当前位置:首页 > 学院概况 > 师资队伍

周俊伟

发布时间:2015-05-27     字体:[增加 减小]



个人简介
周俊伟,计算机科学技术学院副教授,楚天学者(楚天学子层次)。于2007年获得湖南大学软件工程专业学士学位;2011年获得深圳大学计算机应用技术硕士学位;2014年在香港城市大学电子工程系获得博士学位。曾担任香港城市大学研究助理,并作为访问学者访问意大利都灵理工大学电子系参与卫星图像加密算法的研究。周俊伟为电气与电子工程师学会(IEEE)、美国计算机协会(ACM)和中国计算机协会(CCF)会员,主要从事计算机视觉、信息安全与分布式信源编码等方向的研究。近年来在该领域发表二十多篇国际学术论文。担任多个国际期刊例如IEEE Transactions on Communications、IEEE Transactions on Image Processing和IEEE Transactions on Information Security and Forensics的审稿人。

团队现大量招收计算机、通信与数学学科硕士研究生与推免生,有兴趣可通过邮件联系。

联系方式:junweizhou@msn.com
教授课程
计算机视觉、信息安全、网络安全、软件开发工具
教育和工作经历
2014/11-至今,   武汉理工大学,计算机科学与技术学院,副教授
2013/12-2014/04,意大利都灵理工大学 电子系,访问学者
2011/09-2014/10, 香港城市大学,电子工程系,博士,导师:Kwok-Wo WONG
2010/09-2011/01,香港城市大学,电子工程系,研究助理
2008/09-2011/07,深圳大学,计算机与软件学院,硕士,导师:陈剑勇
2007/07-2008/09,深圳市慧瑞信息系统有限公司,软件工程师
2003/09-2007/07,湖南大学,软件学院,学士,导师:秦拯

获奖情况
[1]    杰出学术奖 (2013) 颁发单位;香港城市大学
主持科研项目
[1]    国家自然科学青年基金,61601337,基于分布式算术编码的无线多媒体传感器低复杂度视频压缩技术研究,2017.1-2019.12,19万,在研
[2]    湖北省自然科学基金面上项目,2017CFB593,基于级联回归模型的姿态变化与局部遮挡人脸识别技术研究,2018.8-2020.9, 3万,在研
[3]    福建省信息处理与智能控制重点实验室,基于级联姿态回归的局部遮挡人脸特征点定位研究,2017.1-2018.31,2万,在研
[4]    武汉理工大学自主创新研究基金,2015IVA034,基于算术编码的无反馈分布式视频编码系统研究,2015.1-2016.10,5万,结题
[5]    武汉理工大学青年教师探索研究项目,2017IVB025,云计算环境下面向隐私保护的人脸识别关键技术研究,2017.1-2018.10,7万,在研
[6]    企业委托,实名制身份证与人像一致性自主核验系统,2016-2017,3万,在研
主要论文及专利
[1]    J. Zhou, F. Liu, and L.-M. Cheng, "Image authentication using distributed arithmetic coding," Multimedia Tools and Applications, pp. 1-16, 2017. (SCI, JCR: Q2)
[2]    X. Wu, J. Zhou*, and Y. Pan, "Initial Shape Pool Construction for Facial Landmark Localization under Occlusion," IEEE Access, vol. 5, pp. 1-8, 2017. (SCI, JCR: Q1)
[3]    L. Harn, C.-F. Hsu, Z. Xia, and J. Zhou, " How to share secret efficiently over networks," Security and Communication Networks, vol. 1, pp. 1-7, 2017. (SCI: JCR: Q3)
[4]    L. Chen, G. Zhao, J. Zhou*, and L. Kuang, "Real-time Traffic Sign Classification Using Combined Convolutional Neural Networks," Asian Conference on Pattern Recognition, pp. 1-6, 2017.
[5]    P. Yi, J. Zhou*, Y. Gao et al., "Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization," 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2017), 2017, pp. 1-6. (Accept, CCF C)
[6]    G. Zhao, X. Zi, K. Liang, Y. Pan and J. Zhou*, "A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes," 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 1-15.
[7]    J. Zhou, H. Duan, K. Liang et al., "Securing Outsourced Data in the Multi-Authority Cloud with Fine-grained Access Control and Efficient Attribute Revocation," The Computer Journal, pp. 1-12, 2017. (SCI, JCR: Q2)
[8]    C. Xia, J. Tian, E. Li, J. Zhou et al., "An Efficient Tool for Industrial Control System Security Analysis," IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand, 2016, pp. 424-427. (EI)
[9]    S. Wang, J. Zhou, J. Liu, J. Yu, J. Chen, W. Xie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing," IEEE Transactions on Information Forensics and Security, 11(6):1265-77, 2016. (SCI, JCR: Q1, CCF A)
[10]    Y. Yang, J. Zhou, F. Duan, F. Liu, L. Cheng, "Wave Atom Transform Based Image Hashing Using Distributed Source Coding," Journal of Information Security and Applications, 31: 75-82, 2016. (ESCI, EI)
[11]    Y. Han, N. Xing, J. Zhou*, and X. Zhe, "Secure Index for Resource-constraint Mobile Devices in Cloud Computing," IEEE Access, vol. 4, pp.9118-9128, 2016. (SCI, JCR: Q2)
[12]    A. Dahou, S. Xiong, J. Zhou*, M. Haddoud and P. Duan, "Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification," Coling 2016, pp.1-10. (CCF B)
[13]    J. Zhou, F. Liu, J. Chen, L. Cheng, Y. Yang, P. Duan, "Wave Atoms Based Image Authentication Using Slepian-Wolf Coding," 2nd IEEE International Symposium on Dependable Computing and Internet of Things (DCIT) 2015, pp. 87-92. (EI)
[14]    J. Zhou, K.-W. Wong and Y. Yang, "Distributed Arithmetic Coding with Interval Swapping," Signal Processing, 116: 29–37, November 2015. (SCI, JCR: Q1)
[15]    J. Zhou, K.-W. Wong and J. Chen, "Distributed Block Arithmetic Coding for Equiprobable Sources," IEEE Sensors Journal, 13(7): pp. 2750–2756, July 2013. (SCI, JCR: Q1)
[16]    J. Zhou, K.-W. Wong and J. Chen, "Distributed Source Coding Using Chaos-based Cryptosystem," Communications in Nonlinear Science and Numerical Simulation, 17(12), pp. 5110–5116, December 2012. (SCI, JCR: Q1)
[17]    G. Ye and J. Zhou*, "A Block Chaotic Image Encryption Scheme Based on Self-adaptive Modelling," Applied Soft Computing, 22: 351–357, September 2014. (SCI, JCR: Q1)
[18]    J. Chen, J. Zhou and K.-W. Wong, "A Modified Chaos-based Joint Compression and Encryption Scheme," IEEE Transactions on Circuits and Systems-II, 58(2), pp. 110–114, February 2011. (SCI, JCR: Q2)
[19]    J. Chen, J. Zhou, K.-W. Wong and Z. Ji, "Enhanced Cryptography by Multiple Chaotic Dynamics," Mathematical Problems in Engineering, 2011(938454): 1–12, 2011. (SCI, JCR: Q2)
[20]    O. Lui, K.-W. Wong, J. Chen and J. Zhou, "Chaos-based Joint Compression and Encryption Algorithm for Generating Variable Length Ciphertext," Applied Soft Computing, 12(1): 125–132, January 2012. (SCI, JCR: Q1)
[21]    J. Chen and J. Zhou, "Improvement of Security and Feasibility for Chaos-based Multimedia Cryptosystem," ICCSA, pp. 2750–2756, 2011. (SCI)
[22]    Q. Lin, K.-W. Wong, J. Zhou and L.-Y. Zhang , "A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems," International Symposium on Nonlinear Theory and its Applications, pp. 381–384, 2014.