![]()
|
Henan Province Distinguished Professor, Ph.D. Advisor Director, Henan International Joint Laboratory of Cyberspace Security Applications Vice-Dean, College of Information Engineering Chair, IEEE MMTC DRMIG Founder, SHARETECHES 509 (Office), No. 2 Gongke Building, Henan University of Science and Technology 263 Kaiyuan Ave, Luolong District, Luoyang 471023, Henan, P. R. of China E-mail: xidianzzy@126.com; Homepage: sigdrm.org/csa/director.htm; ORCID: 0000-0003-3061-7768; ResearchID: AAG-3281-2021
|
Latest
News
![]() |
[SocialMetaData,
January 2021] Experimental Research Platform of Social Situational Meta
Data is online! Seeing details at
sigdrm.org/socialmetadata
|
|
[Special Issue, February 2020] Special Issue on “AI-Enabled and Human-Centric Computing for Online Social Networks Security, Privacy and Trust”, Journal of Information Processing Systems (ISSN: 1976-913X (Print), ISSN: 2092-805X (Online)) [Call for Papers] |
[Biographical Sketch] [Research Areas] [Curriculums] [Monographs] [Funds & Projects]
[Papers, Editorials, Reports] [Standards, Patents & Software Copyrights] [Prototypes & Demos]
[EB,
GE/TPC]
[Call
For
Papers/Book
Chapters]
[Readings
& Resources] [Miscellaneous]
[CSA Lab/Research Group] [My Office @ HAUST] [Recruitment]
[Director] Dr.
Zhiyong ZHANG, born in
1975 October, earned his Bachelor, Master and Ph. D. degrees in
Computer Science at Henan Normal University, Dalian University of Technology and Xidian
University, P. R. of China, respectively. Nowadays, he is a full-time Henan
Province Distinguished Professor,
Ph. D. Advisor,
Director of Henan International Joint Laboratory of Cyberspace
Security Applications (formerly Special
Interests
Group on Digital
Rights Management, SIGDRM
for short), as well as
Vice-Dean of College of Information Engineering,
Henan University of Science and Technology, P. R. China.
In 2010-2013, Zhang have ever conducted interdisciplinary
post-doctoral studies on social media and Digital Rights Management (DRM) at School of Management,
Xi'an Jiaotong University, P. R.
China. In 2015-2016, he, as visiting professor, joined
Software Engineering Laboratory/Research Group
chaired by
Professor Carl
K. Chang (IEEE CS
President Emeritus, IEEE
Life Fellow/AAAS Fellow),
and focused on Situational Analytics and social computing, as well as prototype
development at
Department of Computer Science,
Iowa State University, USA.
He is IEEE/ACM Senior Member, and also
Founder of
SHARETECHES
(formerly CyVOD established in 2015 May).
[Research Contributions]
Recent decade, Zhang made intensive efforts to pursue cutting-edge researches on computer science, plus cross-disciplinary studies on both information technology and information management. His research interests primarily include cyberspace security and frontier computing, social computing and social intelligence, social IOT and cyber-physical systems security, block chain technology for multimedia security, as well as multimedia cloud computing/edge computing technology. He took the lead in investigating the challenging issues of security, trust and risk in digital rights management ecosystem mainly for multimedia, further extending the studies oriented towards the emerging social media and social networks. And then, a novel research idea of the convergences of both "hard security" and "soft computing" was proposed in order to realize the ecosystem-level multimedia content security schemes. Especifically, he have ever proposed the social-situation analytics technology (SocialSitu) and recommender, trust model for multimedia social networks, together with security-utility analysis and game-theoretical method for DRM policies, and is now fully engaged in doing in-depth research on that. He has developed VOD (Voice of Dream) series multimedia security prototype and software productions for consumer electronics like PC, Mobile and Pad, as well as deployed a trinity multimedia social network platform. As of today, in the filed of DRM engineering and applications, Zhang owns 35 papers indexed by Ei Compendex™ database especially regarding the keywords like "Digital Rights Management or DRM", as ranked as the second in the world.
[Research Works]
For years,
Zhang has been Principal
Investigator of Chinese leading funded projects sponsored by
National Natural Science Fund of China,
China Postdoctoral Science Foundation,
Chinese Ministry of Education Key Science & Technology
Program, as well as Program for Innovative Research Team (in
Science and Technology) in University of Henan Province,
Plan For
Scientific Innovation Talent of Henan Province, Program for Science & Technology Innovation
Talents in Universities of Henan Province, and Henan Province
Key Technologies R & D Program. In recent years, he has
published above 120 selected papers on the well-known academic international
journals and conferences sponsored by IEEE, ACM and IFIP,
including
[Academic
Services] Zhang is
IEEE Senior Member (M'06, S'11),
ACM
Senior Member (M'08, S'13),
China Computer Federation
Senior Member
(M'04, S'08)
[Social
Services] Prof.
Zhang was honored as
Member Luoyang Municipal
Standing Committee of CPPCC in
2018 September, is now playing an active role in planning and drafting strategic progress in
science and technology, promoting and stimulating high-technologies industry, as
well as advancing and refining culture and society management. He has ever
submitted a number of proposals for local governments in recent decade.
Specifically speaking, his suggestions and oral reports, in
the field of IT industries, primarily and comprehensively embrace all kinds of
software industry, robotic industry, digital content industry, and information
security and management. Welcome your visiting to his homepage. ©
Seeing details in [Full
CV, PDF, 215K]
(Updated in 2021 January)
140+ Publications · 6 Books · 12 Patents · 8 Standards · 10+ Awards · 40+ Postgraduates
Portfolio of
Highlighted
Papers &
Books
![]() |
张志勇*,荆军昌,李斐,赵长伟. 人工智能视角下的在线社交网络虚假信息检测、传播与控制研究综述[J]. 计算机学报,2020. (Online) |
|
Z. Zhang*, R. Sun, X. Wang, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks. IEEE Transactions on Big Data, 2019, 5(4): 520-528. [PDF] |
|
Z. Zhang*, R. Sun, K. R. Choo, et al. A Novel Situation-Analytics Based Recommendation Algorithm for Multimedia Social Networks. IEEE Access, 2019, (7): 117749-117760. [PDF] |
|
P. Shi, Z. Zhang*, Kim-Kwang Raymond Choo. Detecting Malicious Social Bots Based on Clickstream Sequences [J]. IEEE Access, 2019, 7(1): 28855-28862. [PDF] |
|
Z. Zhang*, B. B. Gupta. Social Media Security and Trustworthiness: Overview and New Direction. Future Generation Computer Systems, 2018, 86: 914-925. [PDF] |
|
Z. Zhang*, K. R. Choo, A. K. Sangaiah, et al. Crowd Computing for Social Media Ecosystems. Applied Soft Computing, 2018, 66: 492-494. [PDF] |
|
Z. Zhang*, J. Wen, X. Wang, et al. A Novel Crowd Evaluation Method for Security and Trustworthiness of Online Social Networks Platforms Based on Signaling Theory. Journal of Computational Science, 2018, 26: 468-477. [PDF] |
|
A. K. Sangaiah, M. Sheng, Z. Zhang. Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier, 2018. (ISBN: 978-0-12-813314-9) [Html] |
|
Z. Zhang*, R. Sun, C. Zhao, C. K. Chang, B. B. Gupta. CyVOD: A Novel Trinity Multimedia Social Network Scheme. Multimedia Tools and Applications, 2017, 76(18): 18513–18529. [PDF] |
|
W. Feng, Z. Zhang*, J. Wang, L. Han. A Novel Authorization Delegation Scheme for Multimedia Social Networks by using Proxy Re-encryption. Multimedia Tools and Applications, 2016, 75(21): 13995-14014. [PDF] |
|
Z. Zhang*, K. Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. The Computer Journal, 2015, 58 (4): 668-678. [PDF] |
|
Z. Zhang*, Z. Wang, D. Niu. A Novel Approach to Rights Sharing-Enabling Digital Rights Management for Mobile Multimedia. Multimedia Tools and Applications, 2015, 74 (16): 6255-6271. [PDF] |
|
Z. Zhang, K. Fan, F. Xiang (Translators), Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, et al. Cyber Security Policy Guidebook. Beijing: National Defense Industry Press, 2014, 11. (ISBN 978-7-118-09824-2, Chinese Edition) |
|
Z. Zhang*, K. Wang. A Trust Model for Multimedia Social Networks. Social Networks Analysis and Mining, 2013, 3(4): 969-979. [PDF] |
|
Z. Zhang. Security, Trust and Risk in Digital Rights Management Ecosystem. Beijing: Science Press, 2012. (ISBN 978-7-03-034335-2, in English) |
|
Z. Zhang. Risk Assessment and Management. USA: Academy Publish, 2012. (ISBN 978-0-9835850-0-8) |
(Updated in 2020 January)
Research Aeras
(Presently)
[Back]
![]() |
Cyberspeace security and frontier computing |
![]() |
Big data-driven social computing and social intelligence |
|
Social IOT and cyber-physical systems security |
|
Block chain technology for multimedia security |
|
Multimedia cloud computing/edge computing technology |
![]() |
Interdisciplinary study on both information technology and information management |
![]() |
Introduction to Computer
Science (Freshman Course, Fall, Since 2011) It mainly Introduces the professional foundation and core knowledge of computer science and technology , but not expanding or deepening the technical details of knowledge, emphasizing basic concepts rather than mathematical models. Educational Materials: Chen M. Introduction to Computer (The first edition) [M]. Beijing: Tsinghua University Press, 2010. References: 1. Behrouz A. Forouzan, Firouz Mosharraf, Liu Yi, Zhai Gaofeng, etc. (Translator). Introduction to Computer Science (The second edition) [M], Beijing : Mechanical Industry Press, 2009. Note: No requiring prerequisite knowledge of computer science, programming or mathematics. |
![]() |
Trusted Computing Technology (M050812008, Postgraduate Course, Spring, Since
2010) It mainly introduces the architecture of Digital Rights Management (DRM) technology, the latest research progress, related Cryptography protection technology, DRM usage control and digital watermarking technology, international standards of OMA DRM and terminology standards of Chinese DRM etc ,and finally presents a self-developed DRM prototype system in detail. References: important academic journals published at home and abroad nearly three years, having an impact on the international academic conference on papers, as well as the international standards, technical specifications, technical reports, etc. 1. Challener D. Zhao Bo (Translator). Trusted Computing [M]. Beijing: China Machine Press, 2009. 2. TCG Trusted Computing Technologies Specifications [D]. USA: Trusted Computing Group, 2003. Note: Prerequisite for “Information Security Technology”, "Computer Network", etc. |
|
Digital Rights Management Technology (M050812011, Postgraduate Course, Spring, Since
2016)
1. Z. Zhang, Fan Kefeng. Digital Rights Management and Security Technology
[M]. Beijing: National Defense Industry Press, 2013. |
|
Seminar on the State-of-the-Art of Computer (Postgraduate
Course, Spring / Fall, Since 2010) |
|
Information Security Technologies
(Postgraduate Course, Spring, 2004-2006, 2010;Senior Course,
Fall, 2009-2010) |
|
Design of Unix Operating System
(Senior Course, Fall, 2004-2006) |
|
Advanced Operating System
(Postgraduate Degree Course, Fall, 2004-2005) |
|
Principle Of Operating System
(Junior Course, Spring, 2003-2006) |
Research Funds &
Projects [Back]
![]() |
Research on Crowd Evaluation Method for Security and Trustworthiness of Social Media Platforms Based on Signaling Theory and Crowdsourcing, sponsored by National Natural Science Foundation of China Grant No.61772174, PI, 2018.1-2018.12. |
![]() |
Digital media content security and copyrights protection in cloud media social networks, sponsored by National Natural Science Foundation of China Grant No.61370220, PI, 2014.1-2017.12. |
![]() |
Research and development on multimedia social networks based on situation analytics, sponsored by Plan For Scientific Innovation Talent of Henan Province Grant No.2017JR0011, PI, 2017.1-2018.12. |
![]() |
Multimedia Content Security, sponsored by Program for Innovative Research Team (in Science and Technology) in University of Henan Province Grant No.15IRTSTHN010, PI, 2015.1-2017.12. |
![]() |
Research and Development of Multimedia Social Networks Key Security Technologies, Henan University of Science and Technology Landmark Achievement Cultivation Fund Grant No. No.2015BZCG01, PI, 2015.9-2018.8. |
![]() |
Digital copyright protection technology research and development for cloud media social networking, sponsored by Plan For Scientific Innovation Talent of Henan Province Grant No.134100510006, PI, 2013.1-2015.12. |
![]() |
Digital rights spread of the small-world network modeling and risk control for DRM, sponsored by the National Natural Science Foundation of China Grant No.61003234, PI, 2011.1-2013.12. |
![]() |
An empirical research on the e-book e-commerce users safe behavior and digital rights management implementation, sponsored by The 47th China Postdoctoral Science Fund Grant No.20100471611, PI, 2010.6-2013.12. |
![]() |
Research on the trusted digital home network and its copyright protection mechanisms, sponsored by Program for Science & Technology Innovation Talents in Universities of Henan Province Grant No.2011HASTIT015, PI, 2011.1-2012.12. |
![]() |
Multimedia audio and video digital copyright protection system research and development, sponsored by Henan Province Key Technologies R & D Program Grant No.102102210556, PI, 2011. |
![]() |
Multi-Party trust research based on security policies game control for DRM, sponsored by the National Natural Science Foundation Grant No.60803150, 2011. |
![]() |
Research on the usage control system for digital content trusted authorize, sponsored by Henan Province Key Technologies R & D Program Grant No. 092102210295, PI, 2011. |
![]() |
Delegation authorization and access control technology research in computer sponsored cooperative work, sponsored by Henan Province Key Technologies R & D Program Grant No.092102210413, PI, 2010. |
![]() |
XXX software development, sponsored by the China Aviation Industry Institute 613, PI, 2012. |
![]() |
Research on key technology of mobile terminals trusted access, responsible for researching on trusted measurement method, 2012. |
![]() |
Research on image fusion system based on the multi-scale geometric analysis, sponsored by Henan Province Key Technologies R&D Program Grant No.082102240115, responsible for systems analysis, 2010. |
![]() |
Research on the standardization roadmap of digital rights management and “Information Technology Digital Rights Management Terminology", sponsored by The National Standardization Management Committee Grant No.20080200-T-339, Core Drafter, 2008.5-2013.12. |
![]() |
Visual object encoding mechanisms of the human brain, sponsored by The National Natural Science Fund project No.61003234, responsible for system platform design, 2006. |
![]() |
Embedded network interface based on middleware technology, sponsored by Project sponsored by the major science and technology of Ministry of Education, No.03081, responsible for overall design, 2006. |
![]() |
Research on information retrieval model and processing mechanism based on agent, sponsored by Project sponsored by Natural science basic research of Henan Province Grant No.200410464004, responsible for system design, 2006. |
![]() |
Flood control command and decision support system of Heilongjiang Province, responsible for the design and implementation of database security engineering, 2002-2003. |
![]() |
The database security management system based on Oracle metadata (DBSMS), responsible for the overall design and research, 2002-2003. |
![]() |
[Zhang,
2020b]
L. Zhang, Z.
Zhang*,
T. Zhao, et al. A Novel Access Control Model
for Online Social Networks and Its Visual Verification [J]. International Journal of
Cloud Applications and Computing (IGI Global),
2020. (Accepted)
[Zhang,
2020a] Z. Zhang*, J. Jing, K. R. Raymond Choo, et al. A
Crowdsourcing Method for Online Social Networks Security
Assessment [J].
Human-centric Computing and Information Sciences,
10, 23 (2020). DOI: 10.1186/s13673-020-00230-0. (SCI, EI) [PDF]
[Zhang,
2019a] Z. Zhang*, R. Sun, X. Wang, et
al. A Situational Analytic Method for User Behavior
Pattern in Multimedia Social Networks [J]. IEEE
Transactions on Big Data,
2019, 5(4): 520-528.
[PDF]
[Wang, 2019] J. Wang,
K. Qiao, Z. Zhang. An
improvement for combination rule in evidence theory [J]. Future
Generation Computer Systems, 2019, 91: 1-9. (SCI 000451790900001, EI 20183705794717)
[PDF]
[Zhang, 2019b] C. Li,
Z. Zhang, G. Chang. Multimedia Social Network Authorization Scheme
of Comparison-based Encryption [J]. International Journal of Network
Security, 2019, 21(1): 137-144. (EI 20190306396578)
[PDF]
[Shi, 2019]
P. Shi, Z.
Zhang*, K. R. Raymond Choo.
Detecting Malicious Social Bots Based on Clickstream
Sequences [J]. IEEE Access, 2019, 7(1):
28855-28862.
(SCI
000462957000001, EI
20191706836075)
[PDF]
[Zhang, 2019c] Z. Zhang*, R.
Sun, K. R. Choo, et al. A Novel Situation-Analytics Based
Recommendation Algorithm for Multimedia Social Networks [J]. IEEE
Access, 2019, (7): 117749-117760. (SCI 000484313600003)
[PDF]
[Li,
2019a] Y. Li, Z. Zhang, L. Zhang, et al. ProCTA: program
characteristic‑based thread partition approach [J]. The Journal of
Supercomputing, 2019, 75:7366–7390. [PDF]
[Jin,
2019] Z. Jin, Z. Wan, Z. Zhang. Strictly contractive
Peaceman–Rachford splitting method to recover the corrupted low rank
matrix [J]. Journal of Inequalities and Applications (2019)
2019:147. [PDF]
[Zhang, 2018a] Z. Zhang*,
K. R. Choo, A. K. Sangaiah, et al. Crowd Computing for Social Media
Ecosystems [J]. Applied Soft Computing, 2018, 66: 492-494. (SCI
000430162100036, EI 20180904850508)
[PDF]
[Zhang, 2018b] Z. Zhang*,
B. B. Gupta. Social Media Security and Trustworthiness: Overview and
New Direction [J]. Future Generation Computer Systems [J], 2018, 86:
914-925. (SCI
000437555800079, EI 20165103145490)
[PDF]
[Zhang, 2018c] Z. Zhang*,
J. Wen, X. Wang, et al. A Novel Crowd Evaluation Method for
Security
and Trustworthiness of Online Social Networks Platforms
Based on Signaling Theory[J]. Journal of Computational Science, 2018, 26:
468-477. (SCI 000438001600046, EI 20172203719496)
[PDF]
[Zhang, 2018d] Z. Zhang*,
K. Raymond Choo, B. B. Gupta, et al. The Convergence of New
Computing Paradigms and Big Data Analytics Methodologies for Online
Social Networks [J]. Journal of Computational Science, 2018, 26:
453-455. (SCI
000438001600044, EI
20181605014667)
[PDF]
[Zhang, 2018e] Z. Zhang*,
C. Li, B. B. Gupta, et al. Efficient Compressed Ciphertext Length
Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes [J]. IEEE
Access, 2018, 6(1):
38273-38284. (SCI 000440342700001, EI 20182905554496)
[PDF]
[Tu, 2018] Z. Tu, X. Zeng, Z. Zhang.
More permutation polynomials with differential uniformity
six [J]. Science China Information Science, 2018, 61(3),
038104:1-038104:3. DOI: 10.1007/s11432-017-9118-5. (SCI
000417486900014, EI 20173604124155)
[PDF]
[Gupta, 2018a] Brij B. Gupta, A. K. Sangaiah, N.
Nedjah, S. Yamaguchi, Z. Zhang. Recent research in
computational intelligence paradigms into security and
privacy for online social networks (OSNs) [J]. Future Generation
Computer Systems, 2018, 86: 851–854. (SCI 000437555800073, EI
20182505321805)
[PDF]
[Gupta, 2018b] Brij B. Gupta,
Shingo Yamaguchi, Z. Zhang, Kostas E. Psannis. Security and
Privacy of Multimedia Big Data in the Critical Infrastructure [J].
Multimedia Tools and Applications, 2018, 77(9): 10995-10995. (SCI
000431889900036, EI 20182505344912)
[Li, 2018a] C. Li, Z. Zhang*, L. Zhang,
et al. A novel authorization scheme for multimedia social networks
under cloud storage method by using MA-CP-ABE [J]. International
Journal of Cloud Applications and Computing (Taylor & Francis),
2018, 8(3): 32-47.
[Zhang, 2017b] Z. Zhang*,
R. Sun, C. Zhao, et al. CyVOD: A Novel
Trinity Multimedia Social Network Scheme [J]. Multimedia Tools
and Applications,
2017, 76(18): 18513–18529. DOI 10.1007/s11042-016-4162-z
(SCI 000407861800017, EI 20164803071103)
[PDF]
[Zhang, 2017c] Z. Zhang*, K. R. Choo. Multimedia Social Network
Security and Applications [J]. Multimedia Tools and
Applications,
2017, 76(3): 3163-3168. DOI 10.1007/s11042-016-4081-z
(SCI
000396051200001, EI 20165003108429)
[PDF]
[Sangaiah, 2017] A. K. Sangaiah, N. Nedjahb,
Z. Zhang*. Recent Trends in Embedded
Technologies and Wearable Systems: Computational
Intelligence Solutions [J]. Computers & Electrical
Engineering, 2017, 61: 235-237. (SCI 000407981800019, EI
20173104004299)
[PDF]
[Wang, 2017] J. Wang, K. Qiao,
Z. Zhang, et al. A new conflict management method in
dempster-shafer theory [J]. International Journal of
Distributed Sensor Networks, 2017, 13(3). (SCI
000400351500001, EI 20171803628070) [PDF]
[Zhang, 2016a] W. Feng, Z. Zhang*,
J. Wang, L. Han. A Novel Authorization Delegation
Scheme for Multimedia Social Networks by using Proxy
Re-encryption [J]. Multimedia Tools and Applications
(Springer), 2016, 75(21): 13995-14014. (SCI
000386776800052, EI 20153701254312) [PDF]
[Zhang,
2016b] Z. Zhang*,
A. K. Sangaiah. Applied Soft Computing for Online Social
Networks [J]. Neural Network World, 2016, (6): 539-541. (SCI
000392283000002) [PDF]
[Zhang,
2016c] Z. Zhang*, L. Han, C. Li, et al. A
Novel Attribute-Based Access Control Model for Multimedia Social
Networks [J]. Neural Network World, 2016, (6): 543-557. (SCI
000399394400001) [PDF]
[Li,
2017a] L. Li, K. Fan, Z. Zhang, et al.
Community Detection Algorithm Based on Local Expansion K-Means [J].
Neural Network World, 2016, 26(6): 589-605. (SCI 000392283000005)
[PDF]
[Du, 2016] J. Du, Z. Zhang,
Analysis on the digging of social network based on user
search behavior, International Journal of Smart Home,
2016, 10(5): 297-304. (EI 20162602535286)
[PDF]
[Zhang, 2015d]
Z. Zhang*.
The Challenge of Multimedia Social Networks and Security [J].
Recent Advances in Electrical & Electronic Engineering, 2015,
8(2): 72-73. (EI 20153901314334)
[PDF]
[Chang, 2015] Y. Chang, Z. Zhang*,
Wang Jian. A Security Protocol for Trusted Access
to Cloud Environment [J].
Recent Advances in Electrical & Electronic Engineering,
2015, 8(2): 135-144. (EI 20162902597361)
[PDF]
[Zhang, 2015c]
Z. Zhang*. Security, Trust and Risk in
Multimedia Social Networks (Editorial).
The Computer Journal, 2015, 58 (4): 515-517. DOI:10.1093/comjnl/bxu151.
(SCI 000359137500001, EI 20151500736718)
[PDF]
[Zhang, 2015a]
Z. Zhang*, Z. Wang, D. Niu. A Novel Approach to Rights
Sharing-Enabling Digital Rights Management for Mobile Multimedia
[J]. Multimedia Tools and Applications (Springer), 2015,
74 (16): 6255-6271. DOI: 10.1007/s11042-014-2135-7. (SCI
000359864700009, EI 20143600007178)
[PDF]
[Zhang, 2015b]
Z. Zhang*, K. Wang. A Formal Analytic Approach to Credible
Potential Path and Mining Algorithms for Multimedia Social
Networks [J]. The Computer Journal, 2015, 58 (4): 668-678. DOI:10.1093/comjnl/bxu035. (SCI
000359137500011, EI 20151500736707)
[PDF]
[Wang, 2014a] J. Wang*, Z. Zhang*, F. Xiang,
et al. Trusted License Distribution System Based on IPSEC VPN
for Mobile DRM [J]. Open Electrical and Electronic Engineering
Journal, 2014, 8(1): 34-41. (EI 20152801023852)
[PDF]
[Chen, 2014] Q. Chen, Z. Zhang*, F. Xiang, et al. Research on Access
Control Model for Multimedia Social Networks [J]. Journal of Xidian University, 2014, 41(6): 181-187. (EI 20145200360046)
[PDF]
(in Chinese)
[Wang, 2014b] Z. Wang, Z. Zhang*, Y. Chang. Multimedia DRM
System for Android Platforms [J]. Computer Science, 2014, 41(5):
129-132, 142 . [PDF]
(in Chinese)
[Zhang,
2013a] Z. Zhang*,
K. Wang. A Trust
Model for Multimedia Social Networks [J]. Social Networks
Analysis and Mining (Springer), 2013, 3(4): 969-979. DOI:
10.1007/s13278-012-0078-4. [PDF]
[Zhang, 2013a] Z. Zhang*.
Syncretic DRM: Advance on Digital Rights Management [J]. Network
Security Technology and Application, 2013(10): 96-97+100. [PDF]
(in Chinese)
[Huang, 2013]
T. Huang*, Z. Zhang*, Q. Chen, et al. A Method for Trusted
Usage Control over Digital Content Based on Cloud Computing [J].
International Journal of Digital Content Technology & Its
Applications, Vol.7, No.4, pp.795-802, 2013.
[PDF]
[Wang, 2013a] J. Wang, Z. Zhang*,
L. Yang. A DRM System Sponsored by Trusted Computing and its
Secure Protocol Research [J] .Computer Science, 40(6): 103-107. [PDF]
[Zhang, 2012a] Z. Zhang*.
Frontier
and Methodologies on Digital Rights Management for Multimedia
Social Networks [J]. International Journal of Digital Content
Technology & Its Applications, Vol.6, No.9, pp.245-249, 2012.
(EI 20122415113619) [PDF]
[Yang, 2012a]
L. Yang, Z. Zhang*, J. Pu. Rough Set and Trust
Assessment-based Potential Paths Analysis and Mining for
Multimedia Social Networks [J]. International Journal of Digital
Content Technology & Its Applications, Vol.6, No.22, pp.
640-647, 2012. (EI 20125215835371)
[PDF]
[Zhang, 2012b] Z. Zhang*, M. Maheswaran. Multimedia Contents Security
in Social Networks Applications (Editorial). Journal of Multimedia, 2012,
7(4): 1-2. [PDF]
[Zhang, 2012c]
Z. Zhang*, L. Yang, T. Huang. Research on Secure
Distributions for Digital Content in Multimedia Social Networks
[J]. Computer Science, 2012, 39(4): 94-97.
[PDF]
(in Chinese)
[Zhang, 2011a] Z. Zhang*, Q. Pei, L. Yang,
et al. Game-Theoretic
Analyses and Simulations of Adoptions of Security Policies for
DRM in Content Sharing Scenario [J]. Intelligent Automation and
Soft Computing, Vol. 17, No.2, pp.191-203, 2011. (SCI 000288881400007)
[PDF]
[Zhang,
2011b] Z. Zhang*. Digital Rights
Management Ecosystem and its Usage Controls: A Survey
[J]. International Journal of Digital Content Technology
& Its Applications, Vol.5, No.3, pp.255-272,
2011. (EI 20112214020460)
[PDF]
[Html]
[Zhang, 2011c]
Z. Zhang*, T. Huang, D. Niu, et al.
Usage Control Model for Digital Rights Management in Digital
Home Networks [J]. Journal of Multimedia,
Vol.6, No.4, pp.376-383, 2011. (EI
20113414261239)
[PDF]
[Html]
[Zhang, 2011d]
Z. Zhang*. Digital Rights Management Ecosystem: Open Issues and
Challenges [J]. International Journal of Digital Content
Technology & Its Applications, Vol.5, No.11,
pp.290-296, 2011. (EI
20114814568290) [PDF]
[Niu, 2011] D. Niu, Z. Zhang,
S. Wang, et al. A Novel Approach to Digital Content
Sharing for Digital Home Network
[J]. International Journal of Digital Content Technology & Its
Applications, Vol.5, No.11, pp.324-333, 2011.
(EI
20114814568294)
[PDF]
[Zhang, 2011] L. Zhang, Z. Zhang,
D. Niu, et al. A Novel DRM Security Scheme and its Prototype
System Implementation[J].
International Journal of Digital Content Technology & Its
Applications, Vol.5, No.11, pp.334-342, 2011.
(EI
20114814568295)
[PDF]
[Tang, 2011]
G. Tang, Z. Liu, Z. Zhang,
et al. Blind watermarking algorithm based on
wavelet-transform and fractal
self-similarity[J]. International Journal of Digital Content
Technology & Its Applications, Vol.5, No.11,
pp.402-410, 2011.
(EI 20114814568302)
[PDF]
[Zhang, 2011e]
Z. Zhang*, D. Niu. Advances on Digital Rights Usage
Control in Digital Rights Management [J]. Computer Science, 2011, 38(4): 48-54.
[PDF] (in
Chinese)
[Zhang, 2010d] Z. Zhang*, T. Huang,
Q. Wu, et al. A CSCW-Enabling
Integrated Access Control Model and its Application [J].
Advanced Materials Research, Vol.108-111, pp.426-435, 2010. (EI
20102713054574, ISTP 000282765400074)
[PDF]
[Html]
[Zhang, 2010c]
Z. Zhang*, X. Liu, J. Pu. Utility-Analytic Approach and
Swarm Simulations of Security Policies in Digital Rights
Management [J]. Journal of Multimedia, Vol.5, No.5, pp.417-426,
2010. (EI 20104613391495)
[PDF]
[Html]
[Zhang, 2010a] Z. Zhang*, S. Lian,
Q. Pei, et al. Fuzzy Risk
Assessments on Security Policies for Digital Rights Management
[J]. Neural Network World, Vol. 20, No.3, pp.265-284, 2010. (SCI
000280426100002, EI 20103213125917)
[PDF]
[Html]
[Zhang,
2009a] Z. Zhang*, Q. Pei, L. Yang, et al. Security and Trust of Digital
Rights Management: A Survey [J]. International Journal of
Network Security, 2009, 9(3): 247-263. (EI
20131316154339)
[PDF]
[Zhang, 2009c] Z. Zhang*, Q. Pei, L. Yang,
et al. Establishing Multi-Party Trust
Architecture for DRM by Using Game-Theoretic Analysis of
Security Policies [J] Chinese Journal of Electronics, 2009,
18(3): 519-524. (SCI
000268110500027, EI
20093612286410)
[PDF]
[Zhang, 2009d]
Z. Zhang*, Q.
Pei, L. Yang, et al. Attestation Proxy Party-Sponsored Remote Attestation
Model and Its Secure Protocol [J]. Journal of Xidian University, 2009, 36(1):
58-63+105. (EI 20091211966375)
[PDF]
(in Chinese)
[Zhang, 2009e]
Z. Zhang*, Q. Pei, L. Yang Delegation Authorization Model for
Trust Management and its Application in Peer-to-Peer Security
[J]. Computer Science, 2009, 36(10): 72-76.
[PDF] (in
Chinese)
[Zhang, 2009g] Z. Zhang*, C. Ye, K. Fan, et
al. Fuzzy Analytic Hierarchy Process-Based Utilities Evaluation
and Adoption for DRM Security Policies [J]. Journal on
Communications, 2009, 30(10A): 126-131.(EI 20102913085578)
[PDF] (in Chinese)
[Zhang, 2008a]
Z. Zhang*, L. Yang,
J. Ma, et al. CSCW System Access Control Based on Trusted
Computing [J]. Journal of Huazhong University of Science and
Technology (Natural Science Edition), 2008, 36(1):59-62. (EI
081511196576)
[PDF]
[Zhang, 2008e] Z. Zhang*, T. Huang. Research Advances on Role-Based Delegation
Authorization in Trust Management [J]. Application Research of
Computers, 2008,
25(6):1601-1605+1610.
[PDF] (in
Chinese)
[Zhang, 2007b]
Z. Zhang*,
L. Yang, J. Ma, et al. Access Control Model for CSCW
System and Implementation Based on Trusted Computing Technology
[J]. Computer Science,
2007, 34(9):117-121+124.
[PDF]
(in Chinese)
[Zhang, 2006a] Z. Zhang*,
J. Pu.
Research and Application of Delegation in PMI System [J].
Computer Engineering,
2006, 32(5): 152-154.(EI
06169831777)
[PDF]
(in Chinese)
[Zhang, 2006b] Z. Zhang*,
J. Pu.
Delegation Model for Heterogeneous Distributed CSCW and Its
Access Control [J]. Computer Engineering,
2006, 32(12): 71-73.
(EI
06289997153)
[PDF]
(in Chinese)
[Zhang, 2006c]
Z. Zhang*, J. Pu, T. Huang. UCOND: Research on Usage Control Delegation
Model and Key Technology [J]. Network Security Technology and
Application, 2006, 6: 42-44.
[PDF] (in Chinese)
[Zhang, 2005b] Z. Zhang*, J. Pu. Application of RBAC Policy in CORBA Distributed Object
System Security [J]. Computer Engineering, 2005, 31(20):
159-161.
[PDF] (in Chinese)
[Zhang, 2005a] Z. Zhang*, J. Pu, C. Feng. Multi-Agent System Management Model
based on Role and Collaboration and Application [J]. Computer
Applications and Software, 2005, 22(9): 107-109.
[PDF] (in Chinese)
[Zhang, 2004a] Z. Zhang*.
Role-Based Access Control and Object-Oriented Modeling [J].
Computer Engineering and Design, 2004, 25(8): 1367-1369+1374.
[PDF] (in Chinese)
[Wang, 2003]
X. Wang, N. Yang, Z. Zhang*. A Scheme Based on RBAC of Database Secure
Access Control Designing and Realizing [J]. Application Research
of Computers, 2003(3): 87-88+107. [PDF] (in
Chinese)
[Zhang, 2002]
S. Zhang,
X. Wang, Z. Zhang. Research on JDBC-based Accessing
Heterogeneous Distributed Database [J]. Computer Engineering,
2002, 28(12): 273-275.
[PDF] (in Chinese) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
|
![]() |
A. K. Sangaiah, M. Sheng, Z. Zhang. Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier, 2018. (ISBN: 978-0-12-813314-9) [Html]![]()
Brief
Introduction: Computational Intelligence for Multimedia Big Data on
the Cloud with Engineering Applications covers timely topics, including
the neural network (NN), particle swarm optimization (PSO), evolutionary
algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore,
the book highlights recent research on representative techniques to
elaborate how a data-centric system formed a powerful platform for the
processing of cloud hosted multimedia big data and how it could be
analyzed, processed and characterized by CI. The book also provides a
view on how techniques in CI can offer solutions in modeling,
relationship pattern recognition, clustering and other problems in
bioengineering. Researchers and PhD who want to understand and explore the application of computational intelligence aspects for design and development of data centric system in the context of multi-media cloud, big data era and its related applications such as smarter health care, homeland security, bio engineering systems, robotics and intelligent assistance etc. |
![]() |
Z. Zhang, C. Zhao, J. Wang. Social Media Networks Security Theory and Technology [M]. Beijing: Science Press, 2016. (ISBN 978-7-03-048711-7) [Html] Brief Introduction: In recent years, social media networks security not only is the research focus of the multidisciplinary field including information technology, information management and social science and so on, but also is a challenging open issue that the interdisciplinary sciences are facing with. This book comprehensively discusses the latest efforts in the research of social media network security related theories, technologies and methods, and presents the CyVOD, a prototype system of self-developed multimedia social network prototype system. The book is divided into five parts: the first part is the basic of social media networks; the second part presents the trust assessment issue on social media user; the third part, the secure dissemination and risk management in social media networks; the following part, the access control, delegation authorization and security policies' game-theory for multimedia social networks; the last part, the prototype system of multimedia social network and future research prospects. The monograph also covers the following main works:
[1] Z. Zhang, B. B.
Gupta. Social Media Trustworthiness and Security: Overview and New Direction.
Future Generation Computer Systems, 2016. DOI: 10.1016/j.future.2016.10.007 |
![]() |
Z. Zhang. Security, Trust and Risk in Digital Rights Management Ecosystem [M]. Beijing: Science Press, 2012. (ISBN 978-7-03-034335-2) [Html]
Up to now,
Digital Rights Management (DRM) has been still a burning and challenging
research topic since 1990s. In digital world and the DRM-enabling
digital content value chain, various stakeholders don’t fully trust one
another due to their own rights and benefits, thus leading to a fact
that the security techniques become the basis of multi-participant
trust. Existing security technology-related works primarily focus on
content protections and secure disseminations by using cryptographic
algorithms and secure protocols, trusted and controlled usages of
copyrighted digital assets at the general-purpose or special-purpose
user terminal devices, together with watermarking-based copyrights
infringements tracking and prosecutions. No doubt that these typical
security policies and usage restrictions are indispensable to DRM
ecosystem, but the other cover of a coin, they give birth to several
unexpected issues, such as the weaker system interoperability and
usability, as well as higher security overheads. The simple adoptions of
those general or increasingly enhanced security policies for DRM
ecosystem would have negative influences on the utilities of
participants without the consideration of the rational decision-making.
Therefore, the adoptions of DRM security policies, the establishment of
multi-stakeholder trust and security risk management become three
essential aspects. |
![]() |
Z. Zhang. Risk Assessment and Management [M]. USA: Academy Publish, 2012. (ISBN 978-0-9835850-0-8) [Html]
Online Download: [Html] |
![]() |
Z. Zhang, K. Fan. Digital Rights Management and Security Technology [M]. Beijing: National Defense Industry Press, 2013. (ISBN 978-7-118-08659-1, in Chinese) [Html]
This book is not only suitable for the related researchers, industry engineers and technicians, governmental administrators and decision-makers who work for digital rights management, information system security, information management and e-commerce, but also is used as textbook or references for postgraduates and senior undergraduates in the universities and institutes. |
![]() |
Z. Zhang, K. Fan, F. Xiang (Translators), Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, et al. Cyber Security Policy Guidebook [M]. Beijing: National Defense Industry Press, 2014, 11. (ISBN 978-7-118-09824-2, Chinese Edition) [Html]
|
Standards, Patents
& Computer Software Copyrights
[Back]
![]() |
Information Technology - Digital Rights Management - Terminology, National Standardization of The People's Republic of China (GB/T 30247-2013), Standardization Administration Committee of The People’s Republic of China, 2013. |
![]() |
Interactive Platform for Digital Television Receiving Equipment, The First Part: System Architecture, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.1-2015), 2015. |
![]() |
Interactive Platform for Digital Television Receiving Equipment, The First Part: Application Programming Interface, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.2-2015), 2015. |
![]() |
Interactive Platform for Digital Television Receiving Equipment, The First Part: Test Specification, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.3-2015), 2015. |
![]() |
A Method for Sharing Digital License Right Certificate between Terminal Equipments. ZL 201310432119.1, 2016. |
![]() |
A Method for Transferring Digital License Right Certificate between Terminal Equipments. ZL 201310431675.7, 2016. |
![]() |
A Method and System for Digital Content Sharing of Digital Network. ZL 201110314236.9, 2013. |
![]() |
A Digital Copyright Protection System for Multimedia Audio and Video. ZL 201320035188.04, 2013. |
![]() |
A Digital Rights Management System Based on Trusted Computing. ZL 201220001056.05, 2013. |
![]() |
A Method of Digital Content Distribution for Multimedia Social Networks. ZL 201110188334.2, 2011. |
![]() |
A Method of Digital Content Trusted Usage Control Based on Cloud Computing. ZL 201110395752.9, 2011. |
![]() |
A Biometrics-Based Method for Remote Authentication, ZL 200810150642.4, 2010. |
![]() |
An Enhanced Security Method for Fingerprint Fuzzy Vault System, ZL 200810150579.4, 2010. |
![]() |
A Biometric-Based Encryption Method, ZL 200810150646.2, 2011. |
![]() |
Multimedia Social Network Platform V2.0 (Computer Software Copyrights). 2016SR111178, 2016. |
![]() |
Multimedia Social Network Platform V1.2 (Computer Software Copyrights). 2016SR034178, 2016. |
![]() |
Multimedia Social Network Platform V1.1 (Computer Software Copyrights). 2015SR133496, 2015. |
![]() |
Mobile Multimedia Digital Rights Management Player V3.1 (Computer Software Copyrights). 2015SR040282, 2015. |
![]() |
Network-Based Map Marker Decision-Making System V1.0 (Computer Software Copyrights). 2014SR133532, 2014. |
![]() |
Multimedia Social Network Platform V1.0 (Computer Software Copyrights). 2014SR068647, 2014. |
![]() |
Mobile Multimedia Digital Rights Management Player V3.0 (Computer Software Copyrights). 2014SR070147, 2014. |
![]() |
Mobile Multimedia Digital Rights Management Player V2.1 (Computer Software Copyrights). 2014SR014629, 2014. |
![]() |
DRM Player Audio & Video Digital Content Security Usage Control System V3.0 (Computer Software Copyrights). 2014SR005237, 2014. |
![]() |
AES-Based Digital Content Encryption Software V1.0 (Computer Software Copyrights). 2014SR000851, 2014. |
![]() |
iOS-Based Mobile Multimedia Player V1.0(Computer Software Copyrights). 2013SR096143,2013. |
![]() |
Mobile Multimedia Digital Rights Management Player V2.0 (Computer Software Copyrights). 2013SR076402, 2013 |
![]() |
Mobile Multimedia Digital Rights Management Player V1.0 (Computer Software Copyrights). 2013SR050957, 2013. |
![]() |
DRM Player Audio & Video Digital Content Security Usage Control System V2.0 (Computer Software Copyrights). 2013SR006111, 2013. |
![]() |
Mobile Multimedia Audio and Video Player (Computer Software Copyrights). 2012SR053601, 2012. |
![]() |
DRM Player Audio & Video Digital Content Security Usage Control System V1.0 (Software Copyrights). 2011SR048666, 2011. |
![]() |
Digital Content Management System for Online Audio and Video (Software Copyrights). 2011SR043045, 2011. |
![]() |
Cross-Platform Digital Content Encryption Software (Software Copyrights). 2011SR080603, 2011. |
![]() |
Online Questionnaire Survey Platform (Software Copyrights). 2011SR083652, 2011. |
![]() |
Computer Supported Cooperative Work Platform Access Control System (Software Copyrights). 2010SR034617, 2010. |
Prototypes
&
Demos
[Back]
![]() |
Brief Introduction: Henan International Joint Laboratory of Cyberspace Security Applications and Henan Province Innovative Research Group on Multimedia Content Security (Formerly Special Interest Group on Digital Rights Management, SIGDRM, EST. 2006), affiliated to Henan University of Science and Technology, is sponsored by Department of Science and Technology of Henan Province, and its director is Dr. Zhiyong ZHANG as Henan Province Distinguished Professor. The lab focuses on cyberspace security and computing, multimedia content security and soft computing, social big data analytics, and so on. For years, aiming at digital rights management for consumer electronics, multimedia social networks analysis and mining, multimedia cloud computing and security, the group members have dedicated themselves to carry out a number of national and provincial research projects that National Natural Science Fund of China, Plan For Scientific Innovation Talent of Henan Province, Plan for Innovation Talents of Science and Technology in Universities of Henan Province, China Postdoctoral Science Foundation, as well as The Key Science and Technology Program of Henan Province, etc. At the same time, Henan University of Science and Technology as the main drafter, they participated to draft China National Standards named as “Information technology digital rights management terminology ", and electronic industry standard specifications. In recent years, the group published above 200 papers in well-known academic journals, such as "Computer Journal", "Neural Network World", "Intelligent Automation & Soft Computing", "Multimedia Tools and Applications", "Social Network Analysis and Mining", "Discrete Applied Mathematics", "Chinese Electronic Journal (English version)", "Journal of Communication," “Journal of Computer Aided Design and Graphics”, as well as in international conferences as IEEE CCNC2009, IFIP NPC2007, ACM HPCS2010. There are above 100 papers indexed by SCI & EI Compendex. They held over 10 authorized China national invention patents, and 30 items of copyrighted computer software productions as "the multimedia audio and video digital copyright protection system of DRM Player V3.0". The research group has 10 faculty members, including 7 professors and doctors, 4 master's supervisors, 10 or so postgraduate students pursuing their degrees. There are above 10 postgraduates in total have been awarded the China National Scholarship for Postgraduate, First and Second Scholarship of Henan University of Science and Technology. Especially, a postgraduate was awarded as "Henan Province Best Postgraduate Thesis" in 2014. The group includes four Research Teams according to the ongoing research funds, i.e. Multimedia Social Network Security and Privacy , Social Media Big Data Analysis and Mining (A&M), Multimedia Social Network Platform Research & Development, and Cryptography Fundamental Research and Applications, together with Development Team.
|
![]() |
|
Editorial
Board, Guest
Editor/TPC
[Back]
![]() |
Editorial Board Member of Multimedia Tools and Applications (2015-, Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721, SCI IF=1.346) |
![]() |
Editorial Board Member of Neural Network World (2015-, Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335, SCI IF=0.479) |
![]() |
Editorial Board Member of Journal on Big Data (2018-, Springer, ISSN: 2196-1115) |
![]() |
Editorial Board Member of EURASIP Journal on Information Security (2016-, Springer, ISSN: 1687-417X, EI Compendex) |
![]() |
Editorial Board Member of Recent Advances in Electrical & Electronic Engineering (2015-, Online ISSN 2352-0973, Print ISSN 2352-0965, EI) |
![]() |
International Advisory Board Member of International Journal of Cloud Applications and Computing (2017-, IGI Global, 2156-1834, EISSN: 2156-1826) |
![]() |
Associate Editor of Human-centric Computing and Information Sciences (2016-, Springer, ISSN: 2192-1962, SCIE) |
![]() |
Associate Editor of IEEE Access (2018-, IEEE, ISSN: 2169-3536) |
![]() |
Associate Editor of Social Network Analysis and Mining (2013-2017, Springer, ISSN-Print: 1869-5450, ISSN-Online: 1869-5469) |
![]() |
Leading Guest Editor, Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks, Journal of Computational Science (Elsevier, ISSN: 1877-7503, SCI IF=1.078) [HTML] |
![]() |
Leading Guest Editor, Special Issue on Crowd Computing for Social Media Ecosystem, Applied Soft Computing (Elsevier, ISSN: 1568-4946, SCI IF=2.81) [HTML] |
![]() |
Leading Guest Editor, Special Issue on Multimedia Social Network Security and Applications, Multimedia Tools and Applications (Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721, SCI IF=1.346) [HTML] |
![]() |
Leading Guest Editor, Special Issue on Applied Soft Computing for Online Social Networks, Neural Network World (Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335, SCI IF=0.479) [HTML] |
![]() |
Leading Guest Editor, Special Issue on Security, Trust and Risk in Multimedia Social Networks, Computer Journal (Oxford, ISSN-Print: 0010-4620, ISSN-Online: 1460-2067, SCI IF=0.787) [Guest Editorial] [HTML] |
![]() |
Leading Guest Editor, Special Issue on Challenges for Multimedia Content Security in Social Networks , EURASIP Journal on Information Security (Springer, ISSN: 1687-417X, EI) [HTML] |
![]() |
Co-Guest Editor, Special Issue on Recent Research in Computational Intelligence Paradigms into Security and Privacy for Online Social Networks (OSNs), Future Generation Computer Systems (Elsevier, ISSN: 0167-739X, SCI IF=2.786) [HTML] |
![]() |
Co-Guest Editor, Special Issue on Swarm and Evolutionary Computational Approaches: Recent Advances in Networking and Internet of Things (IoT), International Journal of Networking and Virtual Organisations (ISSN Online: 1741-5225, ISSN Print: 1470-9503) [HTML] |
![]() |
Leading Guest Editor, Special Issue on The Challenge of Multimedia Social Networks and Security, Recent Advances in Electrical & Electronic Engineering (Online ISSN 2352-0973, Print ISSN 2352-0965, EI) [Guest Editorial] |
![]() |
Leading Guest Editor, Special Issue on Multimedia Contents Security in Social Networks Applications, Journal of Multimedia (JMM, ISSN: 1796-2048, EI) [HTML] [Guest Editorial] |
![]() |
Leading Guest Editor, Special Issue on Security, Trust and Risk in Digital Rights Management Ecosystem, International Journal of Digital Content Technology and Its Applications (AICIT, ISSN-Print:1975-9339, ISSN-Online: 2233-9310, EI) |
![]() |
Congress Review Panel Member, 2018 IEEE World Congress on Services, San Francisco, CA, US. (SERVICES 2018) |
![]() |
Proceedings Co-Chair, 2017 IEEE Conference on Computers, Software and Applications, Politecnico di Torino, Turin, Italy, 2017. (COMPSAC 2017) |
![]() |
Leading Guest Editor, Special Issue on Security, Trust and Risk in Digital Rights Management Ecosystem, International Journal of Digital Content Technology and Its Applications (AICIT, ISSN-Print:1975-9339, ISSN-Online: 2233-9310, EI) |
![]() |
Publication Chair, 2016 IEEE Conference on Computers, Software and Applications, Atlanta, Georgia, USA, 2016. (COMPSAC 2016) |
![]() |
Co-Chair, 2016 International Conference on Intelligent Cloud Computing, Wuhan, China, 2016. (ICC 2016) |
![]() |
Technical Co-Sponsor, 4th International Conference on Advanced Computing, Networking, and Informatics, Rourkela, India, 2016. (ICACNI 2016) |
![]() |
TPC Member, The International Conference on High Performance Computing & Simulation (2010 France, 2011 Turkey, 2014 Italy, 2015The Netherlands, 2016 Austria) |
![]() |
TPC Member, International Conference on Future Computational Technologies and Applications (2013 Spain, 2014 Italy, 2015 France, 2016 Italy) |
![]() |
TPC Member, International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 2016. (ICACCI 2016) |
![]() |
Chair, Invited Session on Multimedia Social Networks and Soft Computing (ICGEC-2013-IS03), Seventh International Conference on Genetic and Evolutionary Computing (ICGEC-2013), Prague, Czech Republic, 2013. (ICGEC2013, Czech Republic), (ICGEC-2013-IS03) |
![]() |
Chair, Invited Session on Multimedia and Cloud Computing Security (ICGEC-2012-IS01), Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, Japan, 2012. (ICGEC2012, Japan), (ICGEC-2012-IS01) |
![]() |
Chair, Special Session on Digital Home Networks & Multimedia Contents Protection (DHN-MM 2011), 2011International Conference on High Performance Computing & Simulation, Istanbul, Turkey, 2010. (HPCS2011, Turkey), (DHN-MM2011) |
![]() |
TChair, Invited Session on Digital Rights Management (ICGEC-2011-IS01), Fifth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), Taiwan, 2011. (ICGEC2011, Taiwan), (ICGEC-2011-IS01) |
![]() |
Chair, Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection (TUN-MM 2010), 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS2010, France), (TUN-MM2010) |
![]() |
Chair, Invited Session on Security and Trust in Ubiquitous Networks (ICGEC-2010-IS06), Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC2010, China), (ICGEC2010-IS06) |
![]() |
Chair, Invited Session on Digital Rights Management (IAS-2009-IS15), The Fifth International Conference on Information Assurance and Security, Xi'an, China, 2009. (IAS2009, China), (IAS-2009-IS15) |
![]() |
Chair, International Workshop on Digital Rights Management & Contents Protection (CIS-Workshop2009), conjunction with 2009 International Conference on Computational Intelligence & Security, Beijing, China, 2009. (CIS2009, China), (CIS-Workshop2009) |
![]() |
TPC Member, International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 2016. (ICACCI 2016) |
Call For
Papers/Chapters [Back]
|
Online social networks (OSNs) are now deeply entrenched in our society and daily lives. This is not surprisingly as such platforms, tools, applications and services allow us to conveniently acquire, exchange and share data, information, and knowledge on a much larger scale, and without geographic restriction. This has also contributed to trends such as the emerging AI-enabled and human-centric frontier computing driven by social media big data, including new computing paradigms, e.g., aware computing and (social) situation analytics, to facilitate social data mining and knowledge discovery. There are, however, security, privacy and trustworthiness issues that need to be addressed by integrating artificial intelligence theories and methods, such as based on the ML/DL/causality inference, as well as human-centric and hardware controlled online social networks features. This is the focus of this thematic issue. More specifically, we are seeking to investigate the emerging AI-enabled and human-centric computing challenges and their state-of-the-art theories, models, algorithms and solutions.
SUBJECT COVERAGE Journal of Information Processing Systems is soliciting high quality manuscripts presenting original contributions for its special issue. In this thematic issue, we solicit the submission of high-quality original research and survey articles in topics including, but are not limited to, particularly interdisciplinary submissions that bring together social media, security, privacy and trust researchers. - AI and Frontier human-centric computing paradigms for OSNs security - ML/DL/causality inference models and algorithms for social big data security analysis - Social IOT and hardware controlled online security features for social computing - Computational intelligence for social behavior analysis, social bots checking and controlling - Fine-grained and spatial-temporal-featured privacy protection employed by AI - Social big data-driven trust management and risk assessment, as well as social-factor considerations in the social ecosystems - Human-centric OSNs security prototypes and empirical studies together with social big data applications
SUBMISSION GUIDELINE This special issue will accept about 6~8 papers, in which an outstanding paper will be wave APC. Corresponding author should be distinguished researcher (IEEE Fellow, Indexed Journal EiC, etc.).
Papers must be submitted to the Manuscript Link service - https://www.manuscriptlink.com/journals/jips. Before submitting papers, you need to read the JIPS submission guideline.
GUEST EDITORS Zhiyong Zhang, Ph.D., SMIEEE, Department of Computer Science Henan University of Science and Technology, China
Dr. Celestine Iwendi, Ph.D., SMIEEE, Fellow Higher Education Academy Board Member IEEE Sweden Section, Sweden
IMPORTANT DATES - Manuscript submission due: May. 30, 2020 - Author notification: August. 30, 2020 (tentative) - Expected publication: 4th quarter, 2020 (tentative)
|
Closed
Special
Issues/Book
Chapters/Workshops/Invited
Sessions
![]() |
Special Issue on “Intelligent Approaches for Multimedia Future Communications and Internet of Things”, Multimedia Tools and Applications (Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721) [Call for Papers, PDF, 486k] |
|
Leading Guest Editor, Special Issue on Advanced Soft Computing Methodologies and Applications in Social Media Big Data Analytics, Journal on Big Data (2018-, Springer, ISSN: 2196-1115) [Official Website] |
![]() |
Elsevier Book Chapters :Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier series on: Intelligent Data-Centric Systems: Sensor Collected Intelligence [Official Website] |
![]() |
Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks, Journal of Computational Science (Elsevier, ISSN: 1877-7503), [Official Website, html] [Call for Papers, PDF, 126k] [WikiCFP, html] [CCF, html] |
![]() |
Special Issue on Crowd Computing for Social Media Ecosystem, Applied Soft Computing (Elsevier, ISSN: 1568-4946) [Official Website, html] [Call for Papers, PDF, 87k] [WikiCFP, html] |
![]() |
Special Issue on Swarm and Evolutionary Computational Approaches: Recent Advances in Networking and Internet of Things (IoT), Int. J. of Networking and Virtual Organisations (InderScience, ISSN Online: 1741-5225, ISSN Print: 1470-9503) [Official Website, html] [Call for Papers, PDF, 223k] [WikiCFP, html] |
![]() |
Special issue on Recent Research in Computational Intelligence Paradigms into Security and Privacy for Online Social Networks (OSNs), Elsevier Future Generation Computer Systems (Elsevier, ISSN: 0167-739X) [Official Website, html] [WikiCFP, html] |
![]() |
Special Issue on Applied Soft Computing for Online Social Networks, Neural Network World (Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335) [Official Website, html] [Call for Papers, PDF, 103k] [WikiCFP, html] |
![]() |
Special Issue on Multimedia Social Network Security and Applications, Multimedia Tools and Applications (Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721) [Official Website, html] [Call for Papers, PDF, 202k] [WikiCFP, html] |
![]() |
Special Issue on Challenges for Multimedia Content Security in Social Networks, EURASIP Journal on Information Security (Springer, ISSN: 1687-417X) [Official Website, Html] [Call for Papers, PDF] |
![]() |
Special Issue on Multimedia Social Networks Security and Big Data Analysis, International Journal of Big Data Intelligence (InderScience, ISSN-Print: 2053-1389, ISSN-Online: 2053-1397) [Official Website Html][CCF Html] |
![]() |
Special Issue on Security, Trust and Risk in Multimedia Social Networks, The Computer Journal (Online ISSN 1460-2067 - Print ISSN 0010-46200-46200-4620) [Html] |
![]() |
Invited Session on Multimedia Social Networks and Soft Computing (ICGEC-2013-IS03), Seventh International Conference on Genetic and Evolutionary Computing (ICGEC-2013), Prague, Czech Republic, 2013. (ICGEC-2013-IS03) |
![]() |
Special Issue on Intelligence Digital Content Security, International Journal of Digital Content Technology and Its Applications (http://www.aicit.org/jdcta/global/si.html?jname=JDCTA#S44) |
![]() |
Invited Session on Multimedia and Cloud Computing Security (ICGEC-2012-IS01), Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, Japan, 2012 (ICGEC2012, Japan), (ICGEC-2012-IS01) |
![]() |
Special Issue on Multimedia Content Security in Social Networks Applications, Journal of Multimedia (http://www.academypublisher.com/jmm/si/jmmsi_mcs.html) |
![]() |
Special Session on Digital Home Networks & Multimedia Content Protection (DHN-MM 2011), 2011International Conference on High Performance Computing & Simulation, Istanbul, Turkey, 2010. (http://cisedu.us/rp/hpcs11/conference/special-sessions/session-01---dhn-mm) |
![]() |
Special Issue on Security, Trust and Risk in Digital Rights Management Ecosystem, International Journal of Digital Content Technology and Its Applications (http://www.aicit.org/jdcta/si.html) |
![]() |
Special Session on Trusted Ubiquitous Networks & Multimedia Content Protection (TUN-MM 2010), 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS2010, France), (TUN-MM2010) |
![]() |
Invited Session on Security and Trust in Ubiquitous Networks (ICGEC-2010-IS06), Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC2010, China), (ICGEC2010-IS06) |
![]() |
Invited Session on Digital Rights Management (IAS-2009-IS15), The Fifth International Conference on Information Assurance and Security, Xi'an, China, 2009. (IAS2009, China), (IAS-2009-IS15) |
![]() |
International Workshop on Digital Rights Management & Content Protection (CIS-Workshop2009), conjunction with 2009 International Conference on Computational Intelligence & Security, Beijing, China, 2009. (CIS2009, China), (CIS-Workshop2009) |
[IEEE/IEEE MMTC/CPS] [IEEE Author/CS Mags/Spectrum/ComputingEdge/TBD/TSC/TMM/TETC/Multimedia/Access] [IEEE Collabratec] [ACM/Mags/CACM/CSDL/Qmags/TOMM] [Elsevier ASOC/FGCS/JOCS] [Springer MTAP/SNAM/JBD] [CCF/CCCF] [Compt. Conv.] [WWW] [Aliyun] [Apple APPs] [Wechat/QQ Open] [Baidu APPs] [My Docs] [SIGDRM Mail] [DHS S&T] [NSFC/NSF] [MOST] [WikiCFP/Papers Invited/Conferences Alerts/CSPlus/Springer AuthorMap/IEEE SMC TCSC CFPs] [Database] [CAS JCR][Highlighted News @ A Glance][More links...]
The students, who are junior and senior majoring in mathematics, computer science and information management science, etc, full of spirit, research interests on the above mentioned fields, and basic technical capabilities, are encouraged to enter CSA. Please send your CV and research plan to me through E-mail: xidianzzy@126.com. I would give you an offer ASAP based on an overall estimation. CSA's philosophy is Deep· Dedicated· Determined· Dynamic. Join us for today. Do what you like, like what you do.
Room 509 (Office), Gongke Building #2
Department of Computer Science
Henan University of Science & Technology
263 Kaiyuan Ave, Luolong District
Luoyang, Henan 471023, P. R. of China
My
Office @
IsU
(Memorial)
[Back]
Room B26D (Office), Atanasoff Hall
Department of Computer Science
Iowa State University, Ames, Iowa 50011, USA
Copyrights © Henan International Joint Laboratory of Cyberspace Security Applications, SIGDRM 2006-2020. All Copyrights Reserved. Henan International Joint Laboratory of Cyberspace Security Applications is formerly Special Interest Group on Digital Rights Management (SIGDRM), EST. 2006, and Multimedia Content Security Laboratory (MCSL), Henan University of Science & Technology (HAUST), 263 Kaiyuan Ave, Luoyang 471023, P. R. of China. There are MCSL News , The MCSL Zeroun's Meeting (哲咏会), and MCSL Organizing Conferences (2010 - Present), MCSL SWL (2013-2016). Join MCSL to visit here, and see details @ Chinese edition. Searching "SIGDRM", "CyVOD" and "CyVOD Story" powered by Google, Google Scholar, LinkedIn, & China Baidu, etc. Contact us by secretary@sigdrm.org for any question.
|