当前位置:首页 > 学院概况 > 师资队伍

周俊伟

发布时间:2015-05-27     字体:[增加 减小]

一、简介

周俊伟,1986428日出生,中共党员,硕士生导师。赢咖2注册平台登录人工智能专业负责人,于2007年获得湖南大学软件工程专业学士学位;2011年获得深圳大学计算机应用技术硕士学位;2015年在香港城市大学电子工程系获得博士学位;美国宾夕法尼亚州立大学博士后。曾担任香港城市大学研究助理,并作为访问学者访问意大利都灵理工大学电子系参与卫星图像加密算法的研究。周俊伟为电气与电子工程师学会(IEEE)、美国计算机协会(ACM)和中国计算机协会(CCF)会员,HKIE Transactions副主编。主要从事大数据存储、分析与安全保护等方向的研究,申办赢咖2注册平台登录数据科学与大数据技术、人工智能专业,承担计算机视觉、大数据技术与数据挖掘等课程教学。

获得湖北省楚天学者(楚天学子层次)称号,主持课题9项,其中省部级以上3项。参与11项,其中省部级以上6项,军工横向2项。发表论文50余篇,包括IEEEACM会刊、CCF A/B论文11篇,谷歌学术引用900余次,H指数13i10指数20。授权发明专利2项。带领学生参加创新创业大赛获得省部级奖项以上5项。

邮件junweizhou@msn.com手机18827345572

二、教育和工作经历

[1] 2020/10-2022/9,新疆职业大学机械电子工程学院,院长,教授(援疆)

[2] 2018/11-2020/02,美国宾夕法尼亚州立大学,博士后,导师:Prof. Peng Liu

[3] 2018/1-2018/2,香港城市大学,研究员,导师:Lee-Ming,CHENG

[4] 2014/12-至今,赢咖2注册平台登录,计算机科学与技术学院,副教授

[5] 2013/12-2014/4,意大利都灵理工大学 电子系,访问学者,Enrico Magli

[6] 2011/09-2014/12,香港城市大学,电子工程系,博士,导师:Kwok-Wo WONG

[7] 2008/09-2011/07,深圳大学,计算机与软件学院,硕士,导师:陈剑勇

[8] 2003/09-2007/07,湖南大学,软件学院,学士,导师:秦拯

三、科研项目

[1]国家自然科学青年基金,61601337,基于分布式算术编码的无线多媒体传感器低复杂度视频压缩技术研究,2017.1—2019.12,主持

[2]湖北省自然科学基金面上项目,2017CFB593,基于级联回归模型的姿态变化与局部遮挡人脸识别技术研究,2018.8—2019.9,主持

[3]教育部-华为协同育人,计算机视觉课程改革探索:面向国产MindSpore平台的教学实践,2020.02.01—2022.02.01,主持

[4]福建省信息处理与智能控制重点实验室,基于级联姿态回归的局部遮挡人脸特征点定位研究,2017.1—2018.31,主持

[5]企业委托,实名制身份证与人像一致性自主核验系统,2016—2017,主持

[6]企业委托,汉语生僻字识别小程序开发,2021-02-01—2024-02-01,主持

[7]企业委托,自定义公式编辑器,2022-03-01—2024-03-01,主持

[8]企业委托,汉语生僻字OCR识别技术的研究,2021-02-01—2022-02-01,主持

[9]企业委托,计算机视觉虚拟仿真平台,2022-10-01—2024-09-30,主持

[10]国家自然科学基金青年,72004174,基于智能复杂网络的突发传染病模型与决策支持研究,2021-01-01—2023-12-01,参与

[11]国家自然科学基金重点基金,51832004,分级介孔纳米线钾离子电池正极材料的表界面调控及原位作用机制,2019-01-01—2023-12-01,参与

[12]国家自然科学基金青年,基于负数据库的虹膜特征数据保护方法,2019-01-01—2021-12-01,参与

[13]国家科技支撑计划子课题,攻击路径及协议分析系统软件开发,2015-08-01—2016-08-01,参与

[14]国家自然科学面上基金,61672389,动态与不完全覆盖容错系统可靠性建模、分析与优化关键技术研究,2017-01—2020-12,参与

[15]军工横向201910HX02,中国人民解放军海军大连舰艇学院,2018-11-01—2019-12-01,参与

[16]军工横向201910HX01,工业和信息化部电子第五研究所,2019-05-01—2020-05-01,参与

[17]固件深度分析平台软件升级(三期),国家计算机网络与信息安全管理中心,2018-08-01—2019-12-01,参与

[18]企业横向,工业和信息化计算机与微电子发展研究中心,工控系统主动式攻击路径分析工具采购,2017-11-01—2018-02-01,参与

[19]湖北省自然科学基金创新群体,智能终端基础软件老化测试与重生关键技术,2017-01-01—2019-12-01,参与

[20]广东东莞艺展有限公司,泊车辅助系统,2014-11-01—2015-07-01,参与

四、人才与荣誉称号

[1]湖北省楚天学者(楚天学子层次),2015

[2]武汉理工创新培育名师名导,2018

[3]华为先锋教师,2020

[4]华为栋梁之师,2022

五、授权专利与软著

[1]周俊伟;吕婷;夏喆;赵冬冬;熊盛武;杨焱超,一种基于自适应区间重叠因子的分布式视频编码方法,ZL202011318867.32022-04-15

[2]周俊伟;潘艺云;熊盛武;向剑文;杨焱超,人脸特征点定位方法、装置、设备及存储介质,ZL201810576579.42021-05-04

[3]基于人脸识别的安卓签到系统,2016SR3515802016

六、个人与指导学生获得奖项

[1]全国高校计算机教育大会,优秀论文一等奖,2021

[2]第九届中国大学生计算机设计大赛,中南地区,一等奖,2016

[3]第九届中国大学生计算机设计大赛,全国三等奖,2016

[4]第十一届中国大学生计算机设计大赛,中南地区,二等奖,2018

[5]第二届全国研究生移动终端应用设计创新大赛,三等奖,2016

[6]优秀硕士毕业论文,潘艺云,2018

七、发表论文

[1]J. Zhou, Y. Qian, Q. Zou, P. Liu, and J. Xiang, "DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata," IEEE Transactions on Information Forensics and Security, 2022.CCF A, JCR 1, IF:7.231

[2] S. Wang, J. Zhou*, J. K. Liu, J. Yu, J. Chen, and W. Xie, "An efficient file hierarchy attribute-based encryption scheme in cloud computing,"IEEE Transactions on Information Forensics and Security, vol. 11, pp. 1265-1277, 2016.CCF A, JCR 1, IF:7.231,引用:240

[3] A. Dahou(学生), S. Xiong, J. Zhou*, M. H. Haddoud, and P. Duan, "Word embeddings and convolutional neural network for Arabic sentiment classification," inProceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, 2016, pp. 2418-2427.CCF B, 引用:164

[4] J. Chen(导师),J. Zhou, and K.-W. Wong, "A modified chaos-based joint compression and encryption scheme," IEEE Transactions on Circuits and Systems II: Express Briefs, pp. 1-5, 2011.SCI,JCR 2,引用:70

[5] A. Dahou, M. A. Elaziz, J. Zhou, and S. Xiong, "Arabic sentiment classification using convolutional neural network and differential evolution algorithm,"Computational Intelligence and Neuroscience, vol. 2019, 2019.SCI, JCR 2, IF:3.12,引用:63

[6] G. Ye and J. Zhou*, "A block chaotic image encryption scheme based on self-adaptive modeling," Applied Soft Computing , vol. 22, pp. 351-357, 2014.SCI, JCR 1, IF:8.263,引用:43

[7] O.-Y. Lui, K.-W. Wong, J. Chen, and J. Zhou, "Chaos-based joint compression and encryption algorithm for generating variable length ciphertext," Applied Soft Computing, vol. 12, pp. 125-132, 2012. SCI, JCR 1, IF:8.263,引用:30

[8] Y.-H. Choi, P. Liu, Z. Shang, H. Wang, Z. Wang, L. Zhang, et al., "Using deep learning to solve computer security challenges: a survey," Cybersecurity,vol. 3, pp. 1-32, 2020.EI,引用:15

[9] L. Chen, G. Zhao, J. Zhou*, A. T. Ho, and L. M. Cheng, "Face template protection using deep LDPC codes learning," IET Biometrics, vol. 8, pp. 190-197, 2019.SCI, JCR 3, IF:2.716,引用:13

[10] A. Dahou, S. Xiong, J. Zhou, and M. A. Elaziz, "Multi-channel embedding convolutional neural network model for arabic sentiment classification," ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), vol. 18, pp. 1-23, 2019.CCF C, JCR 4, IF:1.471

[11]J. Zhou, Y. Fu, Y. Yang, and A. T. Ho, "Distributed video coding using interval overlapped arithmetic coding," Signal Processing: Image Communication, vol. 76, pp. 118-124, 2019. CCF C, JCR 2, IF:3.453,引用:10

[12]J. Zhou, K.-W. Wong, and J. Chen, "Distributed block arithmetic coding for equiprobable sources," IEEE Sensors Journal, vol. 13, pp. 2750-2756, 2013.SCI,JCR 2, IF:4.325, 引用:10

[13] Z. Tong(学生)andJ. Zhou*, "Face alignment using two-stage cascaded pose regression and mirror error correction," Pattern Recognition, vol. 115, p. 107866, 2021.CCF B, JCR 1, IF:8.518,引用:9

[14] Z. Tong(学生),J. Zhou*, Y. Yang, and L.-M. Cheng, "Robust facial landmark localization based on two-stage cascaded pose regression," in Proceedings of the AAAI Conference on Artificial Intelligence, 2019, pp. 10055-10056.CCF A

[15]J. Zhou, T. Lv, and X. Yi, "End-to-end Distributed Video Coding," in2022 Data Compression Conference (DCC), 2022, pp. 496-496.CCF B

[16]J. Zhou, H. Duan, K. Liang, Q. Yan, F. Chen, F. R. Yu, et al., "Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation,"The Computer Journal, vol. 60, pp. 1210-1222, 2017.CCF B, JCR 3, IF:1.762,引用:22

[17]T Yu(学生),J Zhou, L Wang, S Xiong, "Accurate and Robust Stereo Direct Visual Odometry for Agricultural Environment" IEEE International Conference on Robotics and Automation (ICRA), 2021, 2480-2486. CCF B

[17] B. Xu, D. Zhao, K. Jia, J. Zhou, J. Tian, and J. Xiang, "Cross-project aging-related bug prediction based on joint distribution adaptation and improved subclass discriminant analysis," in 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), 2020, pp. 325-334.CCF B

[18]J. Zhou, K. Shu, P. Liu, J. Xiang, and S. Xiong, "Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern," in 2020 25th International Conference on Pattern Recognition (ICPR), 2021, pp. 4221-4228.CCF C

[19] J. Rao, X. Yu, C. Zhang, J. Zhou, and J. Xiang, "Learning to rank software modules for effort-aware defect prediction," in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2021, pp. 372-380.CCF C

[20] D. Li, M. Liang, B. Xu, X. Yu, J. Zhou, and J. Xiang, "A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTE," in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2021, pp. 350-358.CCF C

[21] Y. Yang, M. Qi, J. Zhou*, and L.-M. Cheng, "Modified Decoding Metric Of Distributed Arithmetic Coding," in 2020 IEEE International Conference on Image Processing (ICIP), 2020, pp. 1108-1112.CCF C

[22] W. Rao, M. Xu, and J. Zhou*, "Improved metric learning algorithm for person re-identification based on asymmetric metric," in 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2020, pp. 212-216.EI

[23] C. Pan, G. Ye, X. Huang, and J. Zhou, "Novel meaningful image encryption based on block compressive sensing," Security and Communication Networks, vol. 2019, 2019.CCF C, JCR 3, IF:1.968

[24]J. Zhou, F. Liu, and L.-M. Cheng, "Image authentication using distributed arithmetic coding," Multimedia Tools and Applications, vol. 77, pp. 15505-15520, 2018.CCF C, JCR 2, IF:2.577

[25] Y. Pan, J. Zhou*, Y. Gao, J. Xiang, S. Xiong, and Y. Yang, "Robust facial landmark localization using LBP histogram correlation based initialization," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017, pp. 619-625.CCF C

[26] L. Harn, C.-F. Hsu, Z. Xia, and J. Zhou, "How to share secret efficiently over networks," Security and Communication Networks, vol. 2017, 2017.CCF C, JCR 3, IF:1.968

[27] Y. Yang, J. Zhou, F. Duan, F. Liu, and L.-M. Cheng, "Wave atom transform based image hashing using distributed source coding," Journal of information security and applications, vol. 31, pp. 75-82, 2016.CCF C, JCR 2, IF:4.96

[28] K.-W. W. J. Zhou*, Yanchao Yang, "Distributed Arithmetic Coding with Interval Swapping," Signal Processing, 2015.CCF C, JCR 2, IF:4.729

[29]J. Zhou, D. Shang, H. Lang, G. Ye, and Z. Xia, "Face Template Protection through Residual Learning Based Error-Correcting Codes," in 2021 4th International Conference on Control and Computer Vision, 2021, pp. 112-118.EI

[30]J. Zhou, K. Shu, D. Zhao, and Z. Xia, "Domain adaptation based person-specific face anti-spoofing using color texture features," in Proceedings of the 2020 5th International Conference on Machine Learning Technologies, 2020, pp. 79-85.EI

[31]J. Zhou, J. Li, E. Panaousis, and K. Liang, "Deep binarized convolutional neural network inferences over encrypted data," in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020, pp. 160-167.EI

[32]J. Zhou, M. Qi, Y. Yang, and S. Xiong, "Distributed arithmetic coding for memory sources," in Proceedings of the 2019 International Conference on Image, Video and Signal Processing, 2019, pp. 128-132.EI

[33] X. Wu, J. Zhou*, J. An, and Y. Yang, "Abnormal driving behavior detection for bus based on the Bayesian classifier," in 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), 2018, pp. 266-272.EI

[34] X. Tang, J. Zhou*, S. Xiong, J. Wang, and K. Zhou, "Geographic segmented opportunistic routing in cognitive radio ad hoc networks using network coding," IEEE Access, vol. 6, pp. 62766-62783, 2018.SCI, JCR 2, IF:3.476,引用:26

[35] W. Duan, X. Tang,J. Zhou, J. Wang, and G. Zhou, "Load balancing opportunistic routing for cognitive radio ad hoc networks," Wireless Communications and Mobile Computing, vol. 2018, 2018.SCI, JCR 3, IF:2.146

[36] G. Zhao, X. Zi, K. Liang, P. Yun, and J. Zhou*, "A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes," in International Conference on Green, Pervasive, and Cloud Computing, 2017, pp. 222-236.SCI, JCR 4, IF:0.302

[37] X. Wu, J. Zhou*, and Y. Pan, "Initial Shape Pool Construction for Facial Landmark Localization under Occlusion," IEEE Access, vol. 5, pp. 1-8, 2017.SCI, JCR 2, IF:3.476

[38] L. Chen, G. Zhao, J. Zhou*, and L. Kuang, "Real-time Traffic Sign Classification Using Combined Convolutional Neural Networks," in The 4th Asian Conference on Pattern Recognition, 2017, pp. 1-6.EI

[39] H. Yao, N. Xing, J. Zhou*, and Z. Xia, "Secure index for resource-constraint mobile devices in cloud computing," IEEE Access, vol. 4, pp. 9119-9128, 2016.SCI, JCR 2, IF:3.476

[40] C. Xia, J. Tian, E. Li, J. Zhou, J. Xiang, J. Wang, et al., "An efficient tool for industrial control system security analysis," in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2016, pp. 424-427.EI

[41] J. Chen(导师),J. Zhou, K.-W. Wong, Z. Ji, and M. Li, "Enhanced Cryptography by Multiple Chaotic Dynamics," Mathematical Problems in Engineering, vol. 2011, p. 29, 2010. SCI,JCR 3, IF:1.430

[42] J. Chen(导师)andJ. Zhou, "Improvement of security and feasibility for chaos-based multimedia cryptosystem," in International Conference on Computational Science and Its Applications, 2011, pp. 604-618. (EI)

[43]J. Zhou, K.-W. Wong, and J. Chen, "Distributed source coding using chaos-based cryptosystem," Communications in Nonlinear Science and Numerical Simulation, vol. 17, pp. 5110-5116, 2012. SCI,JCR 1, IF:4.186

[44] K.-W. W. Q. Lin, J. Zhou, L.Y. Zhang, "A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems," in Proceedings of 2014 International Symposium on Nonlinear Theory and its Applications, 2014.EI

[45]J. Zhou, F. Liu, J. Chen, L.-M. Cheng, Y. Yang, and D. Fei, "Wave Atoms Based Image Authentication Using Slepian-Wolf Coding," in DCIT, 2015, pp. 1-6.EI

[46]周俊伟,朱安娜,王亮亮,熊彪,熊盛武.面向国产MindSpore平台与Atlas 200的计算机视觉教学改革[J].计算机教育,2022(04):56.CCF C

[47]蔺毓敏(学生),周俊伟.基于深度学习的光流插帧边信息生成算法[J].计算机应用研究,2022,39(06):1901-1904.(北大核心)

[48]杨帆(学生),熊盛武,周俊伟,刘晓赟.基于自适应特征的遮挡人脸特征点定位算法[J].武汉大学学报(理学版),2019,65(03):243-249.(北大核心)

[49]魏木鑫,姚寒冰,周俊伟.基于HMM的文本图像字符分割算法[J].赢咖2注册平台登录学报,2018,40(09):89-95.(北大核心)

[50]姚寒冰,魏木鑫,周俊伟,李勇华.打印-扫描不变量结合双域的文本水印算法[J].华中科技大学学报(自然科学版),2018,46(06):122-127.(北大核心)

[51]姚寒冰,邢娜娜,周俊伟,李勇华.支持结果排序的安全密文检索方法研究[J].计算机科学,2018,45(05):123-130.(北大核心)