陈先意
已经得到个称赞     给我点赞
  • 所在单位:(中国)有限公司、网络空间安全学院(数字取证教育部工程研究中心、公共计算机教学部)
  • 性别:
  • 职称:副教授
  • 个人简介
  • 研究方向
  • 社会兼职
  • 教育经历
  • 工作经历
  • 团队成员
  • 其他联系方式

陈先意,副教授,硕士生导师,工学博士,玄武区中青年优秀人才,IEEE/ACM/CCF会员。20146月毕业于湖南大学计算机科学技术专业,美国北卡大学彭布罗克分校访问学者,当前就职于亚搏手机足球计算机与软件学院,担任数字取证教育部工程研究中心副主任。主持及参与国家自然科学基金重点项目、面上项目、青年项目等7项,国家社科基金2项;获2018年度江苏省教育教学与研究成果奖(研究类)二等奖1项,获2017年度江苏省教育厅高校哲社成果奖(论文类)三等奖1项;获20162017年云计算与安全国际会议(ICCCS)优秀论文奖共2项。近年来以第一作者或通信作者在《IEEE TNSE》等国际期刊发表学术论文40余篇,其中SCI收录论文30余篇,授权国家发明专利12项,软件著作权30余项,指导学生参加各类学科竞赛获省部级以上奖5项。主要学术兼职包括国际期刊Journal on Big Data主编、国际会议ICAIS组织委员会成员等,主要研究兴趣包括区块安全、大数据安全及人工智能安全等,相关研究成果为数据安全、图像隐写等提供了新理论与新方法,部分研究成果应用于物流调度、数据安全等领域。

------------------------------------------------------------------------------------------------------------

【主持及参与的国家级项目】

1.    国家自然科学基金委员会,青年项目,61502242,基于非对称扩展的可逆水印研究,2016-012018-1223.7万元,结题,主持

2.    国家自然科学基金-通用技术联合基金,重点项目,U1536206,基于文本大数据的无载体信息隐藏研究,2016-012019-12270万元,结题,主研

3.    国家自然科学基金委员会,面上项目,61672294,云计算环境中的密文图像检索方法研究,2017-012020-1268万元,结题,主研

4.    国家自然科学基金委员会,青年项目,61702276,云环境下基于交换加密水印的隐私媒体数据服务保护方法研究,2018-012020-1220万元,结题,参与

5.    国家自然科学基金委员会,青年项目,71602092,基于任务情境的游客社会化搜寻行为的触发、策略和效果研究,2017-012019-1220万元,结题,参与

6.    国家自然科学基金委员会,青年项目,61602253,基于含密自然图像检索的无载体信息隐藏研究,2017-012019-1220万元,结题,参与

【获奖】

  1.  2022.8,陈先意。电力客户行为分析,中国软件杯大学生软件设计大赛,二等奖(国家级)。

  2. 2022.7,闫雷鸣,陈先意。AI-SPREC智能钢板仓储规划调度系统,中国大学生设计大赛,一等奖(国家级)。

  3. 2022.9,熊佳颖,基于Lambert-Beerlaw的水下图像增强方法研究。优秀本科毕业设计,二等奖(省级),指导老师。

  4. 2022.1.10,杨滨,张涛,陈先意。基于深度学习的图像局部模糊识别,应用科学学报,2018.2,第二届高被引论文。 

  5. 2021.12,2021年第三届全国高校计算机能力挑战赛,程序设计赛-Java华东赛区优秀奖,优秀指导老师.

  6. 2021.11,Q-智慧仓储方案—钢铁B2B行业升级助力者,“互联网+”大学生创新创业大赛,省级二等奖,指导老师:闫雷鸣,陈先意,王保卫等。

  7. 2021.8,云端智能相册应用,中国软件杯大学生软件设计大赛,三等奖(国家级),指导老师。


【主持的企业横向项目】

  1. 2022,基于GIS地图的森林防火一体化预警与取证系统,***能源科技有限公司

  2. 2022,基于***公司的在线考试模块,**数字科技有限公司

  3. 2021,AI智能算法模型技术开发,***钢铁公司

  4. 2021,典型大空间电器负荷预测与监测取证,***信息技术有限公司

  5. 2021,基于关联学习的污染监测及快速追溯系统,***气象科技有限公司

  6. 2020,自动化多工位移栽连线铆合瑕疵检测研究,***设备制造公司

  7. 2020, 题库系统试卷自动生成算法研究,***教育咨询公司

【授权发明专利】

  1. 陈先意,刘艳艳,钱郁滔,付章杰,闫雷鸣,许娟。基于BERT和GAT的裁判文书争议焦点识别方法,2023-1-5,CN202211365207.X.

  2. 陈先意;刘宇;张广星;孟宇航;糜慧;颜凯。一种神经网络水印嵌入方法以及验证方法,2022-6-30,中国,ZL202210757151.6.

  3. 陈先意;孟宇航;刘宇;颜凯;何俊杰;张广星。一种神经网络主动保护方法、系统、存储介质及计算设备,2022-5-23,中国,ZL 2022100559415.7.

  4. 顾军,陈先意,付章杰,颜凯,江栋,钱郁滔。基于轻量级网络对抗的车牌防盗摄隐私保护方法及系统,2022-8-17,中国,CN202210988321.1

  5. 孟宇航;陈先意;付章杰;袁程胜;孙星明。一种基于GAN的神经网络水印生成方法、系统和存储介质,2022-3-1,中国,ZL 202210091866.2.

  6. 陈先意;仲海东;陈盛;孙星明。基于码分复用及值扩展的同态加密域可逆信息隐藏方法, 2020-9-8, 中国, CN107590369B.

  7. 袁程胜;夏志华;陈先意;孙星明。基于四元数小波变换的图像无载体信息隐藏方法,2021-2-19,中国,CN107622469B.

  8. 陈先意;张震添;付章杰;王保卫;孙星明。一种基于联盟链技术的健身公园游玩系统及方法,2022-2-18,中国,CN114066682A.

  9. 陈先意;顾军;张震添;付章杰;王保卫;孙星明。一种基于神经网络的涂卡题云批阅系统及方法,2022-1-11,中国,CN113920521A.

  10. 薛红玉,王康,杨威,陈先意,陈卫,丁思哲,郭俊屹,李清昀,章亚军。一种适用于流通钢材溯源的联盟链,2022-11-18,中国,CN202210838457.4.

  11. 闫雷鸣,薛红玉,吴思奇,杨威,李少鹏,陈先意,郭俊屹,李清昀,章亚军。板体翻堆落位方法、系统、存储介质及计算设备,2022-9-23,中国,CN202210605047.5.

  12. 闫雷鸣,薛红玉,严璐绮,杨威,吴思奇,陈先意,郭俊屹,李清昀,章亚军。中厚钢板翻堆出库优化方法、系统及存储介质,2022-9-23,中国, CN202210581010.3.


【发表的学术论文】

[1]   Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia*, Neal N. Xiong. A novel coverless steganography method based on image selection and StarGAN. IEEE Transactions on Network Science and Engineering, 9(1): 219-230, 2022.1 (SCI). DOI: 10.1109/TNSE.2020.3041529

[2]   Yewen Wu, Shi Zeng, Bin Wu, Bin Yang, Xianyi Chen*. Quantitative Weighted Visual Cryptographic (k, m, n) Method. Security and Communication Networks, vol. 2021, 9968652, 2021 (SCI). https://doi.org/10.1155/2021/9968652

[3]   Xianyi Chen, Mengling Zou, Bin Yang, Zhenlin Wang and Lili Qi*, A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 18(2): 1722-1739, 2021.1 (SCI). DOI: 10.3934/mbe.2021089

[4]   Bin Wu, Xianyi Chen, Zongda Wu, Zhiqiang Zhao, Zhuolin Mei, Caicai Zhang, Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario, Wireless Communications and Mobile Computing, vol. 2021, https://doi.org/10.1155/2021/6617959

[5]   Shuai Wang, Yang Cong, Hancan Zhu, Xianyi Chen and Mingxia Liu. Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract. IEEE Journal of Biomedical and Health Informatics, PP (99), 1-1. 2021.1,25(2), pp. 514-525. (SCI). DOI: 10.1109/JBHI.2020.2997760.

[6]   Bin Wu, Xianyi Chen, Caicai Zhang, Zhuolin Mei, Zhiqiang Zhao, Zongda Wu and Tao Yao. Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment, IEEE Access, 2020, 214596-214604. DOI. 10.1109/ACCESS.2020.3040781.

[7]   Shuai Wang, Xianyi Chen*. Adaptive Binary Coding for Scene Classification Based on Convolutional Networks, Computers, Materials & Continua.65(3), pp:2065-2077. 2020.9 (SCI)

[8]   Xiucai Ding, Xianyi Chen*, Mengling Zou, Guangxign Zhang. Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices, KSII Transactions on Internet and Information Systems, 2020.5 (SCI)

[9]   Haidong Zhong, Xianyi Chen*. A separable reversible data hiding scheme in encrypted image for two cloud servers. International Journal of Embedded Systems, 12(1), pp:62-71. 2020.1.(EI)

[10]        Xiang Zhou, Xianyi Chen*, Fasheng Zhang, Ningning Zheng. A novel coverless text information hiding method based on double-tags and twice-send. International Journal of Computational Science and Engineering, 21(1), pp: 116-124. 2020.1. (EI)

[11]        王振力, 王群,陈先意,马如坡,刘晓迁. 基于分数阶Fourier变换的高性能SAR成像算法的研究 [J]. 地球信息科学学报(权威核心)

[12]        王振力, 王群,陈先意,马如坡,刘晓迁. 旋转分数阶傅里叶变换域构建SAR方位向高分辨率成像算法的研究 [J]. 遥感信息(中文核心、CSCD核心)

[13]        Chengsheng Yuan, Xianyi Chen, Ruohan Meng, Xingming Sun. Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. Journal of Real-Time Image Processing. 17(1) 2019. (SCI)

[14]        Mengling Zou, Zhengxuan Liu, Xianyi Chen*. A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform. Journal on Big Data, 1(3), pp:151–158. 2019.12. http://doi:10.32604/jbd.2019.09057

[15]        Xianyi Chen, Anqi Qiu, Xingming Sun*, Shuai Wang and Guo Wei. A High-Capacity Coverless Image Steganography Method Based on Double-Level Index and Block Matching. Mathematical Biosciences and Engineering. 16(5), pp. 4708-4722, 2019.6. http://doi:10.3934/mbe.2019236 (SCI).

[16]        Xianyi Chen*, Haidong Zhong, Zhifeng Bao. A GLCM-feature-based Approach for Reversible Image Transformation. Computers, Materials & Continua. 2019.4. 59(1), pp:239-255. http://doi:10.32604/cmc.2019.03572 (SCI).

[17]        Xianyi Chen*, Haidong Zhong, Anqi Qiu. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimedia Tools and Applications. 78(6), pp. 7499-7516, 2019.3. http://doi:10.1007/s11042-018-6446-y. (SCI)

[18]        Xianyi Chen*, Sheng Chen. Text coverless information hiding based on compound and selection of words. Soft Computing. 2019, 23(15): 6323-6330. DOI: 10.1007/s00500-018-3286-7. (SCI)

[19]        Lizhi Xiong, Zhihua Xia, Xianyi Chen, Hiuk Jae Shim:Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimedia Tools Appl. 78(21): 30297-30313 (2019). (SCI)

[20]        Jin Liu, Jian Li, Yadang Chen, Xianyi Chen, Zhili Zhou, Zejun Yang, Chengjun Zhang. Modeling complex networks with accelerating growth and aging effect. Physics Letters A. 2019, 13(383): 1396-1400. (SCI)

[21]        Zhihua Xia, Lihua Lu, Tong Qiu, H J Shim, Xianyi Chen, Byeungwoo Heon, A Privacy-Preserving Image Retrieval Based on AC-coefficients and Color Histograms in Cloud Environment. Computers, Materials & Continua, 2019.1.11. https://doi.org/10.32604/cmc.2019.02688 (SCI)

[22]        Haidong Zhong, Xianyi Chen*, Qinglong Tian. An Improved Reversible Image Transformation Using K-Means Clustering and Block Patching. Information. 2019.1.5, 10(1). 17. https://doi.org/10.3390/info10010017. (EI)

[23]        Xianyi Chen, Haidong Zhong, Zhjili Xiong, Zhihua Xia*. An improved encrypted-signals-based reversible data hiding using code division multiplexing and value expansion. Security and Communication Networks, 2018.2. DOI: 10.1155/2018/1326235. (SCI)

[24]        Yulei Wu, Xianyi Chen, Xingming Sun*, Coverless Steganography Based on English Texts Using Binary Tags Protocol, Journal of Internet Technology, vol. 19, no. 2, pp. 599-606, Mar. 2018. (SCI)

[25]        Bin Yang, X Sun, H Guo, Z Xia, Xianyi Chen, A copy-move forgery detection method based on CMFD-SIFT, Multimedia Tools and Applications, 2018. 77 (1), 837-855. (SCI)

[26]        Lizhi XiongDanping DongZhihua XiaXianyi Chen, High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644, 2018. (SCI)

[27]        Bin YangXingming SunEnguo CaoWeifeng HuXianyi Chen, Convolutional neural network for smooth filtering detection. IET Image Processing 12(8): 1432-1438, 2018. (SCI)

[28]        Yang, B., Sun, X., Guo, H., Xia, Z., & Chen, X. A copy-move forgery detection method based on cmfd-sift. Multimedia Tools and Applications, 77(1), 837-855, 2018. (SCI)

[29]        Bin YangXianyi ChenTao Zhang. A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems. ICCCS (6) 2018: 243-254. (EI)

[30]        Xianyi Chen*, Sheng Chen, Yulei Wu. Coverless Information Hiding Method Based on the Chinese Character Encoding. Journal of Internet Technology, 2017.3, 18(2), pp. 91-98. (SCI). DOI: 10.6138/JIT.2017.18.2.20160815.

[31]        Sheng Chen, Xianyi Chen*, Huijuan Fu. General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error, Advances in Multimedia, 2017.11, pp. 1-9. (EI). DOIhttps://doi.org/10.1155/2017/6359248.

[32]        Xianyi Chen*, Guangyong Gao, Dandan Liu, Zhihua Xia. Steganalysis of LSB Matching using Characteristic Function Moment of Pixel Differences. China Communications, 2016.6, 13(7), pp. 65-72. (SCI)

[33]        B Yang, X Sun, J Zhang, L Xiang, Xianyi Chen, X Li, M Topkara, U Topkara, Synonymous paraphrasing using WordNet and internet. Information Technology Journal, 2016, 11 (8), pp: 37-46

[34]        Xianyi Chen, Xingming Sun*, Huiyu Sun, Lingyun Xiang, Bin Yang. Histogram shifting based reversible data hiding method using directed prediction scheme. Multimedia Tools and Applications. 2015, 74, pp. 5747-5765. (SCI)

[35]        Xianyi Chen*, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun. Coverless Information Hiding Method Based on the Chinese Mathematical Expression. First International Conference, ICCCS 2015, pp. 133-143. (EI)

[36]        B Yang, X Sun, Xianyi Chen, J Zhang, X Li, Exposing photographic splicing by detecting the inconsistencies in shadows, The Computer Journal, 2015, 58 (4), 588-600. (SCI)

[37]        Z Zhou, H Sun, R Harit, Xianyi Chen, X Sun, Coverless image steganography without embedding, International Conference on Cloud Computing and Security, 2015, pp. 123-132 (EI)

[38]        Xianyi Chen*, Chunfeng Li. Efficient reversible image watermarking based on odd-even consistency on pixel pairs. [J] Journal of Computational Information Systems. 2014.8, 10(16), pp. 6807-6816. (EI)

[39]        Xianyi Chen*, Chunfeng Li. Efficient reversible watermarking method based on prediction error pair expansion [J]. ICIC Express Letters. 2014. 12, 8(12), pp. 3263-3269. (EI)

[40]        Zhili Zhou, Xingming Sun*, Xianyi Chen, Cheng Chang, Zhangjie Fu. A novel signature based on combination of global and local signatures for image copy detection [J]. Security and Communication Networks. 2014, 7(11):1702-1711. (SCI)

[41]        Xianyi Chen, Xingming Sun*, Huiyu Sun, Zhili Zhou, Jianjun Zhang. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. Journal of Systems and Software. 2013, 86(10), pp. 2620-2626. (SCI)

[42]        Bin Yang, Xingming Sun*, Xianyi Chen, Jianjun Zhang, Xu Li. An efficient forensic method for copy-move forgery detection based on DWT-FWHT [J]. Radioengineering. 2013, 22(4):1098-1105. (SCI)

[43]        Xianyi Chen, Lanzhe Liu*. Boundedness for multilinear commutators of integral operators in Hardy and Herz-Hardy spaces on homogeneous spaces. Journal of mathematical inequalities. 2011, 5(3), pp. 307-319. (SCI)

[44]        Zhili Zhou, Xingming Sun*, Xianyi Chen, Lian Tan. A Fourier-Mellin transform based feature for image copy detection with rotation simulation strategy [J]. International journal of digital content technology and its application. 2012, 6(11):369-377. (EI)

[45]        Bin Yang, Xingming Sun*, Jianjun Zhang, Lingyun Xiang, Xianyi Chen, Xu Li. A novel reversible text data hiding scheme [J]. Information Technology Journal. 2012, 11(8): 1084-1090. (EI)











主要研究方向

邮箱: