigitalProcessing,LNCS5703,pp.29-38,2009

    16.ChongChen,JiangqunNi,JiwuHuang:TemporalStatisticBasedVideoWatermarkingSchemeRobustagainstGeometricAttacksandFrameDropping.Proc.of8thInt.WorkshoponDigitalWatermarking,LNCS5703,pp.81-95,2009

    17.JiangqunNi,RongyueZhang,JiwuHuang.WatermarkingSecurityIncorporatingNaturalSceneStatistics.Proc.of10thInt.WorkshoponInformationHiding.LNCS5284,pp.132-146,2008.

    18.ZhenhuaQu,WeiqiLuo,JiwuHuang,“Aconvolutivemixingmodelforshifteddoublejpegcompressionwithapplicationtopassiveimageauthentication,”Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2008,1661-1664.

    19.FangjunHuang,BinLi,JiwuHuang.UniversalJPEGsteganalysisbasedonmicroscopicandmacroscopiccalibration.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2068-2071,2008

    20.FangjunHuang,YunQ.Shi,JiwuHuang.AstudyonsecurityperformanceofYASS.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2084-2087,2008.

    21.XianguiKang,XiongZhong,JiwuHuang,WenjunZeng.Anefficientprint-scanningresilientdatahidingschemebasedonanovelLPM.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2080-2083,2008

    22.WeiqiLuo,MinWu,JiwuHuang.MPEGrecompressiondetectionbasedonblockartifacts.Proc.ofSPIE:Security,Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.68190X-68190X-12,2008.

    23.BinLi,JiwuHuang,YunQ.Shi.Texturalfeaturebaseduniversalsteganalysis.Proc.ofSPIE:Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.681912-681912-12,2008

    24.BinLi,YunQ.Shi,JiwuHuang:SteganalysisofYASS.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:139-148,2008

    25.RuiYang,ZhenhuaQu,JiwuHuang:Detectingdigitalaudioforgeriesbycheckingframeoffsets.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:21-26,2008

    26.ChuntaoWang,JiangqunNi,JiwuHuang,RongyueZhang,MeiyingHuang.Robustandhighcapacityimagewatermarkingbasedonjointlycodingandembeddingoptimization.Proc.of9thInt.WorkshoponInformationHiding.LNCS4567,pp.65-79.2007

    27.WeiqiLuo,ZhenhuaQu,JiwuHuang,GuopingQiu.Anovelmethodfordetectingcroppedandrecompressedimageblock.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II217-220.

    28.JiangqunNi,ChuntaoWang,JiwuHuang,RongyueZhang,MeiyingHuang.AGA-basedjointcodingandembeddingoptimizationforrobustandhighcapacityimagewatermarking.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II181-184.

    29.HongmeiLiu,WeiRui,JiwuHuang.BinaryimageauthenticationusingZernikemoments.Proc.of2007IEEEInt.Conf.onImageProcessing,vol.1,pp.385-388.

    30.BinLi,FangjunHuang,JiwuHuang.SteganalysisofLSBGreedyEmbeddingAlgorithmforJPEGImagesUsingCoefficientSymmetry.Proc.ofIEEE2007Int.Conf.onImageProcessing.vol.1,pp.413-416,2007

    31.FangjunHuang,BinLi,JiwuHuang.Attacklsbmatchingsteganographybycountingalterationrateofthenumberofneighbourhoodgraylevels.Proc.of2007IEEEInt.Conf.onImageProcessing.vol.1,pp.401-404,2007

    32.XianguiKang,ChunhuiLiu,WenjunZeng,JiwuHuang,CongbaiLiu.FastandAutomaticWatermarkResynchronizationbasedonZernikeMoments.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050E-1-10

    33.YongWang,ShaoquanWu,JiwuHuang.Audiowatermarkingrobusttogeometricaldistortionsbasedondyadicwavelettransform.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050A-1-12.

    34.ShunquanTan,JiwuHuang,andYunQ.Shi.SteganalysisofEnhancedBPCSSteganographyUsingtheHilbert-HuangTransformBasedSequentialAnalysis.Proc.of6thIntWorkshoponDigitalWatermarking,LNCS5041,pp.143-157,2007

    35.BinLi,FangjunHuang,ShunquanTan,JiwuHuang,YunQ.Shi.EffectofCodingPatternonCompressionDomainBasedUniversalJPEGSteganalysis.Proc.of6thInt.WorkshoponDigitalWatermarking,LNCS5041,pp.112-126,2007

    ________________________________________________________________________________

    PATENTSS

    Tohave22authorizedpatentsandother20patentspending.

    ________________________________________________________________________________

    相关话题/信息科学 导师

    • 领限时大额优惠券,享本站正版考研考试资料!
      大额优惠券
      优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
      本站小编 Free壹佰分学习网 2022-09-19
    • 中山大学信息科学与技术学院研究生导师介绍龙冬阳
      龙冬阳基本情况性别:男暂无图片研究方向:办公电话:电子邮件:issldy@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~issldy详细介绍DrDongyangLong龙冬阳博士、教授、博士生导师联系方式:86-020-8403723786-020-84113673issldy@mail.sysu.edu.cnCurriculumVitaeEducat ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍刘咏梅
      刘咏梅基本情况性别:女暂无图片研究方向:人工智能,知识表示与推理,认知机器人学,程序的调试和验证.办公电话:电子邮件:ymliu@mail.sysu.edu.cn个人主页:http://www.cs.sysu.edu.cn/~ymliu详细介绍刘咏梅,教授,博士生导师个人主页:http://www.cs.sysu.edu.cn/~ymliu教育背景:于加拿大多伦多大学计算机科学系获博士学位。研究兴 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍林小拉
      林小拉基本情况性别:男暂无图片研究方向:并行与分布式计算,计算机网络办公电话:84112133电子邮件:linxl@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~linxl详细介绍基本情况:计算机科学系教授、博士生导师。教育背景:博士计算机科学美国密歇根州立大学硕士计算机科学北京大学学士计算机科学北京大学研究领域:并行与分布式计算、计算机网络、计算金融 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍李磊
      李磊基本情况性别:男暂无图片研究方向:办公电话:84110658,84110084-100电子邮件:lnslilei@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~lnslilei详细介绍李磊,男,1951年生,中山大学计算机软件所教授,博士导师,现为中山大学计算机软件研究所所长。李磊教授1988年获法国里昂第一大学计算机博士学位,1988年至1991 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍纪庆革
      纪庆革基本情况性别:男研究方向:计算机图形学与视觉、网络游戏动画与虚拟现实、可视化技术、系统仿真、博弈论和智能机器人等办公电话:13416315695电子邮件:issjqg@mail.sysu.edu.cn个人主页:http://www.cs.sysu.edu.cn/~jqg详细介绍纪庆革(QinggeJi)工学博士,副教授,硕士生导师,出站博士后性别:男学历:博士职称:副教授AssociateP ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍高集荣
      高集荣基本情况性别:男暂无图片研究方向:办公电话:电子邮件:gaojr@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~gaojr详细介绍gaojr@163.com信息正在录入中。。。 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍陈炬桦
      陈炬桦基本情况性别:男暂无图片研究方向:管理信息系统、智能算法、信息安全、计算机仿真等办公电话:电子邮件:isscjh@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~isscjh详细介绍陈炬桦简介:学习工作经历:1978~1982江西大学计算数学专业,本科生;1982~1985江西省峡江计划委员会,干部;1985~1995华东地质学院计算机教研室,助教 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍农革
      农革基本情况性别:男暂无图片研究方向:计算机算法、网络办公电话:电子邮件:issng@mail.sysu.edu.cn个人主页:http://code.google.com/p/ge-nong/详细介绍长期招收研究生,类型:博士、学术型硕士、工程型硕士。2013年招收全国统考博士生2名(计算机科学技术),虚位以待,欢迎报考。简介1999.11获香港科技大学计算机科学(哲学)博士学位,现职中山大学信 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍张军
      张军基本情况性别:男暂无图片研究方向:计算智能、云计算、数据挖掘、智能传感网络、优化与运筹、功率电子电路办公电话:电子邮件:junzhang@ieee.org个人主页:http://www.cs.sysu.edu.cn/~jzhang详细介绍招收校内外保送硕士研究生和直接攻读博士的本科生。 ...
      中山大学 免费考研网 2012-10-21
    • 中山大学信息科学与技术学院研究生导师介绍林瑛
      林瑛基本情况性别:女暂无图片研究方向:办公电话:电子邮件:issly@mail.sysu.edu.cn个人主页:http://sist.sysu.edu.cn/~issly详细介绍林瑛issly@mail.sysu.edu.cn ...
      中山大学 免费考研网 2012-10-21