• 其他栏目

    崔琦

    • 副教授 硕士生导师
    • 性别:男
    • 学历:博士研究生毕业
    • 在职信息:在岗
    • 所在单位:网络空间安全学院(数字取证教育部工程研究中心)
    • 办公地点:临江楼A1509
    • 联系方式:cuiqi.scholar@gmail.com cuiqi@nuist.edu.cn

    访问量:

    开通时间:..

    最后更新时间:..

    个人简介


    l  研究方向

    深度学习模型安全、信息隐藏等。近年来发表论文包括人工智能方向和安全方向的顶会及顶刊CVPRTDSCTMM等,详见谷歌学术代码仓库


    欢迎有想象力、编码能力强、有良好英语和数学基础的研究生本科生与我联系(email: cuiqi@nuist.edu.cn),加入我所属的数字取证团队,本团队资源丰富、与国内外多所知名院校保持合作关系,我们一起研究学习!


    欢迎26级研究生(计算机/网安等专业学硕/专硕)与我联系,组内经费充足,计划招生3-5人


     

    l  研究内容

    • 深度模型知识产权保护 (DNN IP Protection):聚焦于深度模型的版权标识、使用验证与侵权追溯机制。设计在不影响模型性能前提下嵌入可验证的水印标识(如参数水印、行为水印),用于确认模型归属与版权主张;构建对模型压缩、微调、剪枝等操作具有鲁棒性的水印技术,以应对侵权者的规避行为;支持单用户、多用户、联邦学习等环境下的水印解码与使用追踪,结合加密技术实现权属验证与溯源。


    • 鲁棒的深度信息隐藏 (Robust Deep Hiding):聚焦于利用深度神经网络进行图像、视频、音频等多模态载体中的鲁棒隐写与提取,同时提升在实际干扰环境下的安全性与可靠性。面向压缩、剪裁、降噪、滤镜等常见图像扰动,引入抗攻击优化策略提升隐藏信息的稳定性;引入可调嵌入容量、认证信号设计,使信息隐藏不仅服务传输安全,也可用于AIGC内容标记与可追溯生成。


    • 安全可控的AI生成内容 (Accountable AIGC):建立可追责、可验证、可限制的AIGC生成体系,以实现内容生成的透明性与合规性。构建生成内容中的不可见水印/指纹机制,用于识别生成来源与模型版本;实现对AIGC模型的功能级别控制,防止其在未经授权场景下生成敏感或违规内容;基于模型行为记录与内容标记,实现内容生成全过程可记录、可回溯。


    l  荣誉

    • 2024年度ACM SIGWEB China 新星奖

    • 2024年江苏省网络空间安全学会优秀博士论文奖

    • 2025年江苏省教学成果奖(10/14)

     

    l  科研经历

    ○ 2026-至今: 网络空间安全学院,南京信息工程大学,副教授

    ○ 2024-2025: 计算机学院、网络空间安全学院,南京信息工程大学,讲师/副教授

    ○ 2023-2024: School of Electrical and Electronic Engineering, 新加坡南洋理工大学 (Nanyang Technological University), 博士后研究员 (Research Fellow),合作导师Prof. Prof. Chip-Hong Chang (Fellow of IEEE)

    ○ 2021-2022: Centre for Computer Vision and Deep Learning (CVDL), 加拿大温莎大学 (University of Windsor),博士联合培养合作导师:Prof. Q. M. Jonathan Wu (加拿大工程院院士,Distinguished University Professor)

    ○ 2013-2022: 计算机与软件学院/电子与信息工程学院,南京信息工程大学,本科/博士研究生 (硕博连读)

     

    l  主要论文 (Corresponding author, *Contributed equally.)

    [CVPR] Qi Cui*, Ruohan Meng*, Chaohui Xu, and Chip-Hong Chang. Steganographic Passport: An Owner and User Verifiable Credential for Deep Model IP Protection Without Retraining, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 12302-12311. 2024. (CCF-A)

    [TDSC] Qi Cui, Weixuan Tang, Zhili Zhou, Ruohan Meng, Guoshun Nan, and Yun-Qing Shi. Meta-Metric Learning for Secure Deep Image Hiding, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 5, pp. 4907-4920, 2024. (CCF-A, 中科院一区)

    [TDSCRuohan Meng, Siyuan Yang, Zhili Zhou, Qi Cui, Kwok-Yan Lam, Zengwei Zheng, and Alex C. Kot. Proactive Image Manipulation Detection and Tracing in Fake News. IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2026.3666239. 2026. (CCF-A, 中科院一区)

    [TMM] Qi Cui, Zhili Zhou, Ruohan Meng, Hongyang Yan, and Q. M. Jonathan Wu. ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning, IEEE Transactions on Multimedia, vol. 26, pp. 6542-6553, 2024. (CCF-A, 中科院一区)

    [TCSVTBaowei Wang, Jianbo Zhang (联合指导研究生), Yufeng Wu, and Qi Cui. FasterCReW: Performance or Efficiency? A Lightweight Conditional Residual DNN-based Watermarking Based on FasterNet, IEEE Transactions on Circuits and Systems for Video Technology, vol. 35, no. 8, pp. 7732-7746, 2025. (CCF-B, 中科院一区)

    [TCSVTJiancheng Li (联合指导研究生), Qi Cui, Peipeng Yu, Chip-Hong Chang, and Zhangjie Fu. RAFS: Reversible Identity-Anonymization Face Swapping for Provenance Tracking, DOI: 10.1109/TCSVT.2026.3672268, IEEE Transactions on Circuits and Systems for Video Technology, 2026. (CCF-B, 中科院一区)

    [TWC] Zhili Zhou, Yao Wan, Qi Cui, Keping Yu, Shahid Mumtaz, Ching-Nung Yang, and Mohsen Guizani. Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks, IEEE Transactions on Wireless Communications, vol. 23, no. 1, pp. 423-435, 2024. (CCF-B, 中科院一区)

    [IOTJ] Jingwang Huang*, Qi Cui*, Zhili Zhou, Keping Yu, Ching-Nung Yang, and Kim-Kwang Raymond Choo. Encrypted Domain Secret Medical-Image Sharing with Secure Outsourcing Computation in IoT Environment. IEEE Internet of Things Journal, vol. 11, no. 2, pp. 2382-2393, 2024. (CCF-C, 中科院一区)

    [ICASSP] Qi Cui, Xuebo Wang, Xianyi Chen, Qianqian Wang, and Zhangjie Fu. Turning Data Heterogeneity into a Backdoor Shield for Personalized Federated Learning. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2026. (CCF-B)

    [TGKai Yan (联合指导研究生), Xianyi Chen, Qi Cui, Haoqin Yuan, and Zhenshan Tan, AdvMap: Crafting Adversarial Maps to Counter AI Aimbot in First-Person Shooter Games. IEEE Transactions on Games, vol. 17, no. 3, pp. 753-764, 2025. (CCF-C)

    [PRLTianyu Chen (联合指导研究生), Qi Cui, and Zhangjie Fu. Signature-in-Signature: A Fidelity-Preserving and Usability-Ensuring Framework for Dynamic Handwritten Signature Protection. Pattern Recognition Letters, vol. 201, pp. 45-51, 2026. (CCF-C)

    [计算机科学] 陈先意, 张成娟 (联合指导研究生)钱江峰郭倩彬崔琦, 付章杰. 基于特征分布的高鲁棒模型结构后门方法. 计算机科学, vol. 52, no. 12, pp. 374-383. 2025. (CCF-T2) 

    [信息网络安全付章杰, 陈天宇 (联合指导研究生)崔琦. 基于对比学习的动态手写签名验证模型保护方法.  信息网络安全, doi:10.3969/j.issn.1671-1122.2025.12.008. 2025.(CCF-T3) 

     

    l  科研项目

    • “可修复式深度信息隐藏方法研究”,国家自然科学基金青年项目,在研,主持

    • “防去除攻击的深度信息隐藏方法研究”,江苏省基础研究计划自然科学基金青年基金项目,在研,主持

    • “可抵抗扩散去除的内容标识方法研究”,南京市留学人员科技创新项目(A类),在研,主持

     

    l  课程

    • Relational Database (英文授课) 专业必修,48学时

    • Database Fundamentals (英文授课) 专业必修,48学时

    • 信息隐藏与取证,专业选修,32学时

    • 信息隐藏与取证实践,专业选修,16学时

    • Computer Networks (英文授课) 学科必修,48学时

    • User Experience Design (英文授课专业必修,32学时

    • 信息论,专业必修,32学时


    l  竞赛指导

    • 中国国际大学生创新大赛(2024)产业命题赛道国家银奖

    • 江苏省大学生创新训练项目:面向噪声环境的实时音频数据不可学习鲁棒演化技术研究


    l  学术兼职

    • CSIG数字媒体取证与安全专业委员会委员

    • 江苏省计算机学会信息安全专委会委员


    • Technical Program Committee Member
      Advances in Artificial Intelligence and Security Part I & Artificial Intelligence and Security Part II 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings.
      Asian Hardware Oriented Security and Trust Symposium (AsianHOST), IEEE, Tianjin, China, Dec. 13–15, 2023 Proceedings.
      Asian Hardware Oriented Security and Trust Symposium (AsianHOST), IEEE, Kobe, Japan, Dec. 16–18, 2024 Proceedings.

    • Asian Hardware Oriented Security and Trust Symposium (AsianHOST), IEEE, Nanjing, China, Dec. 19–21, 2025 Proceedings.
      The 4th International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT 2024), Beijing, China, Jun. 22–25, 2024.

     

    Reviewer

    • Journal:

    IEEE Transactions on Dependable and Secure Computing (TDSC)
    IEEE Transactions on Information Forensics and Security (TIFS)
    IEEE Transactions on Multimedia (TMM)

    IEEE Transactions on Circuits and Systems for Video Technology (TCSVT)
    IEEE Transactions on Very Large Scale Integration Systems (TVLSI)
    IEEE Transactions on Industrial Informatics (TII)


    • Conference:

    International Conference on Learning Representations (ICLR'25; '26)
    IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR'26)
    European Conference on Computer Vision (ECCV'26
    Annual Conference on Neural Information Processing Systems (NeurIPS'24; '25)
    International Joint Conferences on Artificial Intelligence (IJCAI'25) 
    ACM International Conference on Multimedia (MM'25; '26
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'26)
    IEEE International Conference on Multimedia and Expo (ICME'23; '24; '25; '26)






     



    其他联系方式

    邮编 :

    邮箱 :