删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

武汉理工大学计算机学院导师教师师资介绍简介-周俊伟

本站小编 Free考研考试/2021-07-26





一、个人简介
周俊伟,计算机科学技术学院副教授。于2007年获得湖南大学软件工程专业学士学位;2011年获得深圳大学计算机应用技术硕士学位;2014年在香港城市大学电子工程系获得博士学位;美国宾夕法尼亚州立大学博士后。曾担任香港城市大学研究助理,并作为访问****访问意大利都灵理工大学电子系参与卫星图像加密算法的研究。周俊伟为电气与电子工程师学会(IEEE)、美国计算机协会(ACM)和中国计算机协会(CCF)会员,HKIETransactions副主编。主要从事计算机视觉、信息安全与分布式信源编码等方向的研究。近年来在该领域发表30多篇国际学术论文。
团队招收计算机、通信与数学等学科硕士研究生,有兴趣可通过邮件联系。
联系方式:junweizhou@msn.com
二、Google学术主页:https://scholar.google.com/citations?user=ERgncpoAAAAJ
三、教授课程
计算机视觉、信息安全、网络安全、软件开发工具
四、教育和工作经历
2018/11-至今, 美国宾夕法尼亚州立大学,博士后,导师:Prof. Peng Liu
2018/1-2018/2, 香港城市大学,研究员,导师:Lee-Ming,CHENG
2014/11-至今, 武汉理工大学,计算机科学与技术学院,副教授
2013/12-2014/4, 意大利都灵理工大学 电子系,访问****,Enrico Magli
2011/09-2014/10, 香港城市大学,电子工程系,博士,导师:Kwok-Wo WONG
2010/09-2011/01,香港城市大学,电子工程系,研究助理:Kwok-Wo WONG
2008/09-2011/07,深圳大学,计算机与软件学院,硕士,导师:陈剑勇
2003/09-2007/07,湖南大学,软件学院,学士,导师:秦拯
五、主持科研项目
[1] 国家自然科学青年基金,**,基于分布式算术编码的无线多媒体传感器低复杂度视频压缩技术研究,2017.1-2019.12,19万,在研
[2] 湖北省自然科学基金面上项目,2017CFB593,基于级联回归模型的姿态变化与局部遮挡人脸识别技术研究,2018.8-2019.9, 3万,结题
[3] 福建省信息处理与智能控制重点实验室,基于级联姿态回归的局部遮挡人脸特征点定位研究,2017.1-2018.31,2万,结题
[4] 武汉理工大学自主创新研究基金,2015IVA034,基于算术编码的无反馈分布式视频编码系统研究,2015.1-2016.10,5万,结题
[5] 武汉理工大学青年教师探索研究项目,2017IVB025,云计算环境下面向隐私保护的人脸识别关键技术研究,2017.1-2018.10,7万,结题
[6] 企业委托,实名制身份证与人像一致性自主核验系统,2016-2017,3万,结题
六、获奖情况
[1] 杰出学术奖 (2013) 颁发单位;香港城市大学
七、指导学生:
[1] 2017毕业: 潘艺云(硕士,图像算法工程师)
[2] 2018毕业: 陈凌颖(硕士,图像算法工程师)、齐明伟(硕士,嵌入式工程师)
八、主要论文及专利
[1] L. Chen, G. Zhao, J. Zhou*, A. T. Ho, and L.-M. Cheng, "Face template protection using deep LDPC codes learning," IET Biometrics, vol. 8, pp. 190-197, 2018.(CCF C, SCI)
[2] A. Dahou, M. A. Elaziz, J. Zhou, and S. Xiong, "Arabic Sentiment Classification Using Convolutional Neural Network and Differential Evolution Algorithm," Computational Intelligence and Neuroscience, vol. 2019, 2019.(SCI)
[3] A. Dahou, S. Xiong, J. Zhou, and M. A. Elaziz, "Multi-Channel Embedding Convolutional Neural Network Model for Arabic Sentiment Classification," ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), vol. 18, p. 41, 2019.(CCF C, SCI)
[4] W. Duan, X. Tang, J. Zhou, J. Wang, and G. Zhou, "Load Balancing Opportunistic Routing for Cognitive Radio Ad Hoc Networks," Wireless Communications and Mobile Computing, vol. 2018, 2018. (CCF C, SCI)
[5] Y. Pan, J. Zhou*, Y. Gao, and S. Xiong, "Robust Facial Landmark Localization Based on Texture and Pose Correlated Initialization," arXiv preprint arXiv:1805.05612, 2018.
[6] X. Tang, J. Zhou*, S. Xiong, J. Wang, and K. Zhou, "Geographic segmented opportunistic routing in cognitive radio ad hoc networks using network coding," IEEE Access, vol. 6, pp. 62766-62783, 2018. (SCI)
[7] X. Wu, J. Zhou*, J. An, and Y. Yang, "Abnormal driving behavior detection for bus based on the Bayesian classifier," in 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), 2018, pp. 266-272.
[8] J. Zhou, Y. Fu, Y. Yang, and A. T. Ho, "Distributed video coding using interval overlapped arithmetic coding," Signal Processing: Image Communication, vol. 76, pp. 118-124, 2019. (CCF C, SCI)
[9] J. Zhou, F. Liu, and L.-M. Cheng, "Image authentication using distributed arithmetic coding," Multimedia Tools and Applications, vol. 77, pp. 15505-15520, 2018. (CCF C, SCI)
[10]J. Zhou, M. Qi, Y. Yang, and S. Xiong, "Distributed Arithmetic Coding for Memory Sources," in Proceedings of the 2019 International Conference on Image, Video and Signal Processing, 2019, pp. 128-132.
[11]X. Wu, J. Zhou*, and Y. Pan, "Initial Shape Pool Construction for Facial Landmark Localization under Occlusion," IEEE Access, vol. 5, pp. 1-8, 2017. (SCI, JCR: Q1)
[12]L. Harn, C.-F. Hsu, Z. Xia, and J. Zhou, " How to share secret efficiently over networks," Security and Communication Networks, vol. 1, pp. 1-7, 2017. (CCF C, SCI: JCR: Q3)
[13]L. Chen, G. Zhao, J. Zhou*, and L. Kuang, "Real-time Traffic Sign Classification Using Combined Convolutional Neural Networks," Asian Conference on Pattern Recognition, pp. 1-6, 2017.
[14]P. Yi, J. Zhou*, Y. Gao et al., "Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization," 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2017), 2017, pp. 1-6. (CCF C)
[15]G. Zhao, X. Zi, K. Liang, Y. Pan and J. Zhou*, "A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes," 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 1-15.
[16]J. Zhou, H. Duan, K. Liang et al., "Securing Outsourced Data in the Multi-Authority Cloud with Fine-grained Access Control and Efficient Attribute Revocation," The Computer Journal, pp. 1-12, 2017. (CCF B, SCI, JCR: Q2)
[17]C. Xia, J. Tian, E. Li, J. Zhou et al., "An Efficient Tool for Industrial Control System Security Analysis," IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand, 2016, pp. 424-427. (EI)
[18]S. Wang, J. Zhou, J. Liu, J. Yu, J. Chen, W. Xie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing," IEEE Transactions on Information Forensics and Security, 11(6):1265-77, 2016. (SCI, JCR: Q1, CCF A)
[19]Y. Yang, J. Zhou, F. Duan, F. Liu, L. Cheng, "Wave Atom Transform Based Image Hashing Using Distributed Source Coding," Journal of Information Security and Applications, 31: 75-82, 2016. (CCF C, ESCI)
[20]Y. Han, N. Xing, J. Zhou*, and X. Zhe, "Secure Index for Resource-constraint Mobile Devices in Cloud Computing," IEEE Access, vol. 4, pp.9118-9128, 2016. (SCI, JCR: Q2)
[21]A. Dahou, S. Xiong, J. Zhou*, M. Haddoud and P. Duan, "Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification," Coling 2016, pp.1-10. (CCF B)
[22]J. Zhou, F. Liu, J. Chen, L. Cheng, Y. Yang, P. Duan, "Wave Atoms Based Image Authentication Using Slepian-Wolf Coding," 2nd IEEE International Symposium on Dependable Computing and Internet of Things (DCIT) 2015, pp. 87-92. (EI)
[23]J. Zhou, K.-W. Wong and Y. Yang, "Distributed Arithmetic Coding with Interval Swapping," Signal Processing, 116: 29–37, November 2015. (CCF C, SCI, JCR: Q1)
[24]J. Zhou, K.-W. Wong and J. Chen, "Distributed Block Arithmetic Coding for Equiprobable Sources," IEEE Sensors Journal, 13(7): pp. 27502756, July 2013. (SCI, JCR: Q1)
[25]J. Zhou, K.-W. Wong and J. Chen, "Distributed Source Coding Using Chaos-based Cryptosystem," Communications in Nonlinear Science and Numerical Simulation, 17(12), pp. 5110–5116, December 2012. (SCI, JCR: Q1)
[26]G. Ye and J. Zhou*, "A Block Chaotic Image Encryption Scheme Based on Self-adaptive Modelling," Applied Soft Computing, 22: 351357, September 2014. (SCI, JCR: Q1)
[27]J. Chen, J. Zhou and K.-W. Wong, "A Modified Chaos-based Joint Compression and Encryption Scheme," IEEE Transactions on Circuits and Systems-II, 58(2), pp. 110114, February 2011. (SCI, JCR: Q2)
[28]J. Chen, J. Zhou, K.-W. Wong and Z. Ji, "Enhanced Cryptography by Multiple Chaotic Dynamics," Mathematical Problems in Engineering, 2011(938454): 112, 2011. (SCI, JCR: Q2)
[29]O. Lui, K.-W. Wong, J. Chen and J. Zhou, "Chaos-based Joint Compression and Encryption Algorithm for Generating Variable Length Ciphertext," Applied Soft Computing, 12(1): 125132, January 2012. (SCI, JCR: Q1)
[30]J. Chen and J. Zhou, "Improvement of Security and Feasibility for Chaos-based Multimedia Cryptosystem," ICCSA, pp. 27502756, 2011. (SCI)
[31]Q. Lin, K.-W. Wong, J. Zhou and L.-Y. Zhang, "A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems," International Symposium on Nonlinear Theory and its Applications, pp. 381384, 2014.





相关话题/大学计算机 武汉理工