删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

华北电力大学保定数理系导师教师师资介绍简介-李 鹏

本站小编 Free考研考试/2020-10-11

李 鹏


学位
博士

职称
副教授

电子邮箱
lphit@163.com

电话
**

主讲课程
线性代数、线性代数(英)、面向对象程序设计(C++)

研究领域及研究方向

应用数学、信息安全、智能电网与能源互联网安全

社会兼职、荣誉、获奖
担任《IEEE Signal Processing Letters》、《IET Image Processing》、《Journal of Real-Time Image Processing》、《Journal of Visual Communication and Image Representation》等期刊审稿人。
入选河北省“三三三人才工程”第三层次人选。
2019年获河北省教学成果二等奖。



研 究 成 果

近年来,在国内外著名学术期刊和国际会议上发表论文二十余篇。主持和参与科研项目9项,包括国家自然科学基金2项,863项目子课题1项,河北省自然科学基金2项。




科研项目列表
1. 主持《NASBUS通信加密技术研究》,中国核动力研究设计院,2020-2021。2. 主持《两类视觉图像共享方案的融合研究》,2019年河北省自然科学基金面上项目,2019-2021。3. 主持《二合一的视觉图像共享方案研》,2019年中央高校基本科研业务经费理学类面上项目,2019-2020,项目负责人。4. 参与《面向多方协同深度学习系统的脆弱性检测与防护》,2018年国家自然科学基金青年科学基金,2019-2021。5. 主持《具有核心参与者的视觉图像共享方法研究》,2016年国家自然科学基金青年科学基金,2017-2019。6. 主持《具有核心参与者的视觉秘密共享方案研究》,2016年中央高校基本科研业务经费理学类面上项目,2016-2017。7. 参与《电离层TEC多源数据融合》,国家高技术研究发展计划(863计划)子课题,2015-2017。8. 主持《高效的秘密图像共享方案的构造研究》,2015年河北省自然科学基金青年科学基金,2015-2017。9. 主持《图像秘密共享方法性能优化及评价研究》,2013年中央高校基本科研业务经费理学类面上项目,2013-2014。

发表期刊论文
1. P. Li, J. Ma, L. Yin, Q. Ma. A Construction Method of (2, 3) Visual Cryptography Scheme. IEEE Access, 2020, 8:32840-32849. (SCI)
2. P. Li, C.N. Yang, Q. Kong. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing, 2018, 14:41–50. (SCI, ESI)
3. Q. Wen, Y. Wang, P. Li. Two Zero-Watermark methods for XML documents [J]. Journal of Real-Time Image Processing, 2018, 14:183-192. (SCI)
4. P. Li, Z. Liu, C.N. Yang. A construction method of (?, ?, ?)-essential secret image sharing scheme. Signal Processing: Image Communication, 2018, 65: 210–220. (SCI)
5. P. Li, Z. Liu. An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size. International Journal of Digital Crime and Forensics, 2018, 10 (3): 78-94. (ESCI)
6. P. Li, C.N. Yang, Z. Zhou. Essential secret image sharing scheme with the same size of shadows. Digital Signal Processing, 2016,50:51-60. (SCI)
7. C.N. Yang, P. Li, C.C. Wu, S.R. Cai. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Processing: Image Communication, 2015, 31: 1-9. (SCI)
8. P. Li, Q. Kong, Y. Ma. Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5(3): 357-370. (EI)
9. P. Li, Q. Kong, Y. Ma. Double-threshold image secret sharing scheme based on gray mixing model. ICIC Express Letters, 2014, 8(8): 2135-2140. (EI)
10. P. Li, C. Yang, Q. Kong, Y. Ma, Z. Liu. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation. 2013, 24(8): 1380-1393. (SCI)
11. P. Li, C.N. Yang, C.C. Wu, Q. Kong, Y. Ma. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation. 2013, 24(7): 1106-1114. (SCI)
12. Q. Kong, P. Li, Y. Ma. On the feasibility and security of image secret sharing scheme to identify cheaters. Journal of Information Hiding and Multimedia Signal Processing, 2013, 4(4): 225-232. (EI)
13. P. Li, P. Ma, X. Su, C.N. Yang. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation. 2012, 23(3): 441–453. (SCI)
14. P. Li, P. Ma, X. Su, F. Liu. Multi-Threshold Image Secret Sharing Scheme. ACTA ELECTRONICA SINICA. 2012, 40(3): 518-524. (EI)
15. P. Li, P. Ma, D. Li. Aspect ratio invariant visual cryptography scheme with flexible size expansion. ICIC Express Letters, 2012, 6(8): 1-6. (EI)
16. F. Liu, W.Q. Yan, P. Li, C. Wu. ESSVCS: An enriched secret sharing visual cryptography. Transactions on Data Hiding and Multimedia Security, 2014, v8363:1-24. (EI)




发表会议论文
1. J. Ma, L. Yin, P. Li. Cheating Detection in (k, n) Secret Image Sharing Scheme, IWDW 2019, LNCS 12022, pp. 421–428, 2020.
2. P. Li, C.N. Yang, D. Tang, J. Ma. Sharing More Information in Visual Cryptography Scheme with Block Expansion, SICBS 2018, Advances in Intelligent Systems and Computing, v 895, pp. 849-857, 2019.
3. P. Li, Z. Liu. A Novel Visual Cryptography Scheme with Different Importance of Shadows, IWDW 2017, LNCS 10431, pp. 365–377, 2017.
4. P. Li, C.N. Yang, Q. Kong. Two-in-one image secret sharing scheme based on Boolean operations. IWDW 2014, Lecture Notes in Computer Science, v 9023, p 305-318, 2015
5. P. Li, Q. Kong, Y. Ma. Probabilistic visual secret sharing scheme based on random grids, IIHMSP-2013, October 16-18 2013, Beijing, China, pp: 379-382.
6. F. Liu, W.Q. Yan, P. Li, C. Wu. A secret enriched visual cryptography. IWDW 2012, Lecture Notes in Computer Science, v7809, pp:464-484, 2013.
7. P. Li, P. Ma, D. Li. Aspect Ratio Invariant Visual Cryptography Scheme with Optional Size Expansion, IIHMSP-2012, July 18, - July 20, 2012 Piraeus-Athens, Greece, pp: 219-222.
8. P. Li, P. Ma, X. Su. Image secret sharing and hiding with authentication. PCSPA 2010, p 367-370, 2010.








相关话题/华北电力大学 数理