您好,欢迎来到华中科技大学365体育官网!

联系我们| English

王祖喜

职称:副教授

电话:13377883748

邮箱:zuxiw@mail.hust.edu.cn

研究方向:网络信息安全、密码学、混沌密码技术、信息隐藏等

个人简介

王祖喜生活照.jpg

个人简介

2013年- 今    华中科技大学365体育,副教授;

2000年-2013年  华中科技大学图像识别与人工智能研究所,副教授;

1996年-2000年   华中科技大学,模式识别与智能系统专业,博士学位;

1987年-1996年   武汉理工大学(原武汉工业大学)数学物理系,讲师;

1985年-1987年   湘潭大学,基础数学代数专业,硕士学位;

1981年-1985年   湖北师范学院,数学专业,学士学位。

社会兼职及学术团体:湖北省思维模拟与智能系统学会理事、副秘书长;人工智能学会人工智能基础专业委员会委员;中国密码学会会员。

 

主要研究方向

网络信息安全、密码学、混沌密码技术、信息隐藏、智能网络及可生存性;模式识别与智能系统。

 

招生要求(专业需求和招生方向)

专业需求:信息安全、计算机科学、电信、自动化、智能系统、数学、物理等

招生方向:081220:网络与信息安全、智能网络;081104:模式识别与智能系统

 

代表性成果及获奖情况(论文、科研或奖励情况)

近年来主持和参加包括国家自然科学基金、国家“863”计划项目、“十一五”“十二五”国家密码发展基金、总参预研基金、教育部博士点基金、科技部国家中小企业创新基金、湖北省自然科学基金等国家级和省部级纵向科研项目以及横向科研项目二十余项,涉及网络与信息安全技术、混沌对称密码和非对称密码技术、信息隐藏与数字水印技术、网络可生存性技术等方面;获省部级科技奖励5项;获国家发明专利授权18项;国际发明专利授权1项。在国内外权威期刊和国际会议上发表论文近70篇,其中SCI、EI和ISTP收录近40篇。

 

1)论文(部分)

1. Network community structure in the hyperbolic space.Cheng, FengWang, Zuxi; Li, Dehua Source: Physica A (under review)

2. A Fair and Efficient Network Congestion Control Algorithm based on Minority Game with Local Information. Wang, Zuxi; DENG, Zhao-zhang; LI Li.Source: Journal of Communications, (accepted, in press) 2013. Language: Chinese

3. Extended Shape of Gaussian: Feature descriptor based on element set of matrix Lie group.Cheng, FengWang, Zuxi; Li, Dehua Source: Optik, 2013

4. Collusion-resistant digital fingerprinting based on residual characters tracking. Wang, Zu-XiWang, Wen-Zong; Ge, QiangHu, Han-Ping Source: Ruan Jian Xue Bao/Journal of Software, v 22, n 8, p 1884-1896, August 2011 Language: Chinese

5. Estimating parameters of chaotic systems under noise-induced synchronization. Wu, XiaogangWang, Zuxi Source: Chaos, Solitons and Fractals, v 39, n 2, p 689-696, January 30, 2009

6. Estimating parameters of chaotic systems synchronized by external driving signal. Wu, XiaogangWang, Zuxi Source: Chaos, Solitons and Fractals, v 33, n 2, p 588-594, July 2007

7. A Node Degree-Based Label Propagation Algorithm To Detect Network Community Structures. Wang ZuxiShi Daxin. Source: 2012 Third International Conference on Theoretical and Mathematical Foundations of Computer Science, December 1-2, 2012, Bali, Indonesia

8. Digital watermarking algorithm based on digital holographic transform and DWT-SVD. Wang Zuxi; Mao Liugang; Xu Jing. Source: 2012 Third International Conference on Theoretical and Mathematical Foundations of Computer Science, December 1-2, 2012, Bali, Indonesia

9. Fair and efficient network congestion control based on minority game.Wang, ZuxiWang, Wen; Hu, HanpingDeng, Zhaozhang Source: Proceedings of SPIE - The International Society for Optical Engineering, v 8006, 2011

10. Hybrid digital fingerprint based on multi-type characters for collusion-resistance. Wang, ZuxiWang, Wenzong; Hu, HanpingXu, Jing Source: Proceedings of SPIE - The International Society for Optical Engineering, v 8002, 2011

11. Network traffic anomaly detection method based on catastrophe progression. Xiong, WeiHu, Hanping; Wang, ZuxiYang, Yue Source: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban), v 39, n 1, p 28-31, January 2011 Language: Chinese

12. An accurately located method and secure scheme for image authentication.Wang, ZuxiWang, Wenzong; Dong, LiefengYe, Peng Source: 2010 International Conference on Multimedia Technology, ICMT 2010, 2010

13. An optimization algorithm of spare capacity allocation by dynamic survivable routing. Wang, ZuxiLi, Li; Sun, GangHu, Hanping Source: Lecture Notes in Computer Science, v 6146 LNCS, n PART 2, p 439-445, 2010

14. Digital fingerprinting based on synergetic. Wang, ZuxiGe, Qiang; Wang, WenzongHu, Hanping Source: Proceedings - 2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009, 2009

15. Recoverable image watermarking based on halftoning for content authentication. Wang, ZuxiZhao, Xiangyuan; Wang, WenzongHu, HanpingLi, LiSource: Proceedings of SPIE - The International Society for Optical Engineering, v 7498, 2009

16. A novel method for network anomaly detection using superstatistics. Dong ChenHanping Hu; Zuxi WangJianghang Chen Source: 2008 International Conference on Complex, Intelligent and Software Intensive Systems, p 595-8, March 2008

17. Measurement model for network security based on traffic attack determination. Wang, YiHu, Hanping; Wang, ZuxiChen, Jianghang Source:Huazhong Keji Daxue Xuebao (Ziran Kexue Ban), v 36, n 4, p 37-40, April 2008Language: Chinese

18. Design and circuits simulation of mixed digital-analog chaotic system.Hu, HanpingLu, Pengyu; Wang, ZuxiYang, Jie Source: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban), v 35, n 10, p 8-11, October 2007 Language: Chinese

19. Research on packet loss and disorder of MPLS-based recovery. Wang Zuxi;Guan Jun; Hu HanpingSun Gang Source: Microcomputer Information, n 21, p 93-4, 2007 Language: Chinese

20. A scheme of network partition and restoration in MPLS networks. Wang Zuxi; Sun GangHu HanpingGuan Jun Source: Control & Measurment, v 6, n 1, p 204-5,191, 2007 Language: Chinese

21. Research on gene expression programming algorithm based on virus evolution. Yang, Jie; Li, De-HuaWang, Zu-XiChen, Lei Source: Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, v 20, n 3, p 399-405, June 2007 Language: Chinese

22. E-note authentication technology using E-seal watermarking. Wang, Zuxi;Zhao, Xiangyuan; Liu, XinweiHu, Hanping Source: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban), v 34, n 11, p 58-60, November 2006 Language: Chinese

23. Design of simulation system and its implementation based on overlay network. Zhang, BaoliangWang, Zuxi; Hu, Hanping Source: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban), v 33, n 11, p 12-15, November 2005 Language: Chinese

24. Synchronizing chaotic map from the two-valued symbolic sequences. Hu, HanpingWu, Xiaogang; Wang, Zuxi Source: Chaos, Solitons and Fractals, v 24, n 4, p 1059-1064, May 2005

25. A Method for generating chaotic key stream. Hu, Han-PingLiu, Shuang-Hong; Wang, Zu-XiWu, Xiao-Gang Source: Jisuanji Xuebao/Chinese Journal of Computers, v 27, n 3, p 408-412, March 2004 Language: Chinese

 

2)专著

中国密码学发展报告2009非线性系统与密码学。电子工业出版社,2010.08 (ISBN: 712111237X)

 

3)奖励

(1). 湖北省科技进步二等奖,基于物联网的药品安全监管系统, 2011;第2完成人

(2).湖北省科学技术发明二等奖,基于手机令牌的动态身份认证系统, 2007;第2完成人

(3).教育部提名国家技术发明二等奖,动态电子密码系统, 2003;第2完成人

(4).湖北省科学技术发明三等奖,网络主动防御系统, 2004;第2完成人

(5)湖北省科学技术发明三等奖,动态身份认证系统, 2002;第3完成人

 

4)已授权国际PCT发明专利:

(1).Hu Hangping, Wang Zuxi, Wu Xiaogang, Zhou Lin, Zhu Ziqi, Wei Jiwei, Yang Jie, Lu Pengyu, Zheng Zhibin. A SYSTEM AND METHOD FOR GENERATING THE

ANALOG-DIGITAL MIXED CHAOTIC SIGNAL, ENCRYPTION COMMUNICATION METHOD THEREOF. 06840754.3-2415/1971070, 2010.3.25,欧洲授权号:19710702012.3.27,美国授权号:8144872

 

5)已授权国家发明专利(部分)

(1).一种选择后备LSP 的方法和装置,2009.10.14,中国,ZL200710002982.8。排1

(2).用于生成模数混合混沌信号的系统和方法,2012.01.18,中国,ZL200510121497.3。排2

(3).一种基于多网融合的多功能远程医疗护理系统,2012.08.15,中国,ZL201010579090.6。排2

(4).一种基于超统计理论的网络流量异常检测方法,2010.12.29,中国,ZL200810047728.4。排2

(5).一种安全防伪系统,2009.06.24,中国,ZL200410061405.2。排2

(6).一种动态身份认证方法和系统,2007.06.27,中国,ZL200310111570.X。排2

(7).一种用于动态身份认证的手机,2006.08.02,中国,ZL200310111571.4。排2

(8).一种基于混沌混杂自同步方法的加解密方法及其系统,2011.08.24,中国,ZL200810236708.1。排3

(9).一种生成变参数混沌信号的方法及混沌保密通信系统,2010.12.08,中国,ZL200810197389.8。排3

(10).一种无线网络安全传输方法、系统及设备,2011.11.23,中国,ZL200710163240.3。排3

(11).一种用于混沌系统的参数估计方法,2011.01.26,中国,ZL200810236727.4。排3