考研院校库 > 华侨大学 > 导师介绍 > 正文

华侨大学计算机科学与技术学院导师简介:田晖

作者:聚创华大考研网-余老师 点击量: 1604 发布时间: 2018-08-23 15:38 【微信号:扫码加咨询】

热门关键词:华侨大学计算机科学与技术学院导师  华侨大学田晖  硕士研究生导师  

 

个人简介

田晖,男,198210月出生,博士,教授,硕士生导师,现任网络与信息安全系主任。201012月获华中科技大学计算机系统结构专业博士学位,其中2007年和2008年在清华大学电子系从事访问研究;201012月起在华侨大学计算机科学与技术学院从事教学与科研工作,20129月遴选为硕士生导师,20141月晋升副教授,20176月试聘教授,201712月破格晋升教授;20162月至20172月获国家公派在新加坡国立大学(National University of Singapore)计算机学院从事访问研究。现为中国计算机学会(CCF)高级会员、CCF互联网专委会委员、CCF信息存储技术专委会委员、中国电子学会(CIE)会员、IEEE会员和ACM会员。

主要从事网络与信息安全、云计算安全、多媒体内容安全、数字隐写及分析、数字取证等方面的研究工作。近年来,主持国家自然科学基金项目3项(含促进海峡两岸科技合作联合基金重点项目子课题一项),福建省自然科学基金项目3项,福建省教育厅中青年教育科研项目1项,华侨大学中央科研业务费项目1项;作为主要技术骨干参与国家自然科学基金项目、福建省产学研重大项目、福建省重点科技计划项目等课题10余项;先后入选首批华侨大学中青年教师科技创新人才资助计划、厦门市重点人才、福建省高校杰出科研人才培育计划项目、福建省高校新世纪优秀人才支持计划。在国内外著名期刊和知名学术会议上发表学术论文70余篇,其中SCI检索35篇次,EI检索60余篇次;申请发明专利18项(获得授权5项),获得软件著作权4项;参与编写专著1项,编写教材1项。曾荣获第二届中国青少年科技创新奖(个人),中国电子学会科学技术奖二等奖(2013),厦门市第七届自然科学优秀学术论文一等奖(2012),泉州市第八届自然科学优秀学术论文一等奖(2014),福建省第十一届自然科学优秀学术论文二等奖(2014),2012-2014学年度华侨大学优秀教师称号(2014)及2014-2016学年度华侨大学科研先进个人(2016)。

先后担任IWCC2013IWCC2014国际学术会议的共同主席(co-chair), IWCC2017, WTMC2017, INCoS 2016, WTMC2016, BioSTAR2016, BCSN 2015, ICACT2012, IWCC2012, ICCCT2012, ICACT2011等多个国际学术会议的程序委员会委员,担任SCIEI检索国际期刊Security and Communication Networks (Wiley), Annals of Telecommunications (Springer), EURASIP Journal on Information Security (EURASIP)Advances in Multimedia客座编辑以及International Journal of Advancements in Computing TechnologyJournal of Cyber Security and Mobility的编委,且多次应邀担任国际著名期刊IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Industrial Informatics, IEEE Security & Privacy, Communications of the ACM, Computer & Security, Computers & Electrical Engineering, Transactions on Emerging Telecommunications Technologies, Multimedia Systems, Security and Communication Networks, International Journal of Communication Systems等的审稿人。

招生专业① 计算机科学与技术\软件工程(学硕);②计算机技术(专硕).

研究方向:网络与信息安全、云计算安全、多媒体内容安全、数字隐写及分析、数字取证等.

指导研究生情况(培养硕士研究生13名,其中已毕业5名,有4人获华侨大学承志英才优秀硕士学位论文奖,1人获推福建省优秀硕士学位论文):

1)毕业研究生:

2012级郭舒婷,女,计算机技术专业硕士研究生,就职于厦门市美亚柏科信息股份有限公司;在学期间,发表一类B论文1篇,二类论文一篇,申请发明专利三项。

2013级秦界,男,计算机应用技术专业硕士研究生,就职于国家电网四川省电力公司技能培训中心/四川电力职业技术学院;在学期间发表学术论文8篇,其中SCI三区3篇、四区1篇,EI检索3篇,申请发明专利2项,获研究生国家奖学金、校三好学生,硕士学位论文获华侨大学优秀硕士学位论文。

2013级吴彦鹏,男,计算机应用技术专业硕士研究生,就职于厦门市美亚柏科信息股份有限公司;在学期间发表学术论文4篇,其中SCI二区1篇、三区1篇、四区1篇、EI检索1篇,申请发明专利1项;获校一等奖学金,校优秀毕业生,硕士学位论文获华侨大学优秀硕士学位论文。

2014级陈羽翔,女,模式识别与智能系统专业硕士研究生,就职于携程旅游网络技术有限公司;在学期间发表学术论文4篇,其中SCI二区1篇、四区1篇、EI检索期刊论文1篇;获校一等奖学金,硕士学位论文获华侨大学优秀硕士学位论文。

2014级陈钊懿,男,计算机技术专业硕士研究生,就职于中国工商银行广州分行;在学期间发表学术论文5篇,其中SCI三区2篇、EI检索3篇;硕士学位论文获华侨大学优秀硕士学位论文。

2)在读研究生:

2015级孙俊,女,计算机应用技术专业硕士研究生

2015级朱照华,男,计算机应用技术专业硕士研究生

2015级南福麟,男,计算机应用技术专业硕士研究生

2016级黄美伦,男,计算机科学与技术专业硕士研究生

2016级陈文琪,男,计算机技术专业硕士研究生

2017级王佳,女,计算机科学与技术专业硕士研究生

2017级刘杰,男,计算机科学与技术专业硕士研究生

2017级刘小康,男,计算机技术专业硕士研究生

招生要求(2018年计划招收研究生3名,含学硕和专硕):

1. 上进心强,勤奋努力(必备)

具备以下条件者优先:

2.  善于思考,乐于钻研,不畏困难

3.  基础好:较好的编程能力,较高的写作水平,较扎实的数学功底,较强的英语基础

4.  有读博的意愿(优秀的硕士研究生可推荐到国内外知名高校攻读博士学位)

关于如何规划研究生生涯,有兴趣的同学可进一步阅读:

1. 给新入课题组研究生的一封信(http://www.zjxslm.com/nvxing/9017.html

2. 研究生的赫曼法则(http://blog.sciencenet.cn/blog-41757-1099644.html

主要科研项目:

1.国家自然科学基金(NSFC-通用技术基础研究联合基金)、U1536115、基于即时通讯的隐蔽信道快速检测理论与方法、2016.01-2018.1276万、主持、在研。

2.国家自然科学基金(促进海峡两岸科技合作联合基金)重点项目、U1405254、云数据安全审计的理论模型与新方法研究、2015/01-2018/1260/245万元、子课题主持、在研。

3.福建省自然科学基金面上项目、面向企业级云存储的数据安全审计技术研究、2018.01-2020.124万、主持、在研。

4.福建省高校新世纪优秀人才支持计划、2016.10-2019.106万、主持、在研。

5.福建省高校杰出青年科研人才培育计划、2015.10-2018.104万、主持、在研。

6.国家自然科学基金面上项目、61370007、基于数字水印的网络入侵检测的研究、2014/01-2017/1261万、参加(第二)、在研。

7.国家自然科学基金青年项目、61302094、面向网络流媒体隐蔽通信的非均衡隐写方法研究、2014/01-2016/1225万、主持、已结题。

8.华侨大学优秀中青年教师资助计划(培育型科技科技创新人才项目)、ZQN-PY115、基于网络流媒体的高性能隐蔽通信技术研究、2013.10- 2017.0940万、主持、已结题。

9.福建省自然科学基金面上项目、2014J01238、基于网络流媒体的非均衡多维隐蔽通信技术研究、2014.01-2015.124万、主持、已结题。

10.福建省自然科学基金青年项目、2011J05151、基于网络流媒体的多维融合隐蔽通信理论与方法研究、2011.04-2013.033万、主持、已结题。

11.福建省教育厅中青年教师教育科研项目、JA13012、基于网络流媒体的深度隐写技术研究、2013/09-2016/081万、主持、已结题。

12.福建省自然科学基金面上项目、2013J01241、物联网中几个关键安全问题的研究、2013/01-2015/124万、参加、已结题。

13.国家自然科学基金青年项目、61202468、基于可移动摄像头的协同式安全监控和目标跟踪、2013/01-2015/1225万、参加(第三)、已结题。

主要学术论文(*”表示通信作者,以下分区特指中科院分区):

[1] Hui Tian*, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, Yonghong Chen. Public Auditing for Trusted Cloud Storage Services, IEEE Security & Privacy, 2017. (已录用,IF2017= 1.382, scheduled for publication in January/February 2019)

[2] Hui Tian*, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, Jin Liu. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage, IEEE Transactions on Services Computing. 2017, 10(5): 701-714. (IF2017= 3.520, SCI 2区(大类)/1区(小类), TOP期刊)

[3] Hui Tian*, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen, Tian Wang, Yiqiao Cai, Jin Liu. Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pulse Pairs, Signal Processing, 2017, 134C: 9-22. (SCI & EI, IF2017= 3.110, SCI 2区)

[4] Hui Tian*, Jun Sun, Chin-Chen Chang, Jie Qin and Yonghong Chen. Hiding Information into Voice-over-IP Streams Using Adaptive Bitrate Modulation, IEEE Communications Letters, 2017, 21(4): 749-752. (SCI & EI, IF2017= 1.988, SCI 3)

[5] Hui Tian*, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Jing Lu. Distributed Steganalysis of Compressed Speech, Soft Computing, 2017, 21(3): 795-804. (SCI & EI, IF2017= 2.472, SCI 3)

[6] Hui Tian*, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, Tian Wang. Enabling Public Auditability for Operation Behaviors in Cloud Storage, Soft Computing, 2017, 21(8): 2175-2187. (SCI & EI, IF2017= 2.472, SCI 3)

[7] Hui Tian*,Jun Sun, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai. Detecting Steganography of Adaptive Multi-Rate Speech with Unknown Embedding Rate, Mobile Information Systems, vol. 2017, article no. 5418978, 18 pages, 2017.(SCI & EI, IF2016= 1.462, SCI 3)

[8] Hui Tian*, Jie Qin, Chin-Chen Chang, Yongfeng Huang, Yonghong Chen. Improved Wet Paper Code Using Simplified Hamming Parity-Check Matrix and Its Application in Voice-over-IP Steganography, Journal of Internet Technology, 2017, 18(3): 99-107. (SCI & EI,IF2017= 1.930, SCI 4)

[9] Hui Tian*, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen and Yiqiao Cai. Steganalysis of Analysis-by-synthesis Speech Exploiting Pulse-position Distribution Characteristics, Security and Communication Networks, 2016, 9(15): 2934-2944. (SCI & EI, IF2016= 0.72,SCI 4)

[10] Hui Tian*, Jie Qin, Yongfeng Huang, Yonghong Chen,Tian Wang, Jin Liu, Yiqiao Cai. Optimal Matrix Embedding for Voice-over-IP Steganography, Signal Processing, 2015, 117: 3343. (SCI & EI, IF = 2.238SCI3)

[11] Hui Tian*, Jie Qin, Shuting Guo, Yongfeng Huang, Jin Liu,Tian Wang, Yonghong Chen, Yiqiao Cai. Improved Adaptive Partial-Matching Steganography for Voice over IP, Computer Communications, 2015, 2015, 70(c): 95-108. (SCI & EI, IF = 1.695SCI3)

[12] Hui Tian*, Jin Liu, Songbin Li. Improving Security of Quantization-Index-Modulation Steganography in Low Bit-rate Speech Streams, Multimedia Systems, 2014, 20(2): 143-154. (SCI & EI, IF = 0.876,SCI4)

[13] Hui Tian*, Hong Jiang, Ke Zhou, Dan Feng. Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography, The Computer Journal (Oxford University Press), 2012, 55(6): 702 716. (SCI&EI, IF = 1.181,SCI3区,该论文获第十一届福建省自然科学优秀学术论文二等奖)

[14] Hui Tian*, Hong Jiang, Ke Zhou, Dan Feng. Adaptive Partial-Matching Steganography for Voice over IP Using Triple M Sequences, Computer Communications, 2011, 34 (18): 2236 2247. (SCI & EI, IF = 1.352,SCI3区,该论文获第七届厦门市自然科学优秀学术论文一等奖)

[15] Hui Tian*, Ke Zhou, Dan Feng. Dynamic Matrix Encoding Strategy for Voice-over-IP Steganography, Journal of Central South University of Technology, 2010, 17(6): 1285 1292. (SCI & EI, IF = 0.434)

[16] Jin Liu,Hui Tian, Jing Lu, Yonghong Chen. Neighbor-Index-Division Steganography Based on QIM Method for G.723.1 Speech Streams, Journal of Ambient Intelligence and Humanized Computing, 2016, 7(1): 139-147. (SCI & EI, IF = 0.835SCI 4)

[17] Tian Wang, Yang Li, Yonghong Chen,Hui Tian*, Yiqiao Cai, Weijia Jia, Baowei Wang. Fog-Based Evaluation Approach for Trustworthy Communication in Sensor Cloud System, IEEE Communications Letters, 21(11): 2532-2535. (SCI & EI, IF2017= 1.988, SCI 3)

[18] Tian Wang,Jiandian Zeng, Md Zakirul Alam Bhuiyan,Hui Tian*, Yiqiao Cai, Yonghong Chen, Bineng Zhong. Trajectory Privacy Preservation based on a Fog Structure in Cloud Location Services, IEEE Access, 2017:5(1):7692-7701.(SCI & EI检索,IF2017= 3.244, SCI 3)

[19] Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai,Hui Tian, Yonghong Chen. Reliable Wireless Connections for Fast-moving Rail Users Based on A Chained Fog Structure, Information Science, 2017, 379: 160-176. (SCI & EI, IF2017= 4.832, SCI 2)

[20] Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen,Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang. The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc & Sensor Wireless Networks 2017, 37(1-4): 95-115. (SCI & EI, SCI4)

[21] Tian Wang, Wenhua Wang, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Yongxuan Lai, Yiqiao Cai,Hui Tian, Yonghong Chen, Baowei Wang. Interoperable localization for mobile group users. Computer Communications, 2017,105: 53-65. (SCI & EI, SCI 3)

[22] Yiqiao Cai, Guo Sun, Tian Wang,Hui Tian, Yonghong Chen, Jiahai Wang. Neighborhood-Adaptive Differential Evolution for Global Numerical Optimization. Applied Soft Computing, 2017, 59: 659-706. (SCI & EI, IF2017= 3.541, SCI 2)

[23] Yonghong Chen, Ning Zhang,Hui Tian, Tian Wang, Yiqiao Cai. A Novel Connection Correlation Scheme Based on Threshold Secret Sharing. IEEE Communications Letters, 2016, 20(12): 2414 - 2417. (SCI & EI, SCI 3)

[24] Yiqiao Cai, Jingliang Liao, Tian Wang, Yonghong Chen,Hui Tian. Social Learning Differential Evolution. Information Sciences, 2016, DOI: 10.1016/j.ins.2016.10.003. (SCI & EI, SCI 2)

[25] Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki andHui Tian. Trends in Modern Information Hiding: Techniques, Applications and Detection, Security and Communication Networks, 2016, 9(8): 703-704. (SCI & EI, IF = 0.72SCI 4)

[26] Yiqiao Cai, Yonghong Chen, Tian Wang,Hui Tian. Improving Differential Evolution with A New Selection Method of Parents for Mutation, Frontiers of Computer Science, 2016, 10(2): 246-269. (SCI & EI, IF = 0.434SCI 4)

[27] Yiqiao Cai, Meng Zhao, Jingliang Liao, Tian Wang,Hui Tian, Yonghong Chen. Neighborhood Guided Differential Evolution, Soft Computing, 2016, 21(16): 4769-4812. (SCI & EI, IF = 1.271SCI 3)

[28] Yiqiao Cai, Jiahai Wang, Yonghong Chen, Tian Wang,Hui Tian, Wei Luo., Adaptive Direction Information in Differential Evolution for Numerical Optimization, Soft Computing, 2016, 29(2): 465-494. (SCI & EI, IF = 1.271SCI 3)

[29] Tian Wang*, Zhen Peng, Cheng Wang, Yiqiao Cai, Yonghong Chen,Hui Tian, Junbin Liang, and Bineng Zhong. Extracting Target Detection Knowledge Based on Spatio-temporal Information in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, Volume 2016 (2016), Article ID 5831471, 11 pages. (SCI & EI, IF = 0.665SCI 4)

[30] Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang,Hui Tian, Yonghong Chen, Bineng Zhong. Maximizing Real-time Streaming Services Based on a Multi-Servers Networking Framework, Computer Networks, 2015, 93(1):199-212. (SCI & EI, IF = 1.256SCI 3)

[31] Jingliang Liao, Yiqiao Cai, Tian Wang,Hui Tian, Yonghong Chen, Cellular Direction Information Based Differential Evolution For Numerical Optimization: An Empirical Study, Soft Computing, 2016, 20(7): 2801-2827. (SCI & EI, IF = 1.271SCI 3)

[32] Tian Wang, Weijia Jia, Bineng Zhong,Hui Tian, Guoliang Zhang. BlueCat: An Infrastructure-Free System for Relative Mobile Localization, Ad Hoc & Sensor Wireless Networks, 2015, 29(1-4): 133-152. (SCI & EI, IF = 0.435SCI 4)

[33] Jin Liu,Hui Tian, Ke Zhou*, Frame-Bitrate-Change Based Steganography for Voice-over-IP, Journal of Central South University, 2014, 21: 4544-4552. (SCI & EI, IF = 0.520SCI 4)

[34] Songbin Li, Haojiang Deng,Hui Tian, Qiongxing Dai. Steganalysis of Prediction Mode Modulated Data-Hiding Algorithms in H.264/AVC Video Stream, Annals of Telecommunications - annales des télécommunications, 2014, 69 (7):461-473. (SCI & EI, IF = 0.69SCI 4)

[35] Wojciech Mazurczyk, Krzysztof Szczypiorski,Hui Tian. Network forensics and Challenges for Cybersecurity, Annals of Telecommunications - annales des télécommunications, 2014, 69(7): 345-346. (SCI & EI, IF = 0.699SCI 4)

[36] Hui Tian*, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai. A High-capacity Covering Code for Voice-over-IP Steganography, International Journal of Information Technology and Web Engineering, 2015, 10(3), 46-63. (EI).

[37] Hui Tian*, Ronglie Guo, Jing Lu, Yonghong Chen. Implementing Covert Communication over Voice Conversations with Windows Live Messenger, Advances in Information Sciences and Service Sciences, 2012, 4(4): 18 26. (EI,该论文获第八届泉州市自然科学优秀学术论文一等奖)

[38] Hui Tian*, Ke Zhou, Jing Lu. A VoIP-Based Covert Communication Scheme Using Compounded Pseudorandom Sequence, International Journal of Advancements in Computing Technology, 2012, 4(1): 223 230. (EI)

[39] 田晖*,陈羽翔,黄永峰,卢璥.基于Shamir秘密共享的云端多副本审计,华中科技大学学报(自然科学版), 2016, 44(3): 77-82 (EI).

[40] 田晖*,郭舒婷,秦界,黄永峰,陈永红,卢璥.基于可量化性能分级的自适应IP语音隐写方法,电子学报, 2016, 44(11): 2735-2741. (EI)

[41] Fulin Nan,Hui Tian*, Tian Wang, Yiqiao Cai and Yonghong Chen. A Collusion-Resistant Public Auditing Scheme for Shared Cloud Data. International Journal of Information Technology and Management, 2017. (已录用,EI源刊)

[42] Xin Chen, Yonghong Chen,Hui Tian, Tian Wang, Yiqiao Cai. A Blind Detection Model for Tracing Back a Single-packet from Mixed Traffic by Determining Parameters of Features' Windows, Journal of Information & Computational Science, 2015, 12(16): 6209-6218. (EI)

[43] Jingliang Liao, Yiqiao Cai, Yonghong Chen, Tian Wang,Hui Tian. Differential Evolution Enhanced with Composite Population Information Based Mutation Operators, Journal of Digital Information Management 2015, 13(4), 210-223.EI

[44] Jin Liu, Ke Zhou,Hui Tian*, Chunhua Li, Efficient Least-significant-bits Steganography for VoIP, International Journal of Advancements in Computing Technology, 2012, 4(10): 297305. (EI)

[45] 周长利,田晖,马春光,杨松涛.路网环境下基于伪随机置换的LBS隐私保护方法研究,通信学报,2017, 38(6): 19-29.

[46] 王田,吴群,文晟,蔡奕侨,田晖,陈永红,无线传感网中移动式蠕虫的抑制与清理,电子与信息学报, 2016, 38(9): 2202-2207. (EI)

[47] 张彦铎,田晖.改进的粒子群优化算法在机器人足球中的应用,哈尔滨工业大学学报, 2005, 37(7): 905-908. (EI)

[48] Hui Tian, Ke Zhou, Hong Jiang, Dan Feng. Digital Logic Based Encoding Strategies for Voice-over-IP Steganography, in: Proceedings of the 17th ACM Multimedia Conference (ACM MM 2009), Beijing, China, October 2009, pp. 777 800. (EI,多媒体通信领域国际顶级学术会议, CCF A类会议)

[49] Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu, Dan Feng. An M-Sequence Based Steganography Model for Voice over IP, in: Proceedings of the 44th IEEE International Conference on Communications (ICC2009), Dresden, Germany, June, 2009, pp. 1 5. (EI, IEEE Communication Society旗舰级学术会议,被引用50次,CCF C类会议)

[50] Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu, Dan Feng. An Adaptive Steganography Scheme for Voice over IP, in: Proceedings of the 22rd IEEE International Symposium on Circuits and Systems (ISCAS 2009), Taipei, Taiwan, May, 2009, pp. 2922 2925. (EI, IEEE Circuits and Systems Society旗舰级学术会议,被引用36次,CCF C类会议)

[51] Hui Tian, Ke Zhou, Yongfeng Huang, Jin Liu, Dan Feng. A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP, in: Proceedings of the 9th International Conference for Young Computer Scientists, Zhangjiajie, China, November, 2008, pp. 647 652. (EI,被引用41)

[52] Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai. Steganalysis of Low Bit-rate Speech Based on Statistic Characteristics of Pulse Positions. Proceedings of The 10th International Conference on Availability, Reliability and Security (ARES), Aug. 2015, pp.455-460. (EI)

[53] Zhaoyi Chen,Hui Tian*, Jing Lu, Wenqi Chen, Yiqiao Cai, Tian Wang, Yonghong Chen. Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage, Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), July, 2017, pp. 51-57. (EI)

[54] Zhaoyi Chen,Hui Tian*, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen. Secure Logging and Public Audit for Operation Behavior in Cloud Storage. Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), July, 2017, pp. 444-450. (EI)

[55] Jie Qin,Hui Tian*, Yongfeng Huang, Jin Li, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang. An Efficient VoIP Steganography Based on Random Binary Matrix. Proceedings of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Nov. 2015, pp.1-4. (EI)

[56] Qun Wu, Tian Wang, Yiqiao Cai,Hui Tian, Yonghong Chen. Rumor Restraining Based On Propagation Prediction With Limited Observations In Large-Scale Social Networks. Proceedings of the Australasian Computer Science Week Multiconference, January 30 - February 03, 2017 Article No. 1. (EI)

[57] Xinling Kong, Yonghong Chen,Hui Tian, Tian Wang, Yiqiao Cai, Xin Chen. A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering. Proceedings of the International Conference on Cyber-enabled distributed computing and knowledge discoveryOct. 2016, pp. 42-45.

[58] Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai,Hui Tian, Yonghong Chen. Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. Proceedings of the 9thInternational Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Nov. 2016, pp. 197-207.

[59] Jin Liu, Ke Zhou,Hui Tian. Least-Significant-Digit Steganography in Low Bit-Rate Speech, Proceedings of the 47th IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, June, 2012. (EI, IEEE Communication Society旗舰级学术会议,被引用23, CCF C类会议)

[60] Ke Zhou, Jin Liu,Hui Tian. State-based Steganography in Low Bit Rate Speech, In: Proceedings of the 20th ACM Multimedia Conference (ACM-MM2012), Nara, Japan, Oct. 29 Nov. 2, 2012. (EI,多媒体通信领域国际顶级学术会议, CCF A类会议)

[61] Tian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen,Hui Tian, and Bineng Zhong. Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks, Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, Qufu, China, August 10-12, 2015, pp. 836-844. (EI)

[62] Tian Wang, Zhen Peng, Yonghong Chen, Yiqiao Cai, andHui Tian. Continuous Tracking for Mobile Targets with Mobility Nodes in WSNs, Proceedings of the 2014 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China, 3 - 5 November, 2014, pp. 261-268. (EI)

[63] Yue Chen, Yan-Duo Zhang, Jing Lu,Hui Tian. An Integer-Coded Chaotic Particle Swarm Optimization for Traveling Salesman Problem, Proceedings of 2009 FIRA RoboWorld Congress, Incheon, Korea, Aug. 2009. (EI)

[64] Yanduo Zhang,Hui Tian, Jing Lu. A Novel discrete Particle Swarm Optimization for Optimal Assignment Problem, Proceedings of the 2nd International Symposium on Intelligence Computation and Applications (ISICA2007), Wuhan, China. September 20-23, 2007. (EI)

[65] Yanduo Zhang, Jing Lu,Hui Tian. A Novel Improved Adaptive Genetic Algorithm for the Solution to Optimal Assignment Problem, Proceedings of the 2ndIEEE International Conference on Computer Science and Education (ICCSE2007), Wuhan, China. July 25-28, 2007. (EI)

[66] 田晖*,陈羽翔,黄永峰,卢璥.云数据持有性审计研究与进展.计算机科学, 2017, 44(6):8-16, 50.

[67] 郭舒婷,田晖*.一种基于G.729a语音的信息隐藏方法.华侨大学学报(自然科学版), 2014, 35(3):277-282.

[68] 王田,彭臻,陈永红,田晖,蔡奕侨.异构无线传感器网络对移动目标的连续跟踪,小型微型计算机系统, 2015, 36(3):503-507.

[69] 王田,彭臻,洪晓华,蔡奕侨,陈永红,田晖.无线传感器网络中的移动式目标跟踪,华侨大学学报, 2016, 37(6): 737-742.

[70] 邱应强,冯桂,田晖.利用整数变换的高效图像可逆信息隐藏方法,华侨大学学报(自然科学版), 2014,35(2):136-141.

[71] 田晖*,卢璥,陈永红,流媒体信息隐藏的安全性界定及安全容量模型,郑州轻工业学院学报(自然科学版), 2012, 27(3): 5-10.

[72] 刘怀进,陈永红,田晖,王田,蔡奕侨.基于属性的安全与高效的密文加密方案,小型微型计算机系统, 2017, 38(8): 1708-1711.

[73] 蒋堃,陈永红,田晖,王田,蔡奕侨.监控与预测的云资源优化配置.华侨大学学报(自然科学版), 2017, 38(4): 573-578.

[74] 刘怀进,陈永红,田晖,王田,蔡奕侨.两层无线传感网中节能的安全范围查询方法[J].计算机科学, 2016 , 43(11A): 393-397.

[75] Yanduo Zhang, Jing Lu,Hui Tian. A Novel Improved Adaptive Genetic Algorithm for the Solution to Optimal Assignment Problem, International Journal of Systems and Control, 2007, 2(3): 253-261. (被引用10)

[76] Yanduo Zhang,Hui Tian, Soccer Robots' Role Assignment Based on Adaptive Genetic Algorithm, In: Proceedings of the FIRA Robot World Congress 2006, Dortmund, Germany. June 30 - July 1, 2006.

[77] Yanduo Zhang, Hua Wu,Hui Tian, Research on Emotion Recognition of Music Based on Self-Organizing, In: Proceedings of the 3rd International Conference on Computational Intelligence, Robotics and Autonomous System, Singapore, Dec. 2005.

主要发明专利:

[1] 田晖,郭舒婷,刘进,陈永红,黄永峰,陈维斌,陈锻生.一种面向IP语音的最低有效位分级隐写方法,中国发明专利, 授权时间:2017222日,专利号:ZL201410227422.2.

[2] 田晖,卢璥,郭舒婷,秦界,刘进,黄永峰,陈永红,陈维斌,陈锻生.一种基于速率调制的IP语音隐写方法,中国发明专利,授权时间:201731日,专利号:ZL201410295357.7.

[3] 田晖,郭舒婷,秦界,卢璥,刘进,黄永峰,陈永红,陈维斌,陈锻生.一种基于最佳相似度匹配的IP语音隐写方法,中国发明专利,授权时间:201745日,专利号:ZL201410431440.2.

[4] 田晖,吴彦鹏,卢璥,黄永峰,陈永红,王田,蔡奕侨,刘进.一种基于比特组合的低速率语音最低有效位隐写检测方法,中国发明专利, 授权时间:201839日,,专利号: ZL201410743434.0.

[5] 田晖,董浩,卢璥,陈永红,王田,蔡奕侨.一种基于网络拓扑结构图的隐写方法,中国发明专利,专利申请号:201710711957.0.

[6] 周可,田晖,刘进.基于流加密的IP语音隐蔽通信方法,中国发明专利,授权时间:201012,专利号:ZL2009100 60498.X.

[7] 周可,田晖,刘进.基于m序列的IP语音隐蔽通信方法,中国发明专利,授权时间:201012,专利号:ZL200910060 499.4.

[8] 陈永红,郭伟鹏,田晖,王田,蔡奕侨.一种基于云计算的入侵检测方法与系统,中国发明专利,申请号: CN201510870283.X,公开(公告)号: CN105376251A.

[9] 陈永红,侯雪艳,田晖,王田,蔡奕侨.一种基于双重冗余的主动网络流数字水印方法,中国发明专利,申请号: CN201510703425.3,公开(公告)号: CN105404797A.

[10] 陈永红,侯雪艳,田晖,王田,蔡奕侨.一种利用信息熵和哈希函数进行网络数据流零水印提取的方法,中国发明专利,申请号: CN201510701787.9,公开(公告)号: CN105429940A.

[11] 陈永红,王珊,田晖,王田,蔡奕侨.一种基于网络流水印的网络主动追踪方法及系统,中国发明专利,申请号: CN201510386446.7,公开(公告)号: CN105072083A.

[12] 陈永红,蒋堃,侯雪艳,田晖,王田,蔡奕侨.一种云计算系统的能效监控和管理方法与系统,中国发明专利,申请号: CN201410335946.3,公开(公告)号: CN104113596A.

[13] 陈永红,蒋堃,侯雪艳,田晖,王田,蔡奕侨.一种私有云的云监控系统及方法,中国发明专利,申请号: CN201410481851.2,公开(公告)号: CN104301389A.

[14] 陈永红,蒋堃,侯雪艳,王珊,陈欣,田晖,王田,蔡奕侨.一种多级负载预测与云资源弹性配置方法与监控配置系统,中国发明专利,申请号: CN201510043131.2,公开(公告)号: CN104639626A.

[15] 王田,苏耕民,钟必能,陈永红,蔡奕侨,田晖,王成.一种行车跟随方法和系统,中国发明专利,申请号: CN201510236744.8,公开(公告)号: CN104819722A.

[16] 王田,钟必能,王成,陈永红,田晖,蔡奕侨,吴尤可.一种基于UDP传输实现监控功能的应用层协议,中国发明专利,申请号: CN201510008776.2,公开(公告)号: CN104580212A.

[17] 王田,董宇,蔡奕侨,陈永红,田晖.一种移动循迹监控系统,中国发明专利,申请号: CN201410647822.9,公开(公告)号: CN104378591A.

[18] 王田,蔡奕侨,钟必能,陈永红,田晖,张国亮.一种轻量级的多方会议混音方法和装置,中国发明专利,申请号: CN201410414450.5,公开(公告)号: CN104167210A.

软件著作权

[1]. 田晖,陈航宇,陈剑.基于海量多媒体信息隐藏的安全存储系统V1.0,计算机软件著作权,登记号: 2015SR001049.

[2]. 田晖,赖跃进,丁殿成,陈钊懿,秦界,雷丽楠,陈翼红,丁左丞.面向智能手机的安全短消息通信及管理系统[简称:MI] V1.0,计算机软件著作权,登记号: 2015SR079588.

[3]. 田晖,陈航宇,陈剑.基于“移动终端—个人计算机”的开放资源共享平台V1.0,计算机软件著作权,登记号: 2014SR138547.

[4]. 田晖,李新宇,祝峰,任昆鹏,常宽.基于可信第三方的云数据安全审计系统CloudAudit V1.0,计算机软件著作权,登记号: 2017SR502638.

部分获奖情况

1)指导团队成员在“挑战杯”全国大学生课外学术科技作品竞赛、中国大学生计算机设计大赛、海峡两岸信息服务创新大赛暨福建省计算机软件设计大赛等专业学科竞赛中共获得全国二等奖2项,三等奖6项,省部级一等奖4项、二等奖2项、三等奖4项等。

2)指导团队成员先后获大学生创新创业训练计划项目国家级3项,省级4项,校级1项。

3)先后指导郭荣烈(2011)、郭舒婷(2012)、陈钊懿(2014)和祝峰(2017)同学获得华侨大学优秀本科毕业论

联系方式

Office:机电信息大楼A4410室;综合教学楼群计算机学院D4-408室(系主任办公室)

Email:cshtian@126.com

更多华侨大学考研信息,请点击查看华侨大学考研网


以上是聚创考研网为考生整理的"华侨大学计算机科学与技术学院导师简介:田晖"的相关考研信息,希望对大家考研备考有所帮助! 备考过程中如有疑问,也可以添加老师微信H17720740258进行咨询。

分享:
学习QQ群
MORE
浏览过该网页的还看了 MORE
聚创考研网校微信 聚创考研网校微信