陈先意,副教授,硕士生导师,工学博士,玄武区中青年优秀人才,IEEE/ACM/CCF会员。2014年6月毕业于湖南大学计算机科学技术专业,美国北卡大学彭布罗克分校访问学者,当前就职于亚搏手机足球计算机与软件学院,担任数字取证教育部工程研究中心副主任。主持及参与国家自然科学基金重点项目、面上项目、青年项目等7项,国家社科基金2项;获2018年度江苏省教育教学与研究成果奖(研究类)二等奖1项,获2017年度江苏省教育厅高校哲社成果奖(论文类)三等奖1项;获2016、2017年云计算与安全国际会议(ICCCS)优秀论文奖共2项。近年来以第一作者或通信作者在《IEEE TNSE》等国际期刊发表学术论文40余篇,其中SCI收录论文30余篇,授权国家发明专利12项,软件著作权30余项,指导学生参加各类学科竞赛获省部级以上奖5项。主要学术兼职包括国际期刊Journal on Big Data主编、国际会议ICAIS组织委员会成员等,主要研究兴趣包括区块安全、大数据安全及人工智能安全等,相关研究成果为数据安全、图像隐写等提供了新理论与新方法,部分研究成果应用于物流调度、数据安全等领域。
------------------------------------------------------------------------------------------------------------
【主持及参与的国家级项目】
1. 国家自然科学基金委员会,青年项目,61502242,基于非对称扩展的可逆水印研究,2016-01至2018-12,23.7万元,结题,主持
2. 国家自然科学基金-通用技术联合基金,重点项目,U1536206,基于文本大数据的无载体信息隐藏研究,2016-01至2019-12,270万元,结题,主研
3. 国家自然科学基金委员会,面上项目,61672294,云计算环境中的密文图像检索方法研究,2017-01至2020-12,68万元,结题,主研
4. 国家自然科学基金委员会,青年项目,61702276,云环境下基于交换加密水印的隐私媒体数据服务保护方法研究,2018-01至2020-12,20万元,结题,参与
5. 国家自然科学基金委员会,青年项目,71602092,基于任务情境的游客社会化搜寻行为的触发、策略和效果研究,2017-01至2019-12,20万元,结题,参与
6. 国家自然科学基金委员会,青年项目,61602253,基于含密自然图像检索的无载体信息隐藏研究,2017-01至2019-12,20万元,结题,参与
【获奖】
1. 2022.8,陈先意。电力客户行为分析,中国软件杯大学生软件设计大赛,二等奖(国家级)。
2. 2022.7,闫雷鸣,陈先意。AI-SPREC智能钢板仓储规划调度系统,中国大学生设计大赛,一等奖(国家级)。
3. 2022.9,熊佳颖,基于Lambert-Beerlaw的水下图像增强方法研究。优秀本科毕业设计,二等奖(省级),指导老师。
4. 2022.1.10,杨滨,张涛,陈先意。基于深度学习的图像局部模糊识别,应用科学学报,2018.2,第二届高被引论文。
5. 2021.12,2021年第三届全国高校计算机能力挑战赛,程序设计赛-Java华东赛区优秀奖,优秀指导老师.
6. 2021.11,Q-智慧仓储方案—钢铁B2B行业升级助力者,“互联网+”大学生创新创业大赛,省级二等奖,指导老师:闫雷鸣,陈先意,王保卫等。
7. 2021.8,云端智能相册应用,中国软件杯大学生软件设计大赛,三等奖(国家级),指导老师。
【主持的企业横向项目】
1. 2022,基于GIS地图的森林防火一体化预警与取证系统,***能源科技有限公司
2. 2022,基于***公司的在线考试模块,**数字科技有限公司
3. 2021,AI智能算法模型技术开发,***钢铁公司
4. 2021,典型大空间电器负荷预测与监测取证,***信息技术有限公司
5. 2021,基于关联学习的污染监测及快速追溯系统,***气象科技有限公司
6. 2020,自动化多工位移栽连线铆合瑕疵检测研究,***设备制造公司
7. 2020, 题库系统试卷自动生成算法研究,***教育咨询公司
【授权发明专利】
1. 陈先意,刘艳艳,钱郁滔,付章杰,闫雷鸣,许娟。基于BERT和GAT的裁判文书争议焦点识别方法,2023-1-5,CN202211365207.X.
2. 陈先意;刘宇;张广星;孟宇航;糜慧;颜凯。一种神经网络水印嵌入方法以及验证方法,2022-6-30,中国,ZL202210757151.6.
3. 陈先意;孟宇航;刘宇;颜凯;何俊杰;张广星。一种神经网络主动保护方法、系统、存储介质及计算设备,2022-5-23,中国,ZL 2022100559415.7.
4. 顾军,陈先意,付章杰,颜凯,江栋,钱郁滔。基于轻量级网络对抗的车牌防盗摄隐私保护方法及系统,2022-8-17,中国,CN202210988321.1
5. 孟宇航;陈先意;付章杰;袁程胜;孙星明。一种基于GAN的神经网络水印生成方法、系统和存储介质,2022-3-1,中国,ZL 202210091866.2.
6. 陈先意;仲海东;陈盛;孙星明。基于码分复用及值扩展的同态加密域可逆信息隐藏方法, 2020-9-8, 中国, CN107590369B.
7. 袁程胜;夏志华;陈先意;孙星明。基于四元数小波变换的图像无载体信息隐藏方法,2021-2-19,中国,CN107622469B.
8. 陈先意;张震添;付章杰;王保卫;孙星明。一种基于联盟链技术的健身公园游玩系统及方法,2022-2-18,中国,CN114066682A.
9. 陈先意;顾军;张震添;付章杰;王保卫;孙星明。一种基于神经网络的涂卡题云批阅系统及方法,2022-1-11,中国,CN113920521A.
10. 薛红玉,王康,杨威,陈先意,陈卫,丁思哲,郭俊屹,李清昀,章亚军。一种适用于流通钢材溯源的联盟链,2022-11-18,中国,CN202210838457.4.
11. 闫雷鸣,薛红玉,吴思奇,杨威,李少鹏,陈先意,郭俊屹,李清昀,章亚军。板体翻堆落位方法、系统、存储介质及计算设备,2022-9-23,中国,CN202210605047.5.
12. 闫雷鸣,薛红玉,严璐绮,杨威,吴思奇,陈先意,郭俊屹,李清昀,章亚军。中厚钢板翻堆出库优化方法、系统及存储介质,2022-9-23,中国, CN202210581010.3.
【发表的学术论文】
[1] Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia*, Neal N. Xiong. A novel coverless steganography method based on image selection and StarGAN. IEEE Transactions on Network Science and Engineering, 9(1): 219-230, 2022.1 (SCI). DOI: 10.1109/TNSE.2020.3041529
[2] Yewen Wu, Shi Zeng, Bin Wu, Bin Yang, Xianyi Chen*. Quantitative Weighted Visual Cryptographic (k, m, n) Method. Security and Communication Networks, vol. 2021, 9968652, 2021 (SCI). https://doi.org/10.1155/2021/9968652
[3] Xianyi Chen, Mengling Zou, Bin Yang, Zhenlin Wang and Lili Qi*, A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 18(2): 1722-1739, 2021.1 (SCI). DOI: 10.3934/mbe.2021089
[4] Bin Wu, Xianyi Chen, Zongda Wu, Zhiqiang Zhao, Zhuolin Mei, Caicai Zhang, Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario, Wireless Communications and Mobile Computing, vol. 2021, https://doi.org/10.1155/2021/6617959
[5] Shuai Wang, Yang Cong, Hancan Zhu, Xianyi Chen and Mingxia Liu. Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract. IEEE Journal of Biomedical and Health Informatics, PP (99), 1-1. 2021.1,25(2), pp. 514-525. (SCI). DOI: 10.1109/JBHI.2020.2997760.
[6] Bin Wu, Xianyi Chen, Caicai Zhang, Zhuolin Mei, Zhiqiang Zhao, Zongda Wu and Tao Yao. Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment, IEEE Access, 2020, 214596-214604. DOI. 10.1109/ACCESS.2020.3040781.
[7] Shuai Wang, Xianyi Chen*. Adaptive Binary Coding for Scene Classification Based on Convolutional Networks, Computers, Materials & Continua.65(3), pp:2065-2077. 2020.9 (SCI)
[8] Xiucai Ding, Xianyi Chen*, Mengling Zou, Guangxign Zhang. Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices, KSII Transactions on Internet and Information Systems, 2020.5 (SCI)
[9] Haidong Zhong, Xianyi Chen*. A separable reversible data hiding scheme in encrypted image for two cloud servers. International Journal of Embedded Systems, 12(1), pp:62-71. 2020.1.(EI)
[10] Xiang Zhou, Xianyi Chen*, Fasheng Zhang, Ningning Zheng. A novel coverless text information hiding method based on double-tags and twice-send. International Journal of Computational Science and Engineering, 21(1), pp: 116-124. 2020.1. (EI)
[11] 王振力, 王群,陈先意,马如坡,刘晓迁. 基于分数阶Fourier变换的高性能SAR成像算法的研究 [J]. 地球信息科学学报(权威核心)
[12] 王振力, 王群,陈先意,马如坡,刘晓迁. 旋转分数阶傅里叶变换域构建SAR方位向高分辨率成像算法的研究 [J]. 遥感信息(中文核心、CSCD核心)
[13] Chengsheng Yuan, Xianyi Chen, Ruohan Meng, Xingming Sun. Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. Journal of Real-Time Image Processing. 17(1) 2019. (SCI)
[14] Mengling Zou, Zhengxuan Liu, Xianyi Chen*. A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform. Journal on Big Data, 1(3), pp:151–158. 2019.12. http://doi:10.32604/jbd.2019.09057
[15] Xianyi Chen, Anqi Qiu, Xingming Sun*, Shuai Wang and Guo Wei. A High-Capacity Coverless Image Steganography Method Based on Double-Level Index and Block Matching. Mathematical Biosciences and Engineering. 16(5), pp. 4708-4722, 2019.6. http://doi:10.3934/mbe.2019236 (SCI).
[16] Xianyi Chen*, Haidong Zhong, Zhifeng Bao. A GLCM-feature-based Approach for Reversible Image Transformation. Computers, Materials & Continua. 2019.4. 59(1), pp:239-255. http://doi:10.32604/cmc.2019.03572 (SCI).
[17] Xianyi Chen*, Haidong Zhong, Anqi Qiu. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimedia Tools and Applications. 78(6), pp. 7499-7516, 2019.3. http://doi:10.1007/s11042-018-6446-y. (SCI)
[18] Xianyi Chen*, Sheng Chen. Text coverless information hiding based on compound and selection of words. Soft Computing. 2019, 23(15): 6323-6330. DOI: 10.1007/s00500-018-3286-7. (SCI)
[19] Lizhi Xiong, Zhihua Xia, Xianyi Chen, Hiuk Jae Shim:Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimedia Tools Appl. 78(21): 30297-30313 (2019). (SCI)
[20] Jin Liu, Jian Li, Yadang Chen, Xianyi Chen, Zhili Zhou, Zejun Yang, Chengjun Zhang. Modeling complex networks with accelerating growth and aging effect. Physics Letters A. 2019, 13(383): 1396-1400. (SCI)
[21] Zhihua Xia, Lihua Lu, Tong Qiu, H J Shim, Xianyi Chen, Byeungwoo Heon, A Privacy-Preserving Image Retrieval Based on AC-coefficients and Color Histograms in Cloud Environment. Computers, Materials & Continua, 2019.1.11. https://doi.org/10.32604/cmc.2019.02688 (SCI)
[22] Haidong Zhong, Xianyi Chen*, Qinglong Tian. An Improved Reversible Image Transformation Using K-Means Clustering and Block Patching. Information. 2019.1.5, 10(1). 17. https://doi.org/10.3390/info10010017. (EI)
[23] Xianyi Chen, Haidong Zhong, Zhjili Xiong, Zhihua Xia*. An improved encrypted-signals-based reversible data hiding using code division multiplexing and value expansion. Security and Communication Networks, 2018.2. DOI: 10.1155/2018/1326235. (SCI)
[24] Yulei Wu, Xianyi Chen, Xingming Sun*, Coverless Steganography Based on English Texts Using Binary Tags Protocol, Journal of Internet Technology, vol. 19, no. 2, pp. 599-606, Mar. 2018. (SCI)
[25] Bin Yang, X Sun, H Guo, Z Xia, Xianyi Chen, A copy-move forgery detection method based on CMFD-SIFT, Multimedia Tools and Applications, 2018. 77 (1), 837-855. (SCI)
[26] Lizhi Xiong, Danping Dong, Zhihua Xia, Xianyi Chen, High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644, 2018. (SCI)
[27] Bin Yang, Xingming Sun, Enguo Cao, Weifeng Hu, Xianyi Chen, Convolutional neural network for smooth filtering detection. IET Image Processing 12(8): 1432-1438, 2018. (SCI)
[28] Yang, B., Sun, X., Guo, H., Xia, Z., & Chen, X. A copy-move forgery detection method based on cmfd-sift. Multimedia Tools and Applications, 77(1), 837-855, 2018. (SCI)
[29] Bin Yang, Xianyi Chen, Tao Zhang. A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems. ICCCS (6) 2018: 243-254. (EI)
[30] Xianyi Chen*, Sheng Chen, Yulei Wu. Coverless Information Hiding Method Based on the Chinese Character Encoding. Journal of Internet Technology, 2017.3, 18(2), pp. 91-98. (SCI). DOI: 10.6138/JIT.2017.18.2.20160815.
[31] Sheng Chen, Xianyi Chen*, Huijuan Fu. General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error, Advances in Multimedia, 2017.11, pp. 1-9. (EI). DOI:https://doi.org/10.1155/2017/6359248.
[32] Xianyi Chen*, Guangyong Gao, Dandan Liu, Zhihua Xia. Steganalysis of LSB Matching using Characteristic Function Moment of Pixel Differences. China Communications, 2016.6, 13(7), pp. 65-72. (SCI)
[33] B Yang, X Sun, J Zhang, L Xiang, Xianyi Chen, X Li, M Topkara, U Topkara, Synonymous paraphrasing using WordNet and internet. Information Technology Journal, 2016, 11 (8), pp: 37-46
[34] Xianyi Chen, Xingming Sun*, Huiyu Sun, Lingyun Xiang, Bin Yang. Histogram shifting based reversible data hiding method using directed prediction scheme. Multimedia Tools and Applications. 2015, 74, pp. 5747-5765. (SCI)
[35] Xianyi Chen*, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun. Coverless Information Hiding Method Based on the Chinese Mathematical Expression. First International Conference, ICCCS 2015, pp. 133-143. (EI)
[36] B Yang, X Sun, Xianyi Chen, J Zhang, X Li, Exposing photographic splicing by detecting the inconsistencies in shadows, The Computer Journal, 2015, 58 (4), 588-600. (SCI)
[37] Z Zhou, H Sun, R Harit, Xianyi Chen, X Sun, Coverless image steganography without embedding, International Conference on Cloud Computing and Security, 2015, pp. 123-132 (EI)
[38] Xianyi Chen*, Chunfeng Li. Efficient reversible image watermarking based on odd-even consistency on pixel pairs. [J] Journal of Computational Information Systems. 2014.8, 10(16), pp. 6807-6816. (EI)
[39] Xianyi Chen*, Chunfeng Li. Efficient reversible watermarking method based on prediction error pair expansion [J]. ICIC Express Letters. 2014. 12, 8(12), pp. 3263-3269. (EI)
[40] Zhili Zhou, Xingming Sun*, Xianyi Chen, Cheng Chang, Zhangjie Fu. A novel signature based on combination of global and local signatures for image copy detection [J]. Security and Communication Networks. 2014, 7(11):1702-1711. (SCI)
[41] Xianyi Chen, Xingming Sun*, Huiyu Sun, Zhili Zhou, Jianjun Zhang. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. Journal of Systems and Software. 2013, 86(10), pp. 2620-2626. (SCI)
[42] Bin Yang, Xingming Sun*, Xianyi Chen, Jianjun Zhang, Xu Li. An efficient forensic method for copy-move forgery detection based on DWT-FWHT [J]. Radioengineering. 2013, 22(4):1098-1105. (SCI)
[43] Xianyi Chen, Lanzhe Liu*. Boundedness for multilinear commutators of integral operators in Hardy and Herz-Hardy spaces on homogeneous spaces. Journal of mathematical inequalities. 2011, 5(3), pp. 307-319. (SCI)
[44] Zhili Zhou, Xingming Sun*, Xianyi Chen, Lian Tan. A Fourier-Mellin transform based feature for image copy detection with rotation simulation strategy [J]. International journal of digital content technology and its application. 2012, 6(11):369-377. (EI)
[45] Bin Yang, Xingming Sun*, Jianjun Zhang, Lingyun Xiang, Xianyi Chen, Xu Li. A novel reversible text data hiding scheme [J]. Information Technology Journal. 2012, 11(8): 1084-1090. (EI)