康显桂

职称: 
教授
办公电话: 
020-39333120
E-mail: 
isskxg@mail.sysu.edu.cn
办公地点: 
中山大学教学实验中心B501(广东省信息安全重点实验室B501)
教师简介: 

  中山大学计算机学院教授,博士导师,兼任广东省信息安全重点实验室副主任。先后毕业于北京大学、南京大学、中山大学,并取得学士、硕士、博士学位。

 主要研究方向是深度学习,模式识别,多媒体信息隐藏和多媒体信息取证方法与理论,金融与股票市场大数据挖掘与波动建模分析。2005年以来,主持各类科研项目20多项,包括主持国家自然科学基金面上以上项目5项和广东省自然科学基金重点项目1项,作为骨干成员参加参加国家973计划项目、国家自然科学基金重点项目和国家自然科学基金-广东省联合基金重点项目等多项。

 在本领域国内外重要刊物以第一作者或通讯作者共发表论著70多篇(章),已收录SCI 20多篇,已收录EI 40多篇;获授权国家发明专利 4项。研究成果两次获得本领域重要国际会议International Workshop on Digital-Forensics and Watermarking (IWDW)2008 年和2013年论文最佳奖, 国家教育部提名国家科学技术奖自然科学一等奖, 广东省优秀博士论文奖等国际国内多项奖励。学术任职包括:  IEEE 通讯学会多媒体通信技术委员会成员,环太平洋国家信号处理协会图像和视频处理技术委员会成员,全国信息隐藏专家委员会成员等。

中国计算机学会推荐国际著名期刊“Signal Processing: Image Communication”(SCI影响因子2.2) 和 “EURASIP Journal on Image and Video Processing”(SCI影响因子1.7) 的编委。

招收计算机科学与技术,网络空间信息安全和通信与信息系统专业的博士和硕士研究生,有兴趣的同学请尽早联系

同时特别欢迎优秀的本科生联系进入实验室学习和深造。

 

新闻:康显桂老师在全球人工智能重镇加拿大蒙特利尔举行的2017年IEEE GlobalSIP盛会上将做深度学习与信息安全方面的杰出演讲Distinguished Talk)。
https://2017.ieeeglobalsip.org/sym/17/DL#DL-DST.1

 

研究领域: 

 计算机科学与技术,   网络与信息安全,研究方向:

1. 深度学习、模式识别

2. 多媒体信息隐藏和信息取证方法与理论, 多媒体大数据处理与通信

3. 金融与股票市场大数据挖掘与波动建模分析

教育背景: 

2014/06 - 2014/09,加拿大  University of British Columbia 访问学者,合作导师:Prof. Z.Jane Wang

2011/08 – 2012/08,美国马里兰大学电气与计算机工程系访问学者,合作导师:IEEE signal processing society 的主席Prof. K. J. Ray Liu(IEEEfellow)

2004/08 – 2005/09,美国新泽西理工学院(NJIT)电气与计算机工程系博士后, 合作导师:Prof. Yun Q. Shi (IEEE fellow)

1998/09 – 2004/03,中山大学计算机软件与理论专业博士研究生, 获理学博士

1990/09 – 1993/07,南京大学硕士研究生, 获理学硕士

1986/09 – 1990/07,北京大学本科生, 获理学学士

工作经历: 

现为中山大学数据科学与计算机学院教授和博士生导师,兼任广东省信息安全重点实验室副主任。从1996年起在中山大学从事教学和科研,2010年6月起任中山大学教授,2010年12月起任中山大学博士导师。

海外经历: 

2014/06 - 2014/09,加拿大 University of British Columbia 访问学者,合作导师:Prof. Z.Jane Wang

2011/08 – 2012/08,美国马里兰大学电气与计算机工程系访问学者,合作导师:IEEE signal processing society 的主席Prof. K. J. Ray Liu(IEEEfellow)

2004/08 – 2005/09,美国新泽西理工学院(NJIT)电气与计算机工程系博士后, 合作导师:Prof. Yun Q. Shi (IEEE fellow)

获奖及荣誉: 

1) 获得本领域重要国际会议IWDW 2013的最佳学生论文奖 (Best Student Paper Award,论文通讯作者):Hui Zeng, 康显桂*, “Camera Source Identification Game with incomplete information,” in Proc. of International Workshop on Digital-forensics and Watermarking, IWDW 2013, 2013/10/01-2013/10/03, Auckland, New Zealand, 2013;

2) 获得本领域重要国际会议IWDW 2008的最佳学生论文奖 (Best Student Paper Award,论文通讯作者):Rui Yang, 康显桂*, Jiwu Huang. "Robust Audio Watermarking Based On Log-polar Frequency Index", in Proc. of International Workshop on Digital-forensics and Watermarking, IWDW 2008, Busan, Korea, 2008;

3) 稳健数字水印方法,教育部提名国家科学技术奖自然科学一等奖;

4) 2005年广东省优秀博士论文奖

科研项目: 

1) 主持:国家自然科学基金项目,基于深度学习的隐秘通信检测及其博弈安全性研究( 项目编号:61772571) , 在研(2018.01-2021.12);

2) 主持:国家自然科学基金项目,多媒体信息取证多目标优化分析( 项目编号:61379155) , 在研;

3) 主持(联合单位主持人):国家自然科学联合基金重点项目,基于自然图像内容的信息隐藏检测理论、建模、系统实现以及安全性评价研究(项目编号:U1536204),在研(2016.01-2019.12)。

4) 主持:中山大学重大项目和前沿新兴交叉学科培育项目(项目编号:6177060230), 基于机器学习的隐秘通信检测研究,在研(2017.01-2018.12)。

5) 主持:中国电信委托研发项目,面向LTE的TELCO-OTT实时通信系统研究与开发, 在研。

6) 主持:国家自然科学基金项目,信息取证关键技术及其安全性研究(项目编号:61070167), 已结题。

7) 主持:国家自然科学基金项目(项目编号:60403045), 已结题。

8) 主持:广东省自然科学基金重点项目,图像信息取证方法的博弈学分析研究(项目编号:s201302001278),已结题。

9) 主持:国家教育部博士点基金博导类项目,信息取证系统安全性和稳健性研究(项目编号:20110171110042),已结题。

10)主持:广东省自然科学基金项目(项目编号:9151027501000103), 已结题。

11)主持:广东省自然科学基金项目(项目编号:04009742), 已结题。

12) 主持: 江苏省网络安全中心开放课题,多媒体信息安全技术及其博弈分析,在研。

13) 参加:国家自然科学基金重点项目1项,国家自然科学基金广东省联合基金项目1项和973项目1项,已结题。

主要学术兼职: 

(1)IEEE Multimedia Communications Technical Committee member of IEEE Communications Society (MMTC);IMV Technical Committee member of Asian-Pacific Signal and Information Processing Association

(2)全国信息隐藏专家委员会成员, 本领域重要国际会议WIFS,IWDW,ICIP, ICC, ICNC,MMSP的技术委员会成员;

(3) WIFS (2013) 的Financial chair,IWDW 2010~ IWDW 2013 Session Chair(分会主席),ICIP 2013 Session Chair, APSIPA ASC 2012 Session Chair,ChinaSip 2013和ChinaSip 2015 Session Chair,  APSIPA ASC 2016 Special Session Chair;

(4) IEEE Trans. on Information Forensics and Security, IEEE Trans. on Multimedia, IEEE Trans. on CSVT, IEEE Trans. on Image Processing等多种国际权威期刊的审稿人;

(5) 国际著名期刊“Signal Processing: Image Communication”(SCI影响因子2.2) 和”EURASIP Journal on Image and Video Processing”(SCI影响因子1.7) 的副主编

教授课程: 

通信原理, 数字通信,数字信号处理,数字图像处理, 微型计算机组成原理,随机信号处理等。

代表性论著: 

1) H. Zeng, J. Liu, J. Yu, X. Kang, Z. J. Wang, Y. Q. Shi "A Framework of Camera Source Identification Bayesian Game," IEEE transactions on Cybernetics , vol. 47, no.7, pp. 1757-1768, 2017.

2) X. Lin, J. Liu, X. Kang, "Audio recapture detection with convolutional neural networks, " IEEE Transactions on Multimedia, vol.18, no.8, pp. 1480~1487, Aug. 2016.

3)X. Kang, M. C. Stamm, A. Peng and K. J. R. Liu, "Robust median filtering forensics using an autoregressive model", IEEE Transactions on Information Forensic and Security, vol. 8, no. 9, pp. 1456 - 1468, Sept. 2013.

4)X. Kang, Y. Li, Z. Qu, J. Huang, "Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise," IEEE Transactions on Information Forensic and Security, vol. 7, no. 2, pp. 

393-402, 2012.

5)X. Kang, J. Huang, W. Zeng, “Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping,” IEEE Transactions on Information Forensic and Security, vol. 5, no. 1, pp. 1-12, Mar. 2010.

6)X. Kang, R. Yang, J. Huang, “Geometric Invariant Audio Watermarking Based on an LCM Feature,” IEEE Transactions on Multimedia, vol.13, no.2, pp.181-190, 2011.

7)X. Kang, J. Huang, Y. Q. Shi, Y. Lin. “A DWT-DFT composite watermarking scheme robust to affine transform and JPEG compression”, IEEE Transactions on Circuit and System for Video Technology, vol. 13, no. 8,pp. 776-786, Aug., 2003

8)X. Kang, J. Huang, W. Zeng, “Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver,” IEEE Transactions on Multimedia, vol. 10, no. 6, pp. 953-959, Oct. 2008.

9)J. Chen, X. Kang, Y. Liu, Z. J.  Wang, "Median Filtering Forensics Based on Convolutional Neural Networks, " IEEE Signal Processing Letter, Vol. 22, No.11, pp. 1849-1853, Nov. 2015.

10)H. Zeng, X. Kang, “Camera Source Identification Game with incomplete information,” in Proc. of International Workshop on Digital-forensics and Watermarking(IWDW 2013), 2013/10/01-2013/10/03, Auckland, New Zealand, 2013 (Best Student Award).

11) R. Yang, X. Kang*, J. Huang. "Robust Audio Watermarking Based On Log-polar Frequency Index", IWDW 2008, LNCS 5450, pp. 124–138, Springer-Verlag Berlin Heidelberg 2009 (Best Student Award).

12)  X. Lin, X. Kang, "Exposing speech tampering via spectral phase analysis," Digital Signal Processing (SCI IF: 2.3), vol. 60, pp. 63-74, 2017

13)H. Zeng and X. Kang, "Fast Source Camera Identification Using Content Adaptive Guided Image Filter", Journal of Forensic Science, Vol. 61,No.2, pp.520-526, March 2016(SCI IF: 1.2). Doi: 10.1111/1556-4029.13017.

14) H. Zeng, X. Kang, A. Peng, A Multi-purpose countermeasure against image anti-forensics using autoregressive model, Neurocomputing(SCI IF: 2.3), doi:10.1016/j.neucom.2015.12.089, Jan. 2016.

15) X. Kang et al.,"A context-adaptive SPN predictor for trustworthy source camera identification, " EURASIP Journal on Image and Video Processing (SCI IF: 1.7),  2014:19 (2 April 2014).

16) X. Kang, A. Peng and X.Xu, X. Cao,"Performing scalable lossy compression on pixel encrypted images", The EURASIP Journal on Image and Video Processing (SCI IF: 1.7), vol. 2013:32, pp.1 ~ 6, May 2013.

17) X. Kang, J. Huang, “Non-ambiguity of blind watermarking: a revisit with analytical resolution,” Science in China: Series F (SCI IF: 1.6) , vol. 52, no. 2, pp.1-10, Feb., 2009, Springer - Verlag.

18) H. Zeng, J. Yu, X. Kang, S. Lyu, "Countering JPEG anti-forensics based on noise level estimation, " SCIENCE CHINA Information Sciences (SCI IF: 1.6), vol. 61, article no. 032103, pp. 1~14, DOI: 10.1007/s11432-016-0426-1, Mar. 2017.

19) H. Zeng, Y. Zhan, X. Kang, X. Lin, "Image splicing localization using PCA-based noise level estimation," Multimedia Tools and Applications (SCI IF: 1.5), vol. 76, no. 4, pp. 4783-4799, 2017. DOI: 10.1007/s11042-016-3712-8.

20) J. Liu, X. Kang H. Liu, Z. J. Wang, "Forensics and Counter Anti-forensics of Video Inter-frame Forgery," Multimedia Tools and Applications(SCI IF: 1.5),  vol. 75,no. 21, pp. 13833–13853, Nov. 2016.

21)彭安杰,曾辉,康显桂,基于多方向差分的重采样取证技术,中国科学: 信息科学, 2016, 46: 627–642, doi: 10.1360/N112015-00034。(国内顶级刊物

22) X. Kang,黄继武, 林彦,杨群生,“抗仿射变换的扩频图象水印算法”, 电子学报,vol. 32, no. 1, pp. 8-12,2004. (国内一级刊物

23) X. Kang, J. Huang, “Watermarking algorithm robust to geometric distortion,” vol. 29, no. 5, pp. 709-715, 自动化学报, 2003. (国内一级刊物

24) Y. Zhan, Y. Chen, Q. Zhang, and X. Kang, "Image Forensics Based on Transfer Learning and Convolutional Neural Network, " in Proc. of ACM conference on Information Hiding and Multimedia Security (IH&MMSec’17), June 20-22, 2017, Philadelphia, PA, USA. http://dx.doi.org/10.1145/3082031.3083250.

25) H. Zeng, X. Kang*, J. Huang, "Mixed strategy Nash equilibrium in the camera source identification game, " in Proc. of 20th IEEE International Conference on Image Processing 2013 (ICIP2013), Melbourne, Australia, Sept. 2013.

26) Z. Qu, X. Kang*, J. Huang, Y. Li, "Forensic sensor pattern noise extraction from large image dataset, " in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing2013 (ICASSP2013), Vancouver, Canada, May 26 ~ 31, 2013.

27)X. Kang, X. Xu, A. Peng and W. Zeng, “Scalable Lossy Compression for Pixel-Value Encrypted Images”, IEEE Data Compression Conference 2012, Snowbird, Utah, USA. April 10~12, 2012.

28)X. Kang, J. Huang, Y. Q. Shi, “Robust quantization-based watermarking with adaptive receiving”, IEEE international conference on image processing 2004, Oct. 2004, Singapore.

29)X. Kang, X. Zhong, J. Huang, W. Zeng, “An Efficient Print-scanning Resilient Data Hiding Based on a Novel LPM,” IEEE international conference on image processing 2008, Oct. 2008, San Diego, CA, USA.

30) J. Yang, K. Liu, X. Kang, E. Wong, Y.-Q. Shi, "Steganalysis Based on Awareness of Selection-Channel and Deep Learning," in Proc. of 2017 International Workshop on Digital-forensics and Watermarking, Magdeburg, German, Aug. 23-25, 2017. Will appear in Lecture Notes on Computer Science(LNCS), Springer press.

31) A. Peng, H. Zeng, X. Lin, X. Kang, Countering anti-forensics of image resampling, proc. 2015 IEEE International Conference on Image Processing (ICIP 2015) , pp. 3595-3599, Quebec City, Canada, Sept. 2015.

32) G. Wu, X. Kang*, and K. J. R. Liu, “A context adaptive predictor of sensor pattern noise for camera source identification”, ICIP 2012, Orlando, USA, Sept. 30~Oct. 3, 2012.

33) H. Zeng, X. Kang et al., "Removing camera fingerprint to disguise photograph source", IEEE international conference on image processing 2015, Sept. 27~30, Quebec, Canada.

34) H. Zeng, X. Kang at al. " Countering anti-forensics of median filtering, " in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing 2014 (ICASSP2014), Florence, Italy, May 5-9, 2014.

35)    X. Lin and X. Kang, "Supervised audio tampering detection using an autoregressive model," in Proc. of  2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2017), New Orleans, LA, 2017, pp. 2142-2146. Doi: 10.1109/ICASSP.2017.7952535.

36)  Huixin Liang, Xiaodan Lin, Qiong Zhang, Xiangui Kang, Recognition of spoofed voice using convolutional neural networks, in Proc. of  2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP 2017) , Montreal, Canada, Dec. 2017.

37) K. Liu, J. Yang and X. Kang, "Ensemble of CNN and rich model for steganalysis," in Proc. of 2017 International Conference on Systems, Signals and Image Processing (IWSSIP 2017), pp. 1-5, Poznan, Poland, 2017, IEEE press. Doi: 10.1109/IWSSIP.2017.7965617.

38) Kai Liu, Xuan Li, Qiong Zhang, and Xiangui Kang, "Multi-Channel Neural Network for Steganalysis," in Proc. of Asian-Pacific Signal and Information Processing Association Annual Submit Conference (APSIPA ASC) 2017, Malaysia, Dec. 2013, IEEE press

39) A. Peng, Y. Wu, X. Kang, "Revealing Traces of Image Resampling and Resampling Antiforensics, "Advances in Multimedia (SCI indexed ), article no. 7130491, pp. 1~13, 2017.

40)  Kang, Jiwu Huang, and Yun. Q. Shi, “Image Data Hiding Robust to Both Geometric Distortion and JPEG Compression,” MULTIMEDIA SECURITY HANDBOOK, chapter 18, CRC press, Jan. 2005 (book chapter).

41)彭安杰,康显桂,基于滤波残差多方向差分的中值滤波取证技术,计算机学报,2016,39(3):503-515。(国内一级刊物