人物经历
工作经历
2018/11-至今,美国宾夕法尼亚州立大学,博士后,导师:Prof. Peng Liu
2018/1-2018/2,香港城市大学,研究员,导师:Lee-Ming,CHENG
2014/11-至今,武汉理工大学,计算机科学与技术学院,副教授
2013/12-2014/4,意大利都灵理工大学电子系,访问学者,Enrico Magli
2010/09-2011/01,香港城市大学,电子工程系,研究助理:Kwok-Wo WONG
教育经历
2011/09-2014/10,香港城市大学,电子工程系,博士,导师:Kwok-Wo WONG
2008/09-2011/07,深圳大学,计算机与软件学院,硕士,导师:陈剑勇
2003/09-2007/07,湖南大学,软件学院,学士,导师:秦拯
主要成就
科研成就
论文
[1]L. Chen, G. Zhao, J. Zhou*, A. T. Ho, and L.-M. Cheng, "Face template protection using deep LDPC codes learning," IET Biometrics, vol. 8, pp. 190-197, 2018.(CCF C, SCI)
[2]A. Dahou, M. A. Elaziz, J. Zhou, and S. Xiong, "Arabic Sentiment Classification Using Convolutional Neural Network and Differential Evolution Algorithm," Computational Intelligence and Neuroscience, vol. 2019, 2019.(SCI)
[3]A. Dahou, S. Xiong, J. Zhou, and M. A. Elaziz, "Multi-Channel Embedding Convolutional Neural Network Model for Arabic Sentiment Classification," ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), vol. 18, p. 41, 2019.(CCF C, SCI)
[4]W. Duan, X. Tang, J. Zhou, J. Wang, and G. Zhou, "Load Balancing Opportunistic Routing for Cognitive Radio Ad Hoc Networks," Wireless Communications and Mobile Computing, vol. 2018, 2018. (CCF C, SCI)
[5]Y. Pan, J. Zhou*, Y. Gao, and S. Xiong, "Robust Facial Landmark Localization Based on Texture and Pose Correlated Initialization," arXiv preprint arXiv:1805.05612, 2018.
[6]X. Tang, J. Zhou*, S. Xiong, J. Wang, and K. Zhou, "Geographic segmented opportunistic routing in cognitive radio ad hoc networks using network coding," IEEE Access, vol. 6, pp. 62766-62783, 2018. (SCI)
[7]X. Wu, J. Zhou*, J. An, and Y. Yang, "Abnormal driving behavior detection for bus based on the Bayesian classifier," in 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), 2018, pp. 266-272.
[8]J. Zhou, Y. Fu, Y. Yang, and A. T. Ho, "Distributed video coding using interval overlapped arithmetic coding," Signal Processing: Image Communication, vol. 76, pp. 118-124, 2019. (CCF C, SCI)
[9]J. Zhou, F. Liu, and L.-M. Cheng, "Image authentication using distributed arithmetic coding," Multimedia Tools and Applications, vol. 77, pp. 15505-15520, 2018. (CCF C, SCI)
[10]J. Zhou, M. Qi, Y. Yang, and S. Xiong, "Distributed Arithmetic Coding for Memory Sources," in Proceedings of the 2019 International Conference on Image, Video and Signal Processing, 2019, pp. 128-132.
[11]X. Wu, J. Zhou*, and Y. Pan, "Initial Shape Pool Construction for Facial Landmark Localization under Occlusion," IEEE Access, vol. 5, pp. 1-8, 2017. (SCI, JCR: Q1)
[12]L. Harn, C.-F. Hsu, Z. Xia, and J. Zhou, " How to share secret efficiently over networks," Security and Communication Networks, vol. 1, pp. 1-7, 2017. (CCF C, SCI: JCR: Q3)
[13]L. Chen, G. Zhao, J. Zhou*, and L. Kuang, "Real-time Traffic Sign Classification Using Combined Convolutional Neural Networks," Asian Conference on Pattern Recognition, pp. 1-6, 2017.
[14] P. Yi, J. Zhou*, Y. Gao et al., "Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization," 12th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2017), 2017, pp. 1-6. (CCF C)
[15] G. Zhao, X. Zi, K. Liang, Y. Pan and J. Zhou*, "A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes," 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 1-15.
[16] J. Zhou, H. Duan, K. Liang et al., "Securing Outsourced Data in the Multi-Authority Cloud with Fine-grained Access Control and Efficient Attribute Revocation," The Computer Journal, pp. 1-12, 2017. (CCF B, SCI, JCR: Q2)
[17] C. Xia, J. Tian, E. Li, J. Zhou et al., "An Efficient Tool for Industrial Control System Security Analysis," IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, Auckland, New Zealand, 2016, pp. 424-427. (EI)
[18] S. Wang, J. Zhou, J. Liu, J. Yu, J. Chen, W. Xie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing," IEEE Transactions on Information Forensics and Security, 11(6):1265-77, 2016. (SCI, JCR: Q1, CCF A)
[19] Y. Yang, J. Zhou, F. Duan, F. Liu, L. Cheng, "Wave Atom Transform Based Image Hashing Using Distributed Source Coding," Journal of Information Security and Applications, 31: 75-82, 2016. (CCF C, ESCI)
[20] Y. Han, N. Xing, J. Zhou*, and X. Zhe, "Secure Index for Resource-constraint Mobile Devices in Cloud Computing," IEEE Access, vol. 4, pp.9118-9128, 2016. (SCI, JCR: Q2)
[21] A. Dahou, S. Xiong, J. Zhou*, M. Haddoud and P. Duan, "Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification," Coling 2016, pp.1-10. (CCF B)
[22] J. Zhou, F. Liu, J. Chen, L. Cheng, Y. Yang, P. Duan, "Wave Atoms Based Image Authentication Using Slepian-Wolf Coding," 2nd IEEE International Symposium on Dependable Computing and Internet of Things (DCIT) 2015, pp. 87-92. (EI)
[23] J. Zhou, K.-W. Wong and Y. Yang, "Distributed Arithmetic Coding with Interval Swapping," Signal Processing, 116: 29–37, November 2015. (CCF C, SCI, JCR: Q1)
[24] J. Zhou, K.-W. Wong and J. Chen, "Distributed Block Arithmetic Coding for Equiprobable Sources," IEEE Sensors Journal, 13(7): pp. 2750–2756, July 2013. (SCI, JCR: Q1)
[25] J. Zhou, K.-W. Wong and J. Chen, "Distributed Source Coding Using Chaos-based Cryptosystem," Communications in Nonlinear Science and Numerical Simulation, 17(12), pp. 5110–5116, December 2012. (SCI, JCR: Q1)
[26] G. Ye and J. Zhou*, "A Block Chaotic Image Encryption Scheme Based on Self-adaptive Modelling," Applied Soft Computing, 22: 351–357, September 2014. (SCI, JCR: Q1)
[27] J. Chen, J. Zhou and K.-W. Wong, "A Modified Chaos-based Joint Compression and Encryption Scheme," IEEE Transactions on Circuits and Systems-II, 58(2), pp. 110–114, February 2011. (SCI, JCR: Q2)
[28] J. Chen, J. Zhou, K.-W. Wong and Z. Ji, "Enhanced Cryptography by Multiple Chaotic Dynamics," Mathematical Problems in Engineering, 2011(938454): 1–12, 2011. (SCI, JCR: Q2)
[29] O. Lui, K.-W. Wong, J. Chen and J. Zhou, "Chaos-based Joint Compression and Encryption Algorithm for Generating Variable Length Ciphertext," Applied Soft Computing, 12(1): 125–132, January 2012. (SCI, JCR: Q1)
[30] J. Chen and J. Zhou, "Improvement of Security and Feasibility for Chaos-based Multimedia Cryptosystem," ICCSA, pp. 2750–2756, 2011. (SCI)
[31] Q. Lin, K.-W. Wong, J. Zhou and L.-Y. Zhang, "A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems," International Symposium on Nonlinear Theory and its Applications, pp. 381–384, 2014.
科研项目
[1]国家自然科学青年基金,61601337,基于分布式算术编码的无线多媒体传感器低复杂度视频压缩技术研究,2017.1-2019.12,19万,在研
[2]湖北省自然科学基金面上项目,2017CFB593,基于级联回归模型的姿态变化与局部遮挡人脸识别技术研究,2018.8-2019.9,3万,结题
[3]福建省信息处理与智能控制重点实验室,基于级联姿态回归的局部遮挡人脸特征点定位研究,2017.1-2018.31,2万,结题
[4]武汉理工大学自主创新研究基金,2015IVA034,基于算术编码的无反馈分布式视频编码系统研究,2015.1-2016.10,5万,结题
[5]武汉理工大学青年教师探索研究项目,2017IVB025,云计算环境下面向隐私保护的人脸识别关键技术研究,2017.1-2018.10,7万,结题
[6]企业委托,实名制身份证与人像一致性自主核验系统,2016-2017,3万,结题
人才培养
指导学生
[1]2017毕业:潘艺云(硕士,图像算法工程师)
[2]2018毕业:陈凌颖(硕士,图像算法工程师)、齐明伟(硕士,嵌入式工程师)
教授课程
计算机视觉、信息安全、网络安全、软件开发工具
荣誉表彰
杰出学术奖(2013)颁发单位;香港城市大学
-
相关文章
- 2022十大巅峰完本仙侠修真小说排行榜
- 一家长接孩子未戴口罩致30多人感染
- 3月新增本土感染者超15000例,各地疫情从何而来?
- 珊瑚适应气候变化
- 珊瑚为适应气候变化更换共生藻类
- 统一的老坛酸菜到底从哪里来?
- 截至3月15日12时,莱西疫情累计确诊病例782例、无症状感
- 3月15日0-12时,长春市新增本地确诊病例730例
- 邓伦发文致歉:深刻认识到错误,接受税务机关的一切决定
- 如何才能在股市中赚钱?巴菲特的投资秘诀
姐的欢喜 » 周俊伟(武汉理工大学计算机与人工智能学院副教授)
免责声明:本文由网友提供互联网分享,经供参考,不代表本网的观点和立场。