陈先意
已经得到40个称赞     给我点赞
  • 电子邮箱:002582@nuist.edu.cn
  • 所在单位:计算机学院、网络空间安全学院(数字取证教育部工程研究中心、公共计算机教学部)
  • 性别:
  • 职称:副教授
  • 个人简介
  • 研究方向
  • 社会兼职
  • 教育经历
  • 工作经历
  • 团队成员
  • 其他联系方式

陈先意,南京信息工程大学副教授/硕导,工学博士,南京市玄武中青年优秀人才,IEEE/ACM/CCF会员。20146月毕业于湖南大学计算机科学技术专业,美国北卡大学彭布罗克分校访问学者,当前就职于南京信息工程大学计算机学院,担任数字取证教育部工程研究中心副主任,南京市安全防范行业协会专家委员,南京市安全防范行业协会标准化工作委员会副主任。主持及参与国家自然科学基金重点项目、面上项目、青年项目等7项,国家社科基金2项;获2022年江苏省科学技术奖(基础类)二等奖1项(3/9);获20242018、2024年度江苏省高等学校科学技术成果奖、教育教学与研究成果奖(研究类)二等奖、三等奖共3;获20162017年云计算与安全国际会议(ICCCS)优秀论文奖共2项,指导本科生或研究生获得中国国际“互联网+”铜奖、全国计算机设计大赛一等奖等国家级、省部级奖项20项。近年来以第一作者或通信作者在《IEEE TNSE》等国际期刊发表学术论文60余篇,国家发明专利授权19项,软件著作权50余项。主要学术兼职包括国际期刊Journal on Big Data主编、20222023全国研究生教育评估监测专家库专家、国际会议ICAIS组织委员会成员等,主要研究兴趣包括大数据安全及人工智能安全等,相关研究成果为数据安全、图像隐写等提供了新理论与新方法,部分研究成果应用于物流调度、数据安全等领域。

------------------------------------------------------------------------------------------------------------

【主持及参与的国家级项目】

1. 国家自然科学基金委员会,青年项目,61502242,基于非对称扩展的可逆水印研究,2016-01至2018-12,23.7万元,结题,主持

2.    国家自然科学基金-通用技术联合基金,重点项目,U1536206,基于文本大数据的无载体信息隐藏研究,2016-012019-12270万元,结题,主研

3.    国家自然科学基金委员会,面上项目,61672294,云计算环境中的密文图像检索方法研究,2017-012020-1268万元,结题,主研

4.    国家自然科学基金委员会,青年项目,61702276,云环境下基于交换加密水印的隐私媒体数据服务保护方法研究,2018-012020-1220万元,结题,参与

5.    国家自然科学基金委员会,青年项目,71602092,基于任务情境的游客社会化搜寻行为的触发、策略和效果研究,2017-012019-1220万元,结题,参与6.    国家自然科学基金委员会,青年项目,61602253,基于含密自然图像检索的无载体信息隐藏研究,2017-012019-1220万元,结题,参与

【获奖】

1. 2024.8,袁浩钦等。智绘幻盾——基于对抗样本的FPS游戏反AI自瞄作弊系统。大学生信息安全竞赛,二等奖(国家级),指导教师(陈先意)。

2. 2024.7,路清媛等。智算寻章,中国大学生计算机设计大赛,二等奖(国家级),指导教师(陈先意、王保卫)。

3. 2024.6,张成娟。2024信息安全与对抗技术竞赛(ISCC2024),一等奖(全国综合积分排名第1名),指导教师(陈先意)。

4. 2024.6,路清媛等。智算寻章,中国大学生计算机设计大赛,江苏省(特等奖),优秀指导教师(陈先意、王保卫)。

5. 2024.5,袁浩钦。身临其境--智能交互科普领航者大学生创新创业训练项目,省级立项,指导教师陈先意

6. 2024.5,韩承谕。基于生成对抗贴图的FPS游戏房自瞄系统设计与实现大学生创新创业训练项目,省级立项,指导教师陈先意

7. 2024.5,许童博,倪俊锋,黄正汉。第四届全国网络空间取证竞赛(FIC)一等奖(全国综合积分排名第2名),优秀指导教师陈先意)。

8. 2024.5,池锵云、张成娟、林厚城。第四届全国网络空间取证竞赛(FIC)三等奖,优秀指导教师陈先意)。

9.  2023.12,"Wisdom" in"WarehousingSteel B2BWarehousing Uperade Enabler中国国际大学生创新大赛,铜奖(国家级),Xianyi Chen, Xiao Shen, Xiaoling Liu, Loza BEKALO

11. 2023.6,密态数据高效计算与权属保护方法研究,2022年度江苏省科学技术奖(二等奖),陈先意(3/9)

12. 2023.5,张成娟MemTracking内存取证,盘古石杯全国电子数据取证大赛,全国一等奖(作品赛)。

13. 2022.8,钱郁滔。电力客户行为分析,中国软件杯大学生软件设计大赛,二等奖(国家级)。

14. 2022.7李清昀AI-SPREC智能钢板仓储规划调度系统,中国大学生设计大赛,一等奖(国家级)。

15. 2022.9,熊佳颖,基于Lambert-Beerlaw的水下图像增强方法研究。优秀本科毕业设计,二等奖(省级),指导老师。

16. 2022.7,朱佳轩,南方云仓——钢铁B2B智慧仓储领航者,第五届“赢在玄武”青年大学生创新创业大赛,二等奖。

17. 2021.12,2021年第三届全国高校计算机能力挑战赛,程序设计赛-Java华东赛区优秀奖优秀指导老师.

18. 2021.11,严璐琦。Q-智慧仓储方案—钢铁B2B行业升级助力者,“互联网+”大学生创新创业大赛,省级二等奖,指导老师

19. 2021.9,熊佳颖,基于Lambert-Beerlaw的水下图像增强方法研究。优秀本科毕业设计校级(一等奖),指导老师。

20. 2021.8,云端智能相册应用,中国软件杯大学生软件设计大赛,三等奖(国家级),指导老师。

【主持的企业横向项目】

1. 2024***算力调度等技术专题研究及科研资源检索分析服务,国网***有限公司

2. 2024***吊装布设与测试方案研究设计,***大学

3. 2023***市第三次土壤普查项目数据分析与成果汇总,***市农业农村局

4. 2023***市经济技术开发区第三次土壤普查,***市经济开发区

5. 2023,中国南海***数据标注及分析,***大学

6. 2023,***文本数据识别模型训练,***大学

7. 2022,***森林防火一体化预警与取证系统***能源科技有限公司

8. 2022***公司的在线考试系统**数字科技有限公司

9. 2021AI智能算法模型技术开发,***钢铁公司

10. 2021,典型大空间电器负荷预测与监测取证,***信息技术有限公司

11. 2021***污染监测及快速追溯系统,***气象科技有限公司

12. 2020,***瑕疵检测研究,***设备制造公司

13. 2020,题库系统试卷自动生成算法研究,***教育咨询公司


【授权发明专利】

  1. 陈先意,刘艳艳,钱郁滔,付章杰,闫雷鸣,许娟。基于BERT和GAT的裁判文书争议焦点识别方法,2023-1-5,CN202211365207.X.

  2. 陈先意;刘宇;张广星;孟宇航;糜慧;颜凯。一种神经网络水印嵌入方法以及验证方法,2022-6-30,中国,ZL202210757151.6.

  3. 陈先意;孟宇航;刘宇;颜凯;何俊杰;张广星。一种神经网络主动保护方法、系统、存储介质及计算设备,2022-5-23,中国,ZL 2022100559415.7.

  4. 顾军,陈先意,付章杰,颜凯,江栋,钱郁滔。基于轻量级网络对抗的车牌防盗摄隐私保护方法及系统,2022-8-17,中国,CN202210988321.1

  5. 孟宇航;陈先意;付章杰;袁程胜;孙星明。一种基于GAN的神经网络水印生成方法、系统和存储介质,2022-3-1,中国,ZL 202210091866.2.

  6. 陈先意;仲海东;陈盛;孙星明。基于码分复用及值扩展的同态加密域可逆信息隐藏方法, 2020-9-8, 中国, CN107590369B.

  7. 袁程胜;夏志华;陈先意;孙星明。基于四元数小波变换的图像无载体信息隐藏方法,2021-2-19,中国,CN107622469B.

  8. 陈先意;张震添;付章杰;王保卫;孙星明。一种基于联盟链技术的健身公园游玩系统及方法,2022-2-18,中国,CN114066682A.

  9. 陈先意;顾军;张震添;付章杰;王保卫;孙星明。一种基于神经网络的涂卡题云批阅系统及方法,2022-1-11,中国,CN113920521A.

  10. 薛红玉,王康,杨威,陈先意,陈卫,丁思哲,郭俊屹,李清昀,章亚军。一种适用于流通钢材溯源的联盟链,2022-11-18,中国,CN202210838457.4.

  11. 闫雷鸣,薛红玉,吴思奇,杨威,李少鹏,陈先意,郭俊屹,李清昀,章亚军。板体翻堆落位方法、系统、存储介质及计算设备,2022-9-23,中国,CN202210605047.5.

  12. 闫雷鸣,薛红玉,严璐绮,杨威,吴思奇,陈先意,郭俊屹,李清昀,章亚军。中厚钢板翻堆出库优化方法、系统及存储介质,2022-9-23,中国, CN202210581010.3.


【发表的学术论文】


陈先意,丁思哲,王康。一种支持安全联邦学习的主动保护模型水印框架, 2023.12.14计算机工程2024.5.17(录用CSCD,北大核心)

Nannan Wu, Xianyi Chen*,James Msughter Adeke, Junjie Zhao. A Cover-independent Deep Image Hiding Method Based on Domain Attention Mechanism, Computers, Materials & Continua,78(3),2024 (SCI). DOI: 0.32604/cmc.2023.045311

陈先意,周浩,刘腾骏,闫雷鸣。基于注意力机制和护照层嵌入的图像处理模型水印方法,信息安全研究,2024.3.5

Bin Wu, Xianyi Chen,Jinzhou Huang, Caicai Zhang, Jing Wang, Jing Yu, Zhiqiang Zhao and Zhuolin Mei. Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment, Computers, Materials & Continua,2024.2.12(SCI), DOI: 10.32604/cmc.2023.047147

陈先意,钱郁滔,许娟、张成娟、闫雷鸣、付章杰,基于孪生LegalBERT网络和动态事件抽取的诉辩焦点识别方法,计算机与数字工程。2023.12.20

许林峰陈先意,钱郁滔。基于强化潜在特征的对抗样本生成方法,计算机与数字工程。2023.12.5

Nannan Wu, Xianyi Chen. Hi-Diffusion: breakthrough in steganography for balancing hiding capacity and image quality,The 4th CSIG Chinese Conference on Media Forensics and Security, 2023.11.11, Nanjing, China.

Lei Zhang, Xianyi Chen et.al. Wi-Diag:Robust Multi-subject Abnormal Gait Diagnosis with Commodity Wi-Fi, IEEE Internet of Things Journal. 2023.8.1 (SCI). DOI: 10.1109/JIOT.2023.3301908.

Changhao Ding; Zhangjie Fu; Qi Yu; Fan Wang; Xianyi Chen. Joint Linguistic Steganography With BERT Masked Language Model and Graph Attention Network, IEEE Transactions on Cognitive and Developmental Systems. 2023.7.16 (SCI). Doi: 10.1109/TCDS.2023.3296413.

陈先意,王康,丁思哲,付章杰。区块链互操作技术研究进展,计算机科学与探索,2023.6.14. DOI: 10.3778/j.issn.1673-9418.2303119CSCD,北大核心)

陈先意顾军,颜凯,江栋,许林峰,付章杰。针对车牌识别系统的双重对抗攻击,网络与信息安全学报9(3): 16-27, 2023.4.18.

Yuhang Meng, Xianyi Chen*, Xingming Sun, Yu Liu and Guo Wei. A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks. Computers, Materials & Continua, 75(1):831-844, 2023.1 (SCI). DOI:10.32604/cmc.2022.033700.

Xianyi Chen, Zhentian Zhang, Anqi Qiu, Zhihua Xia*, Neal N. Xiong. A novel coverless steganography method based on image selection and StarGAN. IEEE Transactions on Network Science and Engineering, 9(1): 219-230, 2022.1 (SCI). DOI: 10.1109/TNSE.2020.3041529

Yewen Wu, Shi Zeng, Bin Wu, Bin Yang, Xianyi Chen*. Quantitative Weighted Visual Cryptographic (k, m, n) Method. Security and Communication Networks, vol. 2021, 9968652, 2021 (SCI). https://doi.org/10.1155/2021/9968652

 Xianyi Chen, Mengling Zou, Bin Yang, Zhenlin Wang and Lili Qi*, A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 18(2): 1722-1739, 2021.1 (SCI). DOI: 10.3934/mbe.2021089

Bin Wu, Xianyi Chen, Zongda Wu, Zhiqiang Zhao, Zhuolin Mei, Caicai Zhang, Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario, Wireless Communications and Mobile Computing, vol. 2021, https://doi.org/10.1155/2021/6617959

Shuai Wang, Yang Cong, Hancan Zhu, Xianyi Chen and Mingxia Liu. Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract. IEEE Journal of Biomedical and Health Informatics, PP (99), 1-1. 2021.1,25(2), pp. 514-525. (SCI). DOI: 10.1109/JBHI.2020.2997760.

Bin Wu, Xianyi Chen, Caicai Zhang, Zhuolin Mei, Zhiqiang Zhao, Zongda Wu and Tao Yao. Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment, IEEE Access, 2020, 214596-214604. DOI. 10.1109/ACCESS.2020.3040781.

Shuai Wang, Xianyi Chen*. Adaptive Binary Coding for Scene Classification Based on Convolutional Networks, Computers, Materials & Continua.65(3), pp:2065-2077. 2020.9 (SCI)

Xiucai Ding, Xianyi Chen*, Mengling Zou, Guangxign Zhang. Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices, KSII Transactions on Internet and Information Systems, 2020.5 (SCI)

Haidong Zhong, Xianyi Chen*. A separable reversible data hiding scheme in encrypted image for two cloud servers. International Journal of Embedded Systems, 12(1), pp:62-71. 2020.1.(EI)

Xiang Zhou, Xianyi Chen*, Fasheng Zhang, Ningning Zheng. A novel coverless text information hiding method based on double-tags and twice-send. International Journal of Computational Science and Engineering, 21(1), pp: 116-124. 2020.1. (EI)

王振力, 王群,陈先意,马如坡,刘晓迁. 基于分数阶Fourier变换的高性能SAR成像算法的研究 [J]. 地球信息科学学报(权威核心)

王振力, 王群,陈先意,马如坡,刘晓迁. 旋转分数阶傅里叶变换域构建SAR方位向高分辨率成像算法的研究 [J]. 遥感信息(中文核心、CSCD核心)

 Chengsheng Yuan, Xianyi Chen, Ruohan Meng, Xingming Sun. Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. Journal of Real-Time Image Processing. 17(1) 2019. (SCI)

Mengling Zou, Zhengxuan Liu, Xianyi Chen*. A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform. Journal on Big Data, 1(3), pp:151–158. 2019.12. http://doi:10.32604/jbd.2019.09057

 Xianyi Chen, Anqi Qiu, Xingming Sun*, Shuai Wang and Guo Wei. A High-Capacity Coverless Image Steganography Method Based on Double-Level Index and Block Matching. Mathematical Biosciences and Engineering. 16(5), pp. 4708-4722, 2019.6. http://doi:10.3934/mbe.2019236 (SCI).

Xianyi Chen*, Haidong Zhong, Zhifeng Bao. A GLCM-feature-based Approach for Reversible Image Transformation. Computers, Materials & Continua. 2019.4. 59(1), pp:239-255. http://doi:10.32604/cmc.2019.03572 (SCI).

Xianyi Chen*, Haidong Zhong, Anqi Qiu. Reversible data hiding scheme in multiple encrypted images based on code division multiplexing. Multimedia Tools and Applications. 78(6), pp. 7499-7516, 2019.3. http://doi:10.1007/s11042-018-6446-y. (SCI)

 Xianyi Chen*, Sheng Chen. Text coverless information hiding based on compound and selection of words. Soft Computing. 2019, 23(15): 6323-6330. DOI: 10.1007/s00500-018-3286-7. (SCI)

Lizhi Xiong, Zhihua Xia, Xianyi Chen, Hiuk Jae Shim:Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimedia Tools Appl. 78(21): 30297-30313 (2019). (SCI)

Jin Liu, Jian Li, Yadang Chen, Xianyi Chen, Zhili Zhou, Zejun Yang, Chengjun Zhang. Modeling complex networks with accelerating growth and aging effect. Physics Letters A. 2019, 13(383): 1396-1400. (SCI)

Zhihua Xia, Lihua Lu, Tong Qiu, H J Shim, Xianyi Chen, Byeungwoo Heon, A Privacy-Preserving Image Retrieval Based on AC-coefficients and Color Histograms in Cloud Environment. Computers, Materials & Continua, 2019.1.11. https://doi.org/10.32604/cmc.2019.02688 (SCI)

Haidong Zhong, Xianyi Chen*, Qinglong Tian. An Improved Reversible Image Transformation Using K-Means Clustering and Block Patching. Information. 2019.1.5, 10(1). 17. https://doi.org/10.3390/info10010017. (EI)

Xianyi Chen, Haidong Zhong, Zhjili Xiong, Zhihua Xia*. An improved encrypted-signals-based reversible data hiding using code division multiplexing and value expansion. Security and Communication Networks, 2018.2. DOI: 10.1155/2018/1326235. (SCI)

 Yulei Wu, Xianyi Chen, Xingming Sun*, Coverless Steganography Based on English Texts Using Binary Tags Protocol, Journal of Internet Technology, vol. 19, no. 2, pp. 599-606, Mar. 2018. (SCI)

Bin Yang, X Sun, H Guo, Z Xia, Xianyi Chen, A copy-move forgery detection method based on CMFD-SIFT, Multimedia Tools and Applications, 2018. 77 (1), 837-855. (SCI)

Lizhi XiongDanping DongZhihua XiaXianyi Chen, High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644, 2018. (SCI)

Bin YangXingming SunEnguo CaoWeifeng HuXianyi Chen, Convolutional neural network for smooth filtering detection. IET Image Processing 12(8): 1432-1438, 2018. (SCI)

Yang, B., Sun, X., Guo, H., Xia, Z., & Chen, X. A copy-move forgery detection method based on cmfd-sift. Multimedia Tools and Applications, 77(1), 837-855, 2018. (SCI)

Bin YangXianyi ChenTao Zhang. A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems. ICCCS (6) 2018: 243-254. (EI)

Xianyi Chen*, Sheng Chen, Yulei Wu. Coverless Information Hiding Method Based on the Chinese Character Encoding. Journal of Internet Technology, 2017.3, 18(2), pp. 91-98. (SCI). DOI: 10.6138/JIT.2017.18.2.20160815.

Sheng Chen, Xianyi Chen*, Huijuan Fu. General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error, Advances in Multimedia, 2017.11, pp. 1-9. (EI). DOIhttps://doi.org/10.1155/2017/6359248.

Xianyi Chen*, Guangyong Gao, Dandan Liu, Zhihua Xia. Steganalysis of LSB Matching using Characteristic Function Moment of Pixel Differences. China Communications, 2016.6, 13(7), pp. 65-72. (SCI)

B Yang, X Sun, J Zhang, L Xiang, Xianyi Chen, X Li, M Topkara, U Topkara, Synonymous paraphrasing using WordNet and internet. Information Technology Journal, 2016, 11 (8), pp: 37-46

Xianyi Chen, Xingming Sun*, Huiyu Sun, Lingyun Xiang, Bin Yang. Histogram shifting based reversible data hiding method using directed prediction scheme. Multimedia Tools and Applications. 2015, 74, pp. 5747-5765. (SCI)

Xianyi Chen*, Huiyu Sun, Yoshito Tobe, Zhili Zhou, Xingming Sun. Coverless Information Hiding Method Based on the Chinese Mathematical Expression. First International Conference, ICCCS 2015, pp. 133-143. (EI)

B Yang, X Sun, Xianyi Chen, J Zhang, X Li, Exposing photographic splicing by detecting the inconsistencies in shadows, The Computer Journal, 2015, 58 (4), 588-600. (SCI)

Z Zhou, H Sun, R Harit, Xianyi Chen, X Sun, Coverless image steganography without embedding, International Conference on Cloud Computing and Security, 2015, pp. 123-132 (EI)

 Xianyi Chen*, Chunfeng Li. Efficient reversible image watermarking based on odd-even consistency on pixel pairs. [J] Journal of Computational Information Systems. 2014.8, 10(16), pp. 6807-6816. (EI)

Xianyi Chen*, Chunfeng Li. Efficient reversible watermarking method based on prediction error pair expansion [J]. ICIC Express Letters. 2014. 12, 8(12), pp. 3263-3269. (EI)

Zhili Zhou, Xingming Sun*, Xianyi Chen, Cheng Chang, Zhangjie Fu. A novel signature based on combination of global and local signatures for image copy detection [J]. Security and Communication Networks. 2014, 7(11):1702-1711. (SCI)

Xianyi Chen, Xingming Sun*, Huiyu Sun, Zhili Zhou, Jianjun Zhang. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. Journal of Systems and Software. 2013, 86(10), pp. 2620-2626. (SCI)

Bin Yang, Xingming Sun*, Xianyi Chen, Jianjun Zhang, Xu Li. An efficient forensic method for copy-move forgery detection based on DWT-FWHT [J]. Radioengineering. 2013, 22(4):1098-1105. (SCI)

Xianyi Chen, Lanzhe Liu*. Boundedness for multilinear commutators of integral operators in Hardy and Herz-Hardy spaces on homogeneous spaces. Journal of mathematical inequalities. 2011, 5(3), pp. 307-319. (SCI)

Zhili Zhou, Xingming Sun*, Xianyi Chen, Lian Tan. A Fourier-Mellin transform based feature for image copy detection with rotation simulation strategy [J]. International journal of digital content technology and its application. 2012, 6(11):369-377. (EI)

Bin Yang, Xingming Sun*, Jianjun Zhang, Lingyun Xiang, Xianyi Chen, Xu Li. A novel reversible text data hiding scheme [J]. Information Technology Journal. 2012, 11(8): 1084-1090. (EI)