师资队伍

Faculty

师资队伍

首页 > 师资队伍 > 教师名录 > 教授(研究员) > 正文

师资队伍

Teacher Directory

教授(研究员)

张新鹏

时间:2026年03月26日 15:17:12 作者:王晓伟 点击:

姓名

张新鹏

职称

教授

电子邮件

xzhang@shu.edu.cn

办公室

计1121室

研究方向

人工智能安全,多媒体信息安全

个人简介

国家杰出青年科学基金获得者,二级教授,上海大学计算机工程与科学学院院长。曾赴美国纽约州立大学宾汉顿分校、英国肯特大学访学,受德国洪堡基金会资助作为资深研究员赴德国康斯坦茨大学访学。主持国家自然科学基金重点项目、国家自然科学基金原创探索项目、国家重点研发计划、国家863计划等科研项目40余项。发表论文400余篇,被引20000余次,连续十二年入选“爱思唯尔”中国高被引学者榜单,并入选“科睿唯安”全球高被引科学家。申请发明专利30余项,授权近20项。以第一完成人获上海市自然科学奖一等奖,参与获得国家级教学成果二等奖两次。担任 IEEE Trans. on Information Forensics and Security (IEEE T-IFS)等国际学术期刊的 Associate Editor、ACM IH&MMSec与IEEE WIFS等国际学术会议的程序委员会主席和大会主席。

教育背景

2000-2004,上海大学通信与信息工程学院,博士

1998-2001,上海大学通信与信息工程学院,硕士

1991-1995,吉林大学数学系,学士

主要工作经历

2025~ ,上海大学计算机工程与科学学院,院长

2020~2025,上海大学科研管理部,常务副部长(正处级)

2011~2012,德国Konstanz大学,Humboldt学者资深研究员

2010~2011,美国纽约州立大学Binghamton分校,访问学者

2008~2020,上海大学通信与信息工程学院,教授

2006~2008,上海大学通信与信息工程学院,副教授

2004~2006,上海大学通信与信息工程学院,讲师

科研项目

2025~2025,国家自然科学基金原创探索项目,深度模型功能隐藏理论与方法研究,负责人

2023~2026,国家重点研发计划项目,数字文创资产权属管理及服务网络,负责人

2023~2026,国家自然科学基金企业创新发展联合基金重点项目,可跨域少样本学习的隐写分析网络研究,负责人

2020~2023,国家自然科学基金通用技术基础研究联合基金重点项目,社交网络虚拟用户塑造及其信息隐藏研究,负责人

2017~2020,国家自然科学基金通用技术基础研究联合基金重点项目,新型信息隐藏的基础理论与关键技术研究,负责人

2016~2020,国家杰出青年科学基金,多媒体信息隐藏,负责人

2016~2019,上海市优秀学术带头人计划,云数据安全处理,负责人

代表性论文或专著

1. X. Fu, G. Zhu, H. Zhang, X. Zhang, Athanasios V. Vasilakos, Multi-level Feature Fusion Network for Shadow Removal Detection. IEEE Transactions on Circuits and Systems for Video Technology (2025).

2. J. Jiang, Z. Wang, X. Zhang, Image-to-Image Steganography based on multimodal generative model. Signal Processing 238 (2026): 110106.

3. J. Jiang, Z. Wang, Z. Yuan, X. Zhang, Generative Image Steganography Based on Text-to-Image Multimodal Generative Model. IEEE Transactions on Circuits and Systems for Video Technology (2025).

4. L. Huang, C. Qin, G. Feng, X. Zhang, Neural Network Watermarking with Hierarchical Recoverability. IEEE Transactions on Dependable and Secure Computing (2025).

5. H. Tian, Y. Qiu, H. Li, X. Zhang, Athanasios V. Vasilakos, Universal Low Bit-Rate Speech Steganalysis Integrating Domain-specific and Domain-shared Knowledge. IEEE Transactions on Dependable and Secure Computing (2025).

6. C. Yu, X. Zhang, G. Li, P. Liu, X. Zhang, Z. Tang Reversible data hiding in encrypted images with secret sharing and multivariate linear equation. IEEE Transactions on Dependable and Secure Computing (2025).

7. Y. Ren, Z. Yang, G. Feng, X. Zhang, PurifyFL: Non-Interactive Privacy-Preserving Federated Learning Against Poisoning Attacks Based on Single Server. IEEE Transactions on Emerging Topics in Computational Intelligence (2025).

8. Y. Xu, H. Cheng, J. Li, X. Liu, X. Zhang, M. Wang, Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search. IEEE Transactions on Information Forensics and Security (2025).

9. Y. Xu, H. Cheng, X. Liu, C. Jiang, X. Zhang and M. Wang, PCSE: Privacy-preserving collaborative searchable encryption for group data sharing in cloud computing. IEEE Transactions on Mobile Computing (2025).

10. P. Kong, A. Li, D. Guo, L. Zhou, C. Qin, X. Zhang, Privacy-preserving Image Inpainting Using Markov Random Field Modeling. IEEE Transactions on Multimedia (2025).

11. F. Li, Q. Wang, H. Cheng, X. Zhang, C.Qin, JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification. IEEE Transactions on Multimedia (2025).

12. H. Luo, L. Li, and X. Zhang. Secure Neural Network Watermarking Protocol Against Evidence Exposure Attack, IEEE Transactions on Multimedia (2025).

13. F. Li, H. Liu, X. Zhang, C. Qin, StegFlow: Flow-Based High-Frequency Distribution Mapping Network for Multi-Image Steganography. IEEE Transactions on Multimedia (2025).

14. G. He, Y. Ren, J. Zhao, G. Feng, X. Zhang, EPCNN: Efficient and Practical Privacy-Preserving Convolutional Neural Network Inference. IEEE Transactions on Network Science and Engineering (2025).

15. L. Huang, C. Qin, G. Feng, X. Luo, X. Zhang, New Framework of Robust Image Encryption. ACM Transactions on Multimedia Computing, Communications and Applications 21.3 (2025): 1-22.

16. Z. Yuan, L. Li, Z. Wang, X. Zhang, Integrity Protection of Generative Adversarial Networks Using Fragile Watermarking. ACM Transactions on Multimedia Computing, Communications and Applications (2025).

17. S. Xie, T. Qiao, S. Li, X. Zhang, J. Zhou, G. Feng, DeepFake detection in the AIGC era: A survey, benchmarks, and future perspectives. Information Fusion (2025): 103740.

18. Q. Jiang, S. Fan, Z. Zhu, Z. Hou, W. Zhong, L. Tan, Z. Qian and X. Zhang, Adversarial attacks on industrial soft sensors: Multi-target attacks based on diffusion models. Information Sciences (2025): 122732.

19. Jiang, Q., Zu, Y., Zhu, Z., Zhong, W., Xu, Y., Qian, Z. and Zhang, X, Dynamic stealthy backdoor attack against anomaly detectors in industrial control systems. Information Sciences (2025): 123066.

20. J. Hu, L. Li, H. Wu, H. Luo, X. Zhang, Dormant key: Unlocking universal adversarial control in text-to-image models. Neural Networks (2025): 108065.

21. G. He, Y. Ren, G. He, G. Feng, X. Zhang, Privacy-preserving federated graph neural network against poisoning attack. Signal Processing (2025): 110214.

22. G. Liu, X. Liang, X. Hu, Y. Si, X. Zhang and Z. Qian, ScreenGuard: A Screen-targeted Watermarking Scheme Against Arbitrary Screenshot, IEEE Trans. on Multimedia, vol. 27, pp. 8381-8392, 2025.

23. Q. Zhou, P. Wei, Z. Qian, X. Zhang, S. Li and C. Qin, Conditional Flow-Based Generative Steganography, IEEE Trans. on Dependable and Secure Computing, vol. 22, no. 5, pp. 5632-5647, 2025.

24. L. Ying, C. Xiong, C. Qin, X. Luo, Z. Qian and X. Zhang, Generative Collision Attack on Deep Image Hashing, IEEE Trans. on Information Forensics and Security, vol. 20, pp. 2748-2762, 2025.

25. Q. Zhou, P. Wei, Z. Qian, X. Zhang and S. Li, Improved Generative Steganography Based on Diffusion Model, IEEE Trans. on Circuits and Systems for Video Technology, vol. 35, no. 7, pp. 6494-6507, 2025.

26. Y. Wang, G. Liu, Z. Zhu, X. Zhang and Z. Qian, VivID: A Visually Improved GIF Encoding Network Design, IEEE Trans. on Circuits and Systems for Video Technology, vol. 35, no. 6, pp. 6101-6113, 2025.

27. M. Wang, S. Li, X. Zhang, G. Feng, Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions. Computer Science Review 58 (2025): 100785.

28. L. Huang, F. Li, H. Yao, C. Qin, X. Zhang, Soft integrity authentication for neural network models. Expert Systems with Applications 267 (2025): 126172.

29. Y. Zhang, C. Huang, S. Liu, L. Huang, T. Yang, X. Zhang, H. Zhou, Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain. International Journal of Network Management 35.1 (2025): e2278.

30. Y. Hao, Z. Wang, J. Cao and X. Zhang, General Steganography for Neural Network Models Based on Graph Convolutional Network, in IEEE Internet of Things Journal, vol. 12, no. 9, pp. 12512-12526, 1 May1, 2025.

31. L. Li, X. Zhang, H. Wu, G. Feng and W. Zhang, FareMark: Model-Watermark-Driven Free-Rider Detection in Federated Learning Model, in IEEE Internet of Things Journal, vol. 12, no. 18, pp. 38965-38977, 15 Sept.15, 2025.

32. L. Li, X. Zhang, G. Feng, Z. Wang, D. Wu, H. Wu, Robust watermarking for diffusion models based on STDM and latent space fine-tuning. Journal of Information Security and Applications 93 (2025): 104167.

33. Z. Tu, Z. Wang, and X. Zhang. Feature augmentation-based few-shot image steganalysis. Journal of Electronic Imaging 34.3 (2025): 033028-033028.

34. Y. Qin, X. Zhang, S. Yu, G. Feng, A survey on representation learning for multi-view data." Neural Networks 181 (2025): 106842.

35. G. He, Y. Ren, G. Li, G. Feng, X. Zhang, Private image synthesis of latent diffusion model with the ciphertext of prompt. Neural Networks (2025): 107678.

36. Y. Zeng, X. Zhang, G. Feng, "Secure reversible privacy protection for face multiple attribute editing." Pattern Recognition 166 (2025): 111662.

37. Z. Yuan, L. Li, Z. Wang, X. Zhang, Protecting copyright of stable diffusion models from ambiguity attacks. Signal Processing 227 (2025): 109722.

38. F. Li, Q. Wang, X. Zhang, C. Qin, Adaptive three-dimensional histogram modification for JPEG reversible data hiding. Signal Processing 229 (2025): 109786.

39. S. Li, X. Zhang, X. Zhang and G. Feng, Blind Embedding Rate Steganalysis Using Refocusing Learning, IEEE Signal Processing Letters, vol. 32, pp. 666-670, 2025.

40. Z. Wang, X. Zhang and X. Li, Untraceable Steganography: Towards the Anonymity of Steganographer, IEEE Signal Processing Letters, vol. 32, pp. 956-960, 2025.

41. J. Jiang, Z. Wang, G. He and X. Zhang, A Burn After Reading Data Hiding Framework, IEEE Signal Processing Letters, vol. 32, pp. 1131-1135, 2025.

42. Z. Yuan, L. Li, Z. Wang, J. Jiang and X. Zhang, Watermark Removal Attack Against Text-to-Image Generative Model Watermarking, IEEE Signal Processing Letters, vol. 32, pp. 1470-1474, 2025.

43. H. Song, Z. Wang and X. Zhang, Defending Against Adversarial Attack Through Generative Adversarial Networks, IEEE Signal Processing Letters, vol. 32, pp. 1730-1734, 2025.

44. H. Luo, L. Li and X. Zhang, A Watermark Forgery Attack Against Stable Diffusion Model Watermarking, IEEE Signal Processing Letters, vol. 32, pp. 3580-3584, 2025.

45. R. Zhao, Y. Zhang, W. Wen, X. Zhang, X. Cao, Y. Xiang, "PR3: Reversible and usability-enhanced visual privacy protection via thumbnail preservation and data hiding." IEEE Transactions on Big Data 11.1 (2024): 59-73.

46. Y. Huo, S. Xiang, X. Luo, X. Zhang, Image semantic steganography: A way to hide information in semantic communication. IEEE Transactions on Circuits and Systems for Video Technology (2024).

47. Y. Ren, Y. Li, G. Feng, X. Zhang, VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server. IEEE Transactions on Services Computing (2024).

48. Z. Yuan, X. Zhang, Z. Wang, Z. Yin, Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Systems with Applications 236 (2024): 121315.

49. M. Mo, C. Wang, Q. Guo, S. Bian, Q. Huang, X. Zhang, A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Systems with Applications 252 (2024): 124201.

50. Y. Luo, S. Li, X. Zhang, G. Feng, Controlling the performance of deep neural networks using a single parameter. Evolutionary Intelligence 17.5 (2024): 4303-4313.

51. M. Yu, Z. Tang, X. Liang, X. Zhang and X. Zhang, Perceptual Hashing With Deep and Texture Features, IEEE MultiMedia, vol. 31, no. 1, pp. 65-75, Jan.-March 2024.

52. X. Zhao, H. Wu and X. Zhang. Effective backdoor attack on graph neural networks in spectral domain. IEEE Internet of Things Journal 11.7 (2023): 12102-12114.

53. Y. Liu, L. Zhang, H. Wu, Z. Wang, X. Zhang, Reducing high-frequency artifacts for generative model watermarking via wavelet transform. IEEE Internet of Things Journal 11.10 (2024): 18503-18515.

54. Z. Yuan, L. Li, Z. Wang, X. Zhang, Watermarking for stable diffusion models. IEEE Internet of Things Journal (2024).

55. N. Zhong, Z. Qian and X. Zhang. Backdoor attack detection via prediction trustworthiness assessment. Information Sciences 662 (2024): 120283.

56. Y. Ren, M. Hu, Z. Yang, G. Feng, X. Zhang, BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Information sciences 665 (2024): 120377.

57. M. Bian, Y. Ren, G. He, G. Feng, X. Zhang, VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Information Sciences 669 (2024): 120547.

58. Y. Liu, C. Li, Z. Wang, H. Wu, X. Zhang, Transferable adversarial attack based on sensitive perturbation analysis in frequency domain. Information Sciences 678 (2024): 120971.

59. Z. Yang, Y. Zhang, X. Zhang, H. Wu, Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing, Journal of Electronic Imaging 33.2 (2024): 023006-023006.

60. H. Song, Z. Wang, and X. Zhang. Identification of the Original Images. Journal of Visual Communication and Image Representation 98 (2024): 104017.

61. Z. Ye, X. Zhang, and G. Feng. Deep neural networks watermark via universal deep hiding and metric learning. Neural Computing and Applications 36.13 (2024): 7421-7438.

62. Y. Wang, M. Liu, Y. Ren, X. Zhang, G. Feng, Traffic sign attack via pinpoint region probability estimation network, Pattern Recognition, Volume 146, 2024.

63. Z. Yuan, L. Li, Z. Wang, X. Zhang, Ambiguity attack against text-to-image diffusion model watermarking, Signal Processing, Volume 221, 2024.

64. L. Huang, Y. Tao, C. Qin and X. Zhang, Robust Hashing for Neural Network Models via Heterogeneous Graph Representation, IEEE Signal Processing Letters, vol. 31, pp. 2640-2644, 2024.

65. H. Cheng, X. Li, H. Wang, X. Zhang, X. Liu, M. Wang, DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 1, pp. 97-109, Jan. 2024.

66. F. Li, Z. Qi, X. Zhang and C. Qin, Progressive Histogram Modification for JPEG Reversible Data Hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 2, pp. 1241-1254, Feb. 2024.

67. W. Li, S. Wu, B. Li, W. Tang and X. Zhang, Payload-Independent Direct Cost Learning for Image Steganography, in IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 3, pp. 1970-1975, March 2024.

68. X. Li, G. Zhu, S. Wang, Y. Zhou and X. Zhang, Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 7, pp. 6391-6402, July 2024.

69. J. Yu, F. Li, Z. Wang, W. Si and X. Zhang, Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 8, pp. 7785-7800, Aug. 2024.

70. D. Wu, X. Zhang, J. Wang, L. Li and G. Feng, Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 10, pp. 10281-10298, Oct. 2024.

71. H. Wang, H. Yao, C. Qin and X. Zhang, When Robust Reversible Watermarking Meets Cropping Attacks, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13282-13296, Dec. 2024.

72. L. Lin, D. Wu, J. Wang, Y. Chen, X. Zhang and H. Wu, Automatic, Robust, and Blind Video Watermarking Resisting Camera Recording, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13413-13426, Dec. 2024.

73. J. Yu, J. Zhang, Z. Wang, F. Li and X. Zhang, Cover Selection in Encrypted Images, IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 12, pp. 13626-13641, Dec. 2024.

74. T. Yang, H. Wu, B. Yi, G. Feng and X. Zhang, Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 1, pp. 139-152, Jan.-Feb. 2024.

75. F. Li, Z. Yu, K. Wu, C. Qin and X. Zhang, Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 1557-1571, July-Aug. 2024.

76. X. Liang, Z. Tang, X. Zhang, M. Yu and X. Zhang, Robust Hashing With Local Tangent Space Alignment for Image Copy Detection, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2448-2460, July-Aug. 2024.

77. Y. Liu, H. Wu and X. Zhang, Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering, IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 6, pp. 5766-5780, Nov.-Dec. 2024.

78. Z. Yuan, X. Zhang, Z. Wang and Z. Yin, Semi-Fragile Neural Network Watermarking Based on Adversarial Examples, IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 8, no. 4, pp. 2775-2790, Aug. 2024.

79. F. Li, Y. Sheng, K. Wu, C. Qin and X. Zhang, LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography, IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8817-8831, 2024.

80. F. Li, H. Zhai, X. Zhang and C. Qin, Image Manipulation Localization Using Spatial–Channel Fusion Excitation and Fine-Grained Feature Enhancement, IEEE Transactions on Instrumentation and Measurement, vol. 73, pp. 1-14, 2024.

81. Y. Qin, C. Qin, X. Zhang and G. Feng, Dual Consensus Anchor Learning for Fast Multi-View Clustering, IEEE Transactions on Image Processing, vol. 33, pp. 5298-5311, 2024.

82. C. Qin, X. Li, Z. Zhang, F. Li, X. Zhang and G. Feng, Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning, IEEE Transactions on Multimedia, vol. 26, pp. 2164-2177, 2024.

83. F. Li, Y. Sheng, X. Zhang and C. Qin, iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography, IEEE Transactions on Multimedia, vol. 26, pp. 3137-3152, 2024.

84. Q. Wang, Z. Wang, X. Zhang and G. Feng, Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network, IEEE Transactions on Multimedia, vol. 26, pp. 8026-8037, 2024.

85. X. Li, Z. Wang, G. Feng, X. Zhang and C. Qin, Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments, IEEE Transactions on Multimedia, vol. 26, pp. 10041-10054, 2024.

86. F. Li, H. Zhai, T. Liu, X. Zhang and C. Qin. 2024. Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network. ACM Trans. Multimedia Comput. Commun. Appl. 20, 10, Article 315 (October 2024), 23 pages.

87. C. Yu, S. Cheng, X. Zhang, X. Zhang and Z. Tang. 2024. Reversible Data Hiding in Shared JPEG Images. ACM Trans. Multimedia Comput. Commun. Appl. 20, 12, Article 372 (December 2024), 24 pages.

88. M. Yu, Z. Tang, X. Liang, X. Zhang, Z. Li and X. Zhang. 2024. Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection. ACM Trans. Multimedia Comput. Commun. Appl. 20, 12, Article 384 (December 2024), 23 pages.

89. Z. Zhu, H. Zhou, H. Hu, Q. Jiang, Z. Qian and X. Zhang, Hide and Recognize Your Privacy Image, IEEE Trans. on Network Science and Engineering, vol. 11, no. 6, pp. 6130-6142, 2024.

90. G. He, Y. Ren, G. He, G. Feng and X. Zhang, PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack, IEEE Transactions on Services Computing, vol. 17, no. 6, pp. 4083-4096, 2024.

91. Y. Zhang, J. Zhu, M. Xue, X. Zhang and X. Cao, Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion, IEEE Trans. on Visualization and Computer Graphics, vol. 30, no. 8, pp. 5299-5312, 2024.

92. X. Hu, S. Li, Q. Ying, W. Peng, X. Zhang and Z. Qian, Establishing Robust Generative Image Steganography via Popular Stable Diffusion, IEEE Trans. on Information Forensics and Security, vol. 19, pp. 8094-8108, 2024.

93. N. Zhong, Z. Qian, X. Zhang. Backdoor attack detection via prediction trustworthiness assessment, Information Sciences, vol. 662, 120283, 2024.

94. Y. Xue, Y. Zhu, Z. Zhu, S. Li, Z. Qian and X. Zhang, Removing Watermarks for Image Processing Networks Via Referenced Subspace Attention, The Computer Journal, vol. 67, issue 2, pp. 498–507, 2024.

95. Q. Wang, S. Li, Z. Wang, X. Zhang and G. Feng, Multi-source Style Transfer via Style Disentanglement Network, IEEE Trans. on Multimedia, vol. 26, pp. 1373-1383, 2024.

96. S. Li, Z. Wang, X. Zhang and X. Zhang, Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery, IEEE Trans. on Dependable and Secure Computing, 21(1), pp. 340-352, 2024.

荣誉奖励

张新鹏,沈礼权,冯国瑞,钱振兴,多媒体数据保护的理论与方法,上海市自然科学奖,一等奖,2022

上一条:朱频频

下一条:余航

上海大学

地址:上海市宝山区上大路99号

邮编:200444 电话查询

技术支持:上海大学信息化工作办公室 联系我们

微信公众号

版权所有 ©上海大学 沪ICP备09014157  沪公网安备31009102000049号