删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

长沙理工大学计算机与通信工程学院导师教师师资介绍简介-向凌云

本站小编 Free考研考试/2021-08-22

长沙理工大学计算机与通信工程学研究生导师基本信息表

1、个人基本信息:

姓 名:向凌云
性 别:女


出生年月:1983年4月
技术职称:副教授

毕业院校:湖南大学
学历(学位):博士

所在学科:
研究方向:信息安全,信息隐藏与数字水印,隐写分析,自然语言处理,模式识别与机器视觉

2、教育背景:

2001.9-2005.6
湖南大学
学士

2005.9-2011.12
湖南大学
硕博连读,工学博士





3、目前研究领域:

信息安全,信息隐藏与数字水印,文本隐写分析,自然语言处理,模式识别与机器视觉

4、已完成或已在承担的主要课题:

作为主要成员参与完成国家自然科学基金项目2项,国家信息安全课题4项,省级项目1项,湖南省教育厅一般项目1项;目前主持国家自然科学基金青年项目1项。
(1) 国家自然科学基金青年项目“安全文本隐写理论与方法研究”(**),2013.1-2015.12,主持。
(2) 湖南省教育厅科学研究一般项目“文本隐藏信息检测理论与方法研究”(12C0011),2012-2014,主持。
(3) 国家自然科学基金项目“文本隐写分析关键技术研究”(**),2011.1-2013.12,参与。
(4) 国家自然科学基金项目“自然语言文本可恢复水印研究”(**),2012.1-2014.12,参与。
(5) 国家自然科学基金项目“基于N-gram的多语言共存文本复制取证研究”(**),2012.1-2015.12,参与。

5、已发表的学术论文:

已发表学术论文24 篇,其中国际期刊论文14篇,国际会议论文4篇。
[1] Lingyun Xiang(向凌云), Xingming Sun, Gang Luo. Linguistic steganalysis using the features derived from synonyms frequency. Multimedia Tools and Applications. 2014, 71(3):1893-1911.
[2] Lingyun Xiang(向凌云), Gang Luo, Yuhua Xie. Research on the coding strategy for synonym substitution-based steganography. Journal of Computational Information Systems. 2014, 10(22):1-12.
[3] Lingyun Xiang(向凌云), Yuhua Xie, Gang Luo, Weizheng Wang. On the Existence of Subliminal Channel in Instant Messaging Systems. International Journal of Security and Its Applications. (已录用)
[4] 向凌云, 王鑫辉. 一种分级安全的文本隐写方法. 计算机应用. (已录用)
[5] 向凌云, 胡毅君, 王伟征. 一种基于低失真替换优先的文本隐写算法. 计算机工程与应用. (已录用)
[6] Lingyun Xiang(向凌云), Xingming Sun, Yuling Liu and Hengfu Yang. A Secure Steganographic Method via Multiple Choice Questions. Information Technology Journal. 2011, 10(5): 992-1000.
[7] Lingyun Xiang(向凌云), Xingming Sun, Gang Luo, and Bin Xia. Steganalysis of Syntactic Transformation Based Steganography. International Journal of Digital Content Technology and its Applications. 2011, 5(5):320~330.
[8] Lingyun Xiang(向凌云), Xingming Sun, Gang Luo, Can Gan. Research on Steganalysis for Text Steganography Based on Font Format. Proceedings of the third International Symposium on Information Assurance and Security, Manchester, UK, IEEE Press, 2007, pp. 490-495.
[9] Gang Luo, Xingming Sun, Lingyun Xiang(向凌云), Jun-wei Huang. An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms. Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2007), Kaohsiung City, Taiwan , IEEE Press, 2007, (2):pp.126-129.
[10] 罗纲,孙星明,向凌云,刘玉玲,甘灿. 针对同义词替换信息隐藏的检测方法研究. 计算机研究与发展, 2008, 45(10): 1696-1703.
[11] Gang Luo, Xingming Sun, Lingyun Xiang(向凌云). Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection. Information Technology Journal, 2008,7(3):450-457.
[12] Yuhua Xie, Xingming Sun, Lingyun Xiang(向凌云), Gang Luo. A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Harbin , China , 2008, 294-297.
[13] 曾莱蓓, 孙星明, 向凌云, 罗纲. 基于虚词变换的文本隐藏信息检测方法研究. 计算机研究与发展, 2009, 46(Suppl.): 177-181.
[14] 曹琪, 孙星明, 向凌云. 一种抗结对分析的同义词替换隐藏方法. 第九届全国信息隐藏暨多媒体信息安全学术大会CIHW2010优秀论文.2010, 469-474.
[15] Bin Yang, Xingming Sun, Lingyun Xiang(向凌云), Zhiqiang Ruan. Steganography in Ms Excel Document using Text-rotation Technique. Information Technology Journal. 2011, 10(4): 889-893.
[16] Qi Cao, Xingming Sun, Lingyun Xiang(向凌云). A Secure Text Steganography Based on Synonym Substitution. The 13th IEEE Joint International Computer Science and Information Technology Conference. Chongqing , China , 2011, 635-637.
[17] Bin Xia, Xingming Sun, Lingyun Xiang(向凌云). Detection of LSB Matching Steganography Using Neighborhood Node Degree Characteristics, Information Technology Journal. 2011, 10(8): 1601-1607.
[18] Juan Qin, Feng Li, Lingyun Xiang(向凌云), Jianming Zhang. Detection of image region copy-move forgery using wavelet moment. International Journal of Digital Content Technology and Its Applications, 2012, 6(18), pp148-156.
[19] Xiangjin Zhou, Feng Li, Lingyun Xiang(向凌云). Blind Detection of Synthesized JPEG Image via Quantization Noise Analysis. International Review On Computers and Software, 2012, 7(5), pp 2016-2021.
[20] Xiaoxia Liu, Feng Li, Lingyun Xiang(向凌云). Copy-Move Forgery Detection Using the MROGH. Journal of Computational Information Systems. 2013, 9(3): 1071- 1078.
[21] 秦娟, 李峰, 向凌云, 殷苌茗. 采用圆谐-傅立叶矩的图像区域复制粘贴篡改检测方法,中国图象图形学报. 2013,18(8):919-923.
[22] Jianming Zhang, Kun Yang, Lingyun Xiang(向凌云), et al. A Self-Adaptive Regression-Based Multivariate Data Compression Scheme with Error Bound in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2013.
[23] Feng Li, Shu-Ren Zhou, Jian-Ming Zhang, Deng-Yong Zhang, Ling-Yun Xiang(向凌云), Attribute-based knowledge transfer learning for human pose estimation. NEUROCOMPUTING, 2013, vol. 116, pp 301-310.
[24] Weizheng Wang, Shuo Cai, and Lingyun Xiang(向凌云). Reducing Test Power and Improving Test Effectiveness for Logic BIST. Journal of Semiconductor Technology and Science, 2014, 14(5):640-648.











上一篇: 董国华副教授
下一篇: 王伟征讲师


相关话题/通信工程学院 计算机