SIGDRM Homepage      Drawn by Erin, my six-year-old pretty daughter, in 2014 Spring. Follow me @




Dr. Zhiyong (Zeroun) ZHANG [Brief CV (ES), PDF, 141K]

Henan Province Distinguished Professor, Ph.D Supervisor

Dean, Department of Computer Science

Director, Multimedia Content Security Laboratory

IEEE/ACM Senior Member, SIGDRM & CyVOD Founder

509 (Office), 505, 521 (Labs), No. 2 Gongke Building

Henan University of Science and Technology

263 Kaiyuan Ave, Luolong District, Luoyang, Henan 471023, P. R. of China

E-mail: xidianzzy@126.com; Homepage: http://www.sigdrm.org/~zzhang

 ORCID iD iconorcid.org/0000-0003-3061-7768

 

[Biographical Sketch] [Research Areas] [Curriculums] [Funds & Projects] [Monographs]

[Papers, Editorials, Reports] [Standards, Patents & Software Copyrights] [Prototypes & Demos]

[The Research Group] [My Office @ HAUST] [My Office @ ISU(Memorial)]

[EB, GE/TPC] [Call For Papers/Book Chapters] [Readings & Resources] [Miscellaneous] [Recruitment]  


+Latest Events+

项目符号

[JOCS Crowd Computing Paper, May 30, 2017] The crowd computing paper, titled by "A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory", was online published on Elsevier Journal of Computational Science. The paper can be cited as "Z. Zhang, J. Wen, X. Wang, C. Zhao. A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory. Journal of Computational Science (2017).  DOI: 10.1016/j.jocs.2017.05.018.

项目符号

[Zhang's Academic Service, March 25, 2017] Zhang invited to serve COMPSAC 2017 Proceedings Co-Chairs.

项目符号

[TBD SocialSitu Paper, January 18, 2017] The SocialSitu paper, titled by "A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks", is to be appeared on IEEE Transactions on Big Data. The paper can be cited as "Z. Zhang, R. Sun, X. Wang, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2657623".

项目符号

[My ORCID, December 28, 2016] Welcome to visit my ORCID @ http://orcid.org/0000-0003-3061-7768.  

项目符号

[CyVOD Trinity Scheme Paper, December 10, 2016] The CyVOD Trinity Scheme paper, titled by "CyVOD: A Novel Multimedia Social Network Scheme", was published on Multimedia Tools and Applications. The paper can be cited as "Z. Zhang, R. Sun, C. Zhao, et al. CyVOD: A Novel Multimedia Social Network Scheme. Multimedia Tools and Applications, 2016, DOI 10.1007/s11042-016-4162-z".

项目符号

[FGCS Survey Paper, October 24, 2016] The survey paper, titled by "Social media security and trustworthiness: Overview and new direction", was published on Future Generation Computer Systems of Elsevier Journal. The paper can be cited as "Z. Zhang, B. B. Gupta, Social Media Security and Trustworthiness: Overview and New Direction. Future Generation Computer Systems, 2016, http://dx.doi.org/10.1016/j.future.2016.10.007".

项目符号

[JOCS Leading Guest Editor, October 20, 2016] Welcome to submit manuscripts for Elsevier Journal of Computational Science (SCI IF=1.078) Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks (Submission Due April 1, 2017), Guest Editors: Dr. Zhiyong Zhang, Henan University of Science & Technology, China; Dr. Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, USA; Prof. Dr. Brij B. Gupta, National Institute of Technology, Kurukshetra, India. The CFP posted @ http://www.journals.elsevier.com/journal-of-computational-science/call-for-papers/special-issue-on-the-convergence-of-new-computing-paradigms.

项目符号

[Zhang's Academic Service, Apr 11, 2016]  Zhang invited to serve 2016 International Conference on Intelligent Cloud Computing as Co-Chair.

项目符号

[Zhang's Academic Service, Mar 23, 2016] Zhang invited to serve EURASIP Journal on Information Security (Springer)  as Editorial Board Member.

项目符号

[Computer Science for All] US President Obama's initiative about Computer Science Education @ https://www.whitehouse.gov/blog/2016/01/30/computer-science-all and https://www.whitehouse.gov/the-press-office/2016/01/30/weekly-address-giving-every-student-opportunity-learn-through-computer

项目符号

[Highlighted Cares] Crowdsourcing & Opportunistic Mobile Social Networks from Wikipedia, Mobile Crowdsensing for Mobile Social Networks and Crowdsensing Security & Privacy

项目符号

[New Curriculum, Jan 16, 2016] Trusted Computing Technology (M050812008) and Digital Rights Management Technology (M050812011)  for postgraduates from 2016 Spring (From May 4, 2016). 

项目符号

[CyVOD.net Opening, Jan 1, 2016] CyVOD new website opening @ www.cyvod.net.Visit online for today!

项目符号

[Zhang's Academic Service, Dec 25, 2015] Zhang invited to serve COMPSAC 2016 Publishing Chair.

项目符号

[Two new cares, August 8, 2015] There are two more cares on the fields of IEEE Big Data Initiative and IEEE Cyber Security Initiative.

[What's new more] [Highlighted News @ A Glance]


项目符号

Biographical Sketch [Back]

[Professional Background] Dr. Zhiyong (Zeroun) Zhang, born in October 1975, earned his Bachelor, Master and Ph.D. degrees in Computer Science at Henan Normal University, Dalian University of Technology and Xidian University, P. R. of China, respectively. Nowadays, he is a full-time Henan Province Distinguished Professor, Ph.D Supervisor, Dean of Department of Computer Science at Henan University of Science and Technology (abbr. HAUST, formerly Luoyang Institute of Technology), and Director of Multimedia Content Security Laboratory/Innovative Research Group of Henan Province, P. R. China. In 2010-2013, Zhang have ever conducted interdisciplinary post-doctoral studies on  social media and Digital Rights Management (DRM) at School of Management, Xi'an Jiaotong University, P. R. China. In 2015-2016, he, as visiting professor, joined Software Engineering Laboratory/Research Group chaired by Professor Carl K. Chang (IEEE CS President Emeritus, IEEE/AAAS Fellow), and focused on social media R & D at Department of Computer Science, Iowa State University, which is the birthplace of 1st world-wide automatic electronic digital computer named as Atanasoff-Berry computer (ABC), in City of Ames, IA, USA. He is also Founder of both Special Interests Group on Digital Rights Management (SIGDRM) and CyVOD, established in October 2006 and May 2015, respectively.

[Research Contributions]  Recent decade, Zhang made intensive efforts to pursue cutting-edge researches on computer science, plus cross-disciplinary (empirical) studies on both information technology and information management. His research interests primarily include multimedia content security and soft computing, social media big data analysis, mining and crowd computing, digital rights management and mobile cloud computing, together with security risk assessment and information management methodology. He took the lead in investigating the challenging issues of security, trust and risk in digital rights management ecosystem mainly for multimedia, further extending the studies oriented towards the emerging social media and social networks. And then, a novel research idea of the convergences of both "hard security" and "soft computing" was proposed in order to realize the ecosystem-level multimedia content security schemes. Especifically, he have ever proposed the social-situation analytics technology (SocialSitu) and recommender, trust model for multimedia social networks, together with security-utility analysis and game-theoretical method for DRM policies, and is now fully engaged in doing in-depth research on that. He has developed VOD (Voice of Dream) series multimedia security prototype and software productions for consumer electronics like PC, Mobile and Pad, as well as  deployed a trinity multimedia social network platform. As of today, in the filed of DRM engineering and applications, Zhang owns 32 papers indexed by Ei Compendex™ database especially regarding the keywords like "Digital Rights Management or DRM", as ranked as the second in the world.  

[Research Works] For years, Zhang has been Principal Investigator of Chinese leading funded projects sponsored by National Natural Science Fund of China, China Postdoctoral Science Foundation, Chinese Ministry of Education Key Science & Technology Program, as well as Program for Innovative Research Team (in Science and Technology) in University of Henan Province, Plan For Scientific Innovation Talent of Henan Province, Program for Science & Technology Innovation Talents in Universities of Henan Province, and Henan Province Key Technologies R & D Program. In recent years, he has published above 100 selected papers on the well-known academic international journals and conferences sponsored by IEEE, ACM and IFIP, including "IEEE Transactions on Big Data", "Future Generation Computer Systems", "The Computer Journal",  "Multimedia Tools and Applications", etc. He has edited and translated five books titled by "Security, Trust and Risk in Digital Rights Management Ecosystem", "Risk Assessment and Management", "Social Network Security Theory and Technology (in Chinese)", "Digital Rights Management and Security Technology (in Chinese)" and "Cyber Security Policy Guidebook (Translated Chinese Edition)", respectively. Besides, he held 10 granted patents and 20 items of The Registration of Computer Software Copyright, which are functionally demonstrated by using fruitful Prototypes & Demos (in Chinese). As Chairperson of SIGDRM, he has ever chaired the researches & developments on CyVOD™ MSN (VOD·Cyclone Multimedia Social Network), which is a trinity comprehensively composed of multimedia security, social network and DRM, VOD (Mobile) DRM Players V3.0 (V3.1) for personal and mobile multimedia, as well as Online Survey System for empirical study. And also, he, as one of core drafters, co-drafted China National Standards including "Information technology-digital rights management-Terminology". In January 2014, he was conferred to Second Prize of Henan Province Science & Technology Progress issued by Henan Province Government, due to the above achievements of researches & developments on DRM, which are very helpful for a prospective, healthy and successful digital content industry.

[Academic Services] Zhang is ACM Senior Member (M'08, S'13), IEEE Senior Member (M'06, S'11), China Computer Federation Senior Member (M'04, S'08) and China Association for Artifical Intelligence (10'S), as well as Member of IEEE Systems, Man, Cybermetics Society Technical Committee on Soft Computing (IEEE SMC TCSC), World Federation on Soft Computing Young Researchers Committee (WFSC YRC), IEEE Consumer Electronics Society Member, IEEE Young Professional (formerly IEEE GOLD Volunteer), and Committeeman of China National Audio, Video, Multimedia System and Device Standardization Technologies Committee. Besides, Prof. Zhang is Editorial Board Member of Multimedia Tools and Applications (Springer, SCI), Neural Network World (Czech Republic, SCI) and EURASIP Journal on Information Security (Springer), Associate Editor of Human-centric Computing and Information Sciences (Springer), Leading Guest Editor/Co-Guest Editor of Applied Soft Computing (Elsevier, SCI), Computer Journal (Oxford, SCI), Future Generation Computer Systems (Elsevier, SCI), as well as International Advisory Board Member of International Journal of Cloud Applications and Computing (IGI Global). Plus, Zhang made outstanding efforts and contributions on the following academic services, including Proceedings Publication Chair/Co-Chair of IEEE COMPSAC 2016 and COMPSAC 2017, which is the flagship conference of the IEEE Computer Society (IEEE CS),  Chair/Co-Chair for numerous International Workshops/Sessions on Digital Rights Management, as well as TPC Member of numerous international conferences on multimedia and computing security. He was conferred the Award of Outstanding Organization Works for 2009 International Workshop on Digital Rights Management & Contents Protection, International Conference on Computational Intelligence and Security, in December 2009.

[Community Services] Prof. Zhang was honored as Luoyang Municipal Committee Member of CPPCC in February 2014, is now playing an active role in planning and drafting strategic progress in science and technology, promoting and stimulating high-technologies industry, as well as advancing and refining culture and society management. He has ever submitted a number of proposals for local governments in recent decade. Specifically speaking, his suggestions and oral reports, in the field of IT industries, primarily and comprehensively embrace all kinds of software industry, robotic industry, digital content industry, and information security and management. His favorite motto is "志高远,勇攀登"Welcome your visiting to his homepage. © Seeing details in [Full CV, PDF, 215K]

(Updated in March 2017)


120+ published papers · 5 edited books · 10 granted patents · 5 drafted standards · 8 Awards · 20+ graduated students


[A portfolio of highlighted papers] Zhang's highlighted authored/co-authored papers are listed as follows:

项目符号

Z. Zhang*, R. Sun, X. Wang, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2657623 [PDF]

项目符号

Z. Zhang*, B. B. Gupta. Social Media Security and Trustworthiness: Overview and New Direction. Future Generation Computer Systems, 2016. DOI: 10.1016/j.future.2016.10.007 [PDF]

项目符号

Z. Zhang*, R. Sun, C. Zhao, C. K. Chang, B. B. Gupta. CyVOD: A Novel Trinity Multimedia Social Network Scheme. Multimedia Tools and Applications, 2016. DOI: 10.1007/s11042-016-4162-z [PDF]

项目符号

W. Feng, Z. Zhang*, J. Wang, L. Han. A Novel Authorization Delegation for Multimedia Social Networks by using Proxy Re-encryption. Multimedia Tools and Applications, 2016, 75(21): 13995-14014. [PDF]

项目符号

Z. Zhang*, K. Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. The Computer Journal, 2015, 58 (4): 668-678. [PDF]

项目符号

Z. Zhang*, Z. Wang, D. Niu. A Novel Approach to Rights Sharing-Enabling Digital Rights Management for Mobile Multimedia. Multimedia Tools and Applications, 2015, 74 (16): 6255-6271. [PDF]

项目符号

Z. Zhang*, K. Wang. A Trust Model for Multimedia Social Networks. Social Networks Analysis and Mining, 2013, 3(4): 969-979. [PDF]

(Updated in March 2017)


项目符号

Research Areas (Presently and Leading) [Back]

项目符号

The state-of-the-art of social networks security and soft computing

项目符号

Multimedia big data analysis, mining and crowds computing

项目符号

Situational analytics and social-sensed multimedia computing

项目符号

Digital Rights Management (DRM) and mobile cloud computing

项目符号

Interdisciplinary study on both information technology and information management


项目符号

Curriculums [Back]

项目符号

Introduction to Computer (Freshman Course, Fall, Since 2011)
It mainly Introduces the professional foundation and core knowledge of computer science and technology , but not expanding or deepening the technical details of knowledge, emphasizing basic concepts rather than mathematical models.
Educational Materials: Chen M. Introduction to Computer (The first edition) [M]. Beijing: Tsinghua University Press, 2010.
References:
1. Behrouz A. Forouzan, Firouz Mosharraf, Liu Yi, Zhai Gaofeng, etc. (Translator). Introduction to Computer Science (The second edition) [M], Beijing : Mechanical Industry Press, 2009.
Note: No requiring prerequisite knowledge of computer science, programming or mathematics.

项目符号

Trusted Computing Technology (M050812008, Postgraduate Course, Spring, Since 2010)
It mainly introduces the architecture of Digital Rights Management (DRM) technology, the latest research progress, related Cryptography protection technology, DRM usage control and digital watermarking technology, international standards of OMA DRM and terminology standards of Chinese DRM etc ,and finally presents a self-developed DRM prototype system in detail.
References: important academic journals published at home and abroad nearly three years, having an impact on the international academic conference on papers, as well as the international standards, technical specifications, technical reports, etc.
1. Challener D. Zhao Bo (Translator). Trusted Computing [M]. Beijing: China Machine Press, 2009.
2. TCG Trusted Computing Technologies Specifications [D]. USA: Trusted Computing Group, 2003.
Note: Prerequisite for “Information Security Technology”, " Computer Network", etc.

项目符号

Digital Rights Management Technology (M050812011, Postgraduate Course, Spring, Since 2016)
It mainly Introduces the development history and technology roadmap of trusted computing technology, the trusted computing platform framework, a trusted network access architecture, international standardization road and our nation trusted computing Union, and trusted computing technology discussions, open-source system experiments, etc.
References: important academic journals published at home and abroad nearly three years, having an impact on the international academic conference on papers, as well as the international standards, technical specifications, technical reports, etc.

1. Zhang Zhiyong, Fan Kefeng. Digital Rights Management and Security Technology [M]. Beijing: National Defense Industry Press, 2013.
2. OAM Digital Rights Management Specification [D]. USA: Open Mobile Alliance, 2002.
Note: Prerequisite for " Computer Network", etc.

项目符号

Seminar on the State-of-the-Art of Computer  (Postgraduate Course, Spring / Fall, Since 2010)
It mainly introduces the present technology situation at home and abroad, the new progress and the open issue of network and information systems security for digital rights management (DRM), multimedia cloud computing, etc.
References: important academic journals published at home and abroad nearly three years, having an impact on the international academic conference papers, as well as the international standards, technical specifications, technical reports, etc.

项目符号

Information Security Technologies (Postgraduate Course, Spring, 2004-2006, 2010;Senior Course, Fall, 2009-2010)
It mainly introduces cryptography theory, key management, digital signature, security model and strategy, etc, which is relate to network security , as well as the important network security technology, such as a firewall technology, intrusion detection technology, etc.
Educational Materials: Wang Yumin. Communication Network Security - Theory And Technology [M]. Shaanxi: Xidian University Press, 2000.
References:
1. Qing S H. Cryptography and Computer Network Security [M]. Beijing: Tsinghua University Press, 2001.
2. Bruce Schneier, Wu S Z (Translator). Applied Cryptography-Protocols, Algorithms, and C Source Program [M]. Beijing: Mechanical Industry Press, 2000.
3. Jue X R, etc. The Principle And Application of Information Security [M]. Beijing: Tsinghua University Press, 2003.
4. Ross J. Anderson , Jiang Jia ,etc (Translator). Information Security Engineering [M]. Beijing: Mechanical Industry Press, 2003.
Note: Prerequisite for “Advanced Mathematics”, “Number Theory”, " Operating System", " Computer Network", etc.

项目符号

Design of Unix Operating System (Senior Course, Fall, 2004-2006)
It Introduced the concrete implementation and Algorithm analysis of the Unix operating system in process management, process communication, storage management, file systems and device management, etc.
Educational Materials: " Design of Unix Operating System”, Maurice J.Bach, Beijing: Mechanical Industry Press, 2000.
References:
1. Uresh Vahalia. Unix Advanced Tutorial System Technology Insider [M]. Beijing: Tsinghua University Press, 2000.
2. Meng Qingchang. Operating System Tutorial-Unix Instances Analysis [M]. Shaanxi: Xidian University Press, 1997.
Note: Prerequisite for the “Data Structure”, “C Language Programming” , “Principles of Operating System”, etc.

项目符号

Advanced Operating System (Postgraduate Degree Course, Fall, 2004-2005)
It mainly introduces the design and Implementation method of Operating System
Educational Materials: "Leon's Unix Source Code Analysis, John Lions, Beijing: Mechanical Industry Press, 2001.
References:
1. J. Bach. Design of Unix Operating System [M]. Beijing: China Machine Press, 2000.
2. Uresh Vahalia. Unix Advanced Tutorial System Technology Insider [M]. Beijing: Tsinghua University Press, 2000.
Note: Prerequisite for “Principles of Operating System”, “Design of Unix Operating System”, etc.

项目符号

Principle Of Operating System (Junior Course, Spring, 2003-2006)
It mainly introduces the basic principle of the design of operating system ,including processor management, processes and threads, storage management, file systems, device management ,etc, and taking modern operating systems Windows2000/NT, Unix, Linux as examples to introduce the basic principles of the concrete implementation.
Educational Materials: " Tutorial of Computer Operating System (The second edition), Zhang Yao, Beijing: Tsinghua University Press, 2001.
References:
1. Meng J. Operating System Tutorial - Principles and Instances Analysis [M]. Beijing: Higher Education Press, 2001.
2. Tang Z Y. Computer Operating System [M]. Shaanxi: Xidian University Press, 2005.
Note: Prerequisite for " Principles of Assembly", " Principles of Computer Composition ", "Data Structure" and " C Language Programming”, etc.


项目符号

Research Funds & Projects [Back]

项目符号

Digital media content security and copyrights protection in cloud media social networks, sponsored by National Natural Science Foundation of China Grant No.61370220, PI, 2014.1-2017.12.

项目符号

Research and development on multimedia social networks based on situation analytics, sponsored by Plan For Scientific Innovation Talent of Henan Province Grant No.2017JR0011, PI, 2017.1-2018.12.

项目符号

Multimedia Content Security, sponsored by Program for Innovative Research Team (in Science and Technology) in University of Henan Province Grant No.15IRTSTHN010, PI, 2015.1-2017.12.

项目符号

Research and Development of Multimedia Social Networks Key Security Technologies, Henan University of Science and Technology Landmark Achievement Cultivation Fund Grant No. No.2015BZCG01,  PI, 2015.9-2018.8.

项目符号

Digital copyright protection technology research and development for cloud media social networking, sponsored by Plan For Scientific Innovation Talent of Henan Province Grant No.134100510006, PI, 2013.1-2015.12.

项目符号

Digital rights spread of the small-world network modeling and risk control for DRM, sponsored by the National Natural Science Foundation of China Grant No.61003234, PI, 2011.1-2013.12.

项目符号

An empirical research on the e-book e-commerce users safe behavior and digital rights management implementation, sponsored by The 47th China Postdoctoral Science Fund Grant No.20100471611, PI, 2010.6-2013.12.

项目符号

Research on the trusted digital home network and its copyright protection mechanisms, sponsored by Program for Science & Technology Innovation Talents in Universities of Henan Province Grant No.2011HASTIT015, PI, 2011.1-2012.12.

项目符号

Multimedia audio and video digital copyright protection system research and development, sponsored by Henan Province Key Technologies R & D Program Grant No.102102210556, PI, 2011.

项目符号

Multi-Party trust research based on security policies game control for DRM, sponsored by the National Natural Science Foundation Grant No.60803150, 2011.

项目符号

Research on the usage control system for digital content trusted authorize, sponsored by Henan Province Key Technologies R & D Program Grant No. 092102210295, PI, 2011.

项目符号

Delegation authorization and access control technology research in computer sponsored cooperative work, sponsored by Henan Province Key Technologies R & D Program Grant No.092102210413, PI, 2010.

项目符号

XXX software development, sponsored by the China Aviation Industry Institute 613, PI, 2012.

项目符号

Research on key technology of mobile terminals trusted access, responsible for researching on trusted measurement method, 2012.

项目符号

Research on image fusion system based on the multi-scale geometric analysis, sponsored by Henan Province Key Technologies R&D Program Grant No.082102240115, responsible for systems analysis, 2010.

项目符号

Research on the standardization roadmap of digital rights management and “Information Technology Digital Rights Management Terminology", sponsored by The National Standardization Management Committee Grant No.20080200-T-339, Core Drafter, 2008.5-2013.12.

项目符号

Visual object encoding mechanisms of the human brain, sponsored by The National Natural Science Fund project No.61003234,  responsible for system platform design, 2006.

项目符号

Embedded network interface based on middleware technology, sponsored by Project sponsored by the major science and technology of Ministry of Education, No.03081, responsible for overall design, 2006.

项目符号

Research on information retrieval model and processing mechanism based on agent, sponsored by Project sponsored by Natural science basic research of Henan Province Grant No.200410464004, responsible for system design, 2006.

项目符号

Flood control command and decision support system of Heilongjiang Province, responsible for the design and implementation of database security engineering, 2002-2003.

项目符号

The database security management system based on Oracle metadata (DBSMS), responsible for the overall design and research, 2002-2003.


项目符号

Papers, Editorials, Reports & Dissertations [Back]


项目符号

Academic Monographs [Back]

项目符号

Arun Kumar Sangaiah, Michael Sheng, Zhiyong Zhang. Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier, 2017. (ISBN: 9780128133149) [Html]

 

项目符号

Zhang Zhiyong, Zhao Changwei, Wang Jian. Social Media Networks Security Theory and Technology [M]. Beijing: Science Press, 2016. (ISBN 978-7-03-048711-7) [Html]

Brief Introduction: In recent years, social media networks security not only is the research focus of the multidisciplinary field including information technology, information management and social science and so on, but also is a challenging open issue that the interdisciplinary sciences are facing with. This book comprehensively discusses the latest efforts in the research of social media network security related theories, technologies and methods, and presents the CyVOD, a prototype system of self-developed multimedia social network prototype system. The book is divided into five parts: the first part is the basic of social media networks; the second part presents the trust assessment issue on social media user; the third part, the secure dissemination and risk management in social media networks; the following part, the access control, delegation authorization and security policies' game-theory for multimedia social networks; the last part, the prototype system of multimedia social network and future research prospects. The monograph also covers the following main works:

[1] Z. Zhang, B. B. Gupta. Social Media Trustworthiness and Security: Overview and New Direction. Future Generation Computer Systems, 2016. DOI: 10.1016/j.future.2016.10.007
[2] Z. Zhang, R. Sun, C. Zhao, C. K. Chang, B. B. Gupta. CyVOD: A Novel Trinity Multimedia Social Network Scheme. Multimedia Tools and Applications, 2016. DOI: 10.1007/s11042-016-4162-z
[3] W. Feng, Z. Zhang, J. Wang, L. Han. A Novel Authorization Delegation for Multimedia Social Networks by using Proxy Re-encryption. Multimedia Tools and Applications, 2016, 75(21): 13995-14014.
[4] Z. Zhang, K. Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks. The Computer Journal, 2015, 58 (4): 668-678.
[5] Z. Zhang, Z. Wang, D. Niu. A Novel Approach to Rights Sharing-Enabling Digital Rights Management for Mobile Multimedia. Multimedia Tools and Applications, 2015, 74 (16): 6255-6271.
[6] Z. Zhang, K. Wang. A Trust Model for Multimedia Social Networks. Social Networks Analysis and Mining, 2013, 3(4): 969-979.

Online Buy: [DangDang] [Amazon] [Science Press]

项目符号

Zhang Zhiyong. Security, Trust and Risk in Digital Rights Management Ecosystem [M]. Beijing: Science Press, 2012. (ISBN 978-7-03-034335-2) [Html]

Brief Introduction: The monograph has an objective to make an interesting insight on security, trust and risk in DRM ecosystem from interdisciplinary perspective. The state-of-the-art of DRM  technologies is firstly presented, and then the book proposed a tradeoff between DRM security and utility by cost-effectively adopting and deploying of security policies and mechanisms, in order to implement an optimal security-utility equilibrium and establish the multi-stakeholder trust in DRM ecosystem. And also, the book has an in-depth investigation on security risk management in the copyrighted content value chain. Finally, a comprehensive multimedia DRM application case for digital home networks was highlighted. This monograph is intended for research scientists, engineers, developers and high-level administrators of digital rights management ecosystems and applications, and also for advanced-level students in computer science, information technology and management science.

Up to now, Digital Rights Management (DRM) has been still a burning and challenging research topic since 1990s. In digital world and the DRM-enabling digital content value chain, various stakeholders don’t fully trust one another due to their own rights and benefits, thus leading to a fact that the security techniques become the basis of multi-participant trust. Existing security technology-related works primarily focus on content protections and secure disseminations by using cryptographic algorithms and secure protocols, trusted and controlled usages of copyrighted digital assets at the general-purpose or special-purpose user terminal devices, together with watermarking-based copyrights infringements tracking and prosecutions. No doubt that these typical security policies and usage restrictions are indispensable to DRM ecosystem, but the other cover of a coin, they give birth to several unexpected issues, such as the weaker system interoperability and usability, as well as higher security overheads. The simple adoptions of those general or increasingly enhanced security policies for DRM ecosystem would have negative influences on the utilities of participants without the consideration of the rational decision-making. Therefore, the adoptions of DRM security policies, the establishment of multi-stakeholder trust and security risk management become three essential aspects.
The monograph has an objective to make an interesting insight on security, trust and risk in DRM ecosystem from interdisciplinary perspective. There are involved with a tradeoff between DRM security and utility, in order to implement an optimal security-utility equilibrium and establish a multi-participant trust for various participants in the content value chain, by cost-effectively adopting and deploying of security policies and mechanisms. And also, inspired by risk management, we made in-depth investigation on security risk management in content value chain. Finally, we gave a DRM application case for Digital Home Network and a prototype on copyrighted multimedia content.

    Online Buy: [Amazon] [DangDang] [BooksChina.com.tw]

项目符号

Zhang Zhiyong. Risk Assessment and Management [M]. USA: Academy Publish, 2012. (ISBN 978-0-9835850-0-8) [Html]

Brief Introduction:  The broad definitions of a risk can be summarized as probability and/or impact of unfortunate events, or the quantifiable likelihood of loss. As soon as a probability of a loss occurs we need to asset it, model it and manage it to try to minimize the realization of mentioned unwanted opportunities. Risks can be found anywhere from financial markets, projects, natural causes, national securities, industrial processes, health, science experiments and so forth. Therefore, we need to manage the risks. Using ISO 31000 definition, risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate event or to maximize the realization of opportunities. While risk itself ISO defines as effect of uncertainty on objectives, whether positive or negative.
Risk assessment and management papers should describe important applications in the field of interest such as engineering, science, manufacturing, business, homeland security, management, and public policy. Use high mathematics or avoid it whenever possible by taking into consideration case studies; incorporate examples, illustrate analytical methods, discuss problems and possible solutions. Write a paper that will become a source for academic, industry, and government professionals in such diverse areas as homeland and cyber security, healthcare, the environment, physical infrastructure systems, engineering, business, and more.
Topics include as follows: Methods, Principles of risk management, Risk assessment in several main fields as information security, project management, software evolution and public health, etc.

    Online Download: [Html]

项目符号

Zhang Zhiyong, Fan Kefeng. Digital Rights Management and Security Technology [M]. Beijing: National Defense Industry Press, 2013. (ISBN 978-7-118-08659-1, in Chinese) [Html]

Brief Introduction:  This book fully discusses and presents the relevant theories and methods, key technologies, standards and technical specifications at home and abroad, as well as a prototype system in the field of Digital Rights Management (DRM). There are involved with four parts in the book. The first part emphatically analyzes the DRM architectures and the state-of-the-art of researches; the second one studies the cryptographic techniques for DRM, usage control and digital watermarking technologies that are very essential to DRM ecosystem; the third part represents DRM security enhancement system, technical standards and specifications of domestic and overseas, and the prototype system we developed; final part proposes some open issues and challenges of DRM, for instance, the Digital Rights Management and trust evaluation in multimedia social network.

This book is not only suitable for the related researchers, industry engineers and technicians, governmental administrators and decision-makers who work for digital rights management, information system security, information management and e-commerce, but also is used as textbook or references for postgraduates and senior undergraduates in the universities and institutes.

 

    Online Buy: [Amazon] [China-Pub] [DangDang]

项目符号

Zhang Zhiyong, Fan Kefeng, Xiang Fei (Translators),  Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, et al. Cyber Security Policy Guidebook [M]. Beijing: National Defense Industry Press, 2014, 11. (ISBN 978-7-118-09824-2, Chinese Edition) [Html]

Preface: The idea for this book coincided with a conference on Cyber Security Policy (SIT 2010). The conference had sessions ranging from security technology investment decisions by venture capitalists to the implications of cyber security policy on personal privacy. Though all speakers were experts in their field and were asked to address cyber security policy topics, many instead focused on strategy or technology issues. Even where it was clear that policy was being discussed, policies were often not articulated clearly enough for panelists and audience members to participate in informed debate. This observation itself became the buzz at the conference and made it a truly memorable experience for many who attended.
The experience made it clear that cyber security policy means different things to different people, even those who work in cyber security. This conclusion led us to the format of this book. That is, the book is designed to lead the reader through concepts that are individually easy to assimilate, and collectively provide a solid understanding of the field of cyber security and the place of policy within it.
We also knew that there is no one person experienced enough in cyber security to have been able to single-handedly write this book. The team was chosen to ensure that all the major fields of experience in cyber security were covered. Each contributed to chapters and sections that were specific to their experience. However, all chapters were scrutinized by all authors to ensure a cohesive presentation for the expected variety of readers. Policy is the domain of authoritative executives. Executive authority may stem from the social contracts by which governments are established or the domain of a private enterprise. This book was written with those executives in mind, but it is not intended solely for their consumption. In order that cyber security policy analysis receive the critical scrutiny essential to sound legislation on both public and private fronts, the audience for this book must extend to executive advisors, educators, researchers, legislative staff, and practitioners in the field. Though each member of the audience brings his or her own background and experience to the material presented herein, we expect that current concepts on cyber security policy will be enriched by sharing this common presentation framework and nomenclature with colleagues in the same field, whose professional experience has exposed them to cyber security issues of varying scope. Most literature about cyber security falls into two categories: technology and advice. This book will refrain from technical jargon and also from recommendations with respect to decisions in any given case of cyber security policy. Although the book endeavors to explain technology issues in cyber security, it does so in layman’s terms. At the same time, the book emphasizes the importance of critical and analytical thinking about decisions with respect to cyber security and will equip the reader with descriptions of the impact of specific policy choices, letting the reader decide whether to view that impact as positive or negative. This guidebook integrates explanations of cyber security policy alternatives across potential executive, legislative, judiciary, commercial, military, and diplomatic action. Readers across these disciplines are expected to view its content through the lens of their own area of expertise and also gain insights from issues encountered by others. It will be an introductory text for the uninitiated, while at the same time providing a holistic reference for experts in the field of cyber security.

Online Buy: [Amazon] [DangDang] [Jing Dong]



 

项目符号

Standards, Patents & Computer Software Copyrights [Back]

项目符号

Information Technology - Digital Rights Management - Terminology, National Standardization of The People's Republic of China (GB/T 30247-2013), Standardization Administration Committee of The People’s Republic of China, 2013.

项目符号

Interactive Platform for Digital Television Receiving Equipment, The First Part: System Architecture, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.1-2015), 2015.

项目符号

Interactive Platform for Digital Television Receiving Equipment, The First Part: Application Programming Interface, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.2-2015), 2015.

项目符号

Interactive Platform for Digital Television Receiving Equipment, The First Part: Test Specification, Electronic Industry Standardization of The People's Republic of China (SJ/T 11521.3-2015), 2015.

项目符号

A Method for Sharing Digital License Right Certificate between Terminal Equipments. ZL 201310432119.1, 2016.

项目符号

A Method for Transferring Digital License Right Certificate between Terminal Equipments. ZL 201310431675.7, 2016.

项目符号

A Method and System for Digital Content Sharing of Digital Network. ZL 201110314236.9, 2013.

项目符号

A Digital Copyright Protection System for Multimedia Audio and Video. ZL 201320035188.04, 2013.

项目符号

A Digital Rights Management System Based on Trusted Computing. ZL 201220001056.05, 2013.

项目符号

A Method of Digital Content Distribution for Multimedia Social Networks. ZL 201110188334.2, 2011.

项目符号

A Method of Digital Content Trusted Usage Control Based on Cloud Computing. ZL 201110395752.9, 2011.

项目符号

A Biometrics-Based Method for Remote Authentication, ZL 200810150642.4, 2010.

项目符号

An Enhanced Security Method for Fingerprint Fuzzy Vault System, ZL 200810150579.4, 2010.

项目符号

A Biometric-Based Encryption Method, ZL 200810150646.2, 2011.  

项目符号

Multimedia Social Network Platform V2.0 (Computer Software Copyrights). 2016SR111178, 2016.

项目符号

Multimedia Social Network Platform V1.2 (Computer Software Copyrights). 2016SR034178, 2016.

项目符号

Multimedia Social Network Platform V1.1 (Computer Software Copyrights). 2015SR133496, 2015.

项目符号

Mobile Multimedia Digital Rights Management Player V3.1 (Computer Software Copyrights). 2015SR040282, 2015.

项目符号

Network-Based Map Marker Decision-Making System V1.0 (Computer Software Copyrights). 2014SR133532, 2014.

项目符号

Multimedia Social Network Platform V1.0 (Computer Software Copyrights). 2014SR068647, 2014.

项目符号

Mobile Multimedia Digital Rights Management Player V3.0 (Computer Software Copyrights). 2014SR070147, 2014.

项目符号

Mobile Multimedia Digital Rights Management Player V2.1 (Computer Software Copyrights). 2014SR014629, 2014.

项目符号

DRM Player Audio & Video Digital Content Security Usage Control System V3.0 (Computer Software Copyrights). 2014SR005237, 2014.

项目符号

AES-Based Digital Content Encryption Software V1.0 (Computer Software Copyrights). 2014SR000851, 2014.

项目符号

iOS-Based Mobile Multimedia Player V1.0(Computer Software Copyrights). 2013SR096143,2013.

项目符号

Mobile Multimedia Digital Rights Management Player V2.0 (Computer Software Copyrights). 2013SR076402, 2013

项目符号

Mobile Multimedia Digital Rights Management Player V1.0 (Computer Software Copyrights). 2013SR050957, 2013.

项目符号

DRM Player Audio & Video Digital Content Security Usage Control System V2.0 (Computer Software Copyrights). 2013SR006111, 2013.

项目符号

Mobile Multimedia Audio and Video Player (Computer Software Copyrights). 2012SR053601, 2012.

项目符号

DRM Player Audio & Video Digital Content Security Usage Control System V1.0 (Software Copyrights). 2011SR048666, 2011.

项目符号

Digital Content Management System for Online Audio and Video (Software Copyrights). 2011SR043045, 2011.

项目符号

Cross-Platform Digital Content Encryption Software (Software Copyrights). 2011SR080603, 2011.

项目符号

Online Questionnaire Survey Platform (Software Copyrights). 2011SR083652, 2011.

项目符号

Computer Supported Cooperative Work Platform Access Control System (Software Copyrights). 2010SR034617, 2010.


项目符号

Prototypes & Demos  [Back]

项目符号

Multimedia Social Network Platform, V1.0, V1.1 (2013-2015)
How to comprehensively explore, improve and deploy multimedia social network (MSN) has become a significant topic, no matter for
traditional multimedia applications or the emerging personal and mobile multimedia. More and more MSNs offer convenient tools, services, and applications for multimedia content including audio and video that can be shared among users, but multimedia security and digital rights management (DRM) is meanwhile highlighted due to easier distributions of valuable, confidential or copyrighted multimedia content within the social networks. The platform focuses on a comprehensively trinity scheme of multimedia social network integrating such three functions as multimedia content security, social recommendation algorithms and DRM. Based on the scheme, a cross-platform MSN enabled with both online and offline, named as CyVOD (VOD·Cyclone), was realized and deployed in open Internet. Compared with the existing representative MSNs, the proposed scheme is holistic approach to the tradeoff on both multimedia content security and efficiency of content/user recommendation. The platform of the multimedia social network is divided into two parts: foreground and background. The foreground is oriented to users while the background is administrator-oriented. Users are allowed to register, log in, search, preview audio and video and download the full encrypted version, purchase or share the digital license, and upload audio and video. With the authority of setting access rights for the uploaded contents, tampering and unauthorized transmissions may be prevented. For administrators, modifications, deletions, retrievals and audits of the multimedia contents users upload, adding and removal of common users and administrators are allowed. More importantly, administrators set the secure login policies for the good of foreground users so that the suspected login of illegal users is avoided.
This system was registered by The Computer Software Copyright of China (Registration No.
2014SR068647, 2015SR133496).

项目符号

Player software for mobile multimedia digital rights management, V1.0, V2.0 (2012-2013)
T
his system is oriented for digital rights management of both audio and video at the Android mobile terminal. There system selected Android system which has the most market share in the mobile terminal as the target platform, GUI using Java language to develop, development environment is Android SDK+ADK+Eclipse for windows; Players kernel using C/C++ language to develop, development environment is GCC and other tools needed by Android source code for the Linux. Eventually realized the mechanism of encrypted audio and video content based on digital license and separation send digital rights, the binding function of License and device hardware information, and the function of user license sharing for Android platform. Meeting the requirements of audio and video authorization usage control and digital right management for mobile terminal Android platform, and the system runs stably, friendly man-machine interface and is easy to use.
Mobile DRM Player V2.0 compared with V1.0, the new function Mainly including: The license using standard XML language format, binding the license and native device unique identification number, The decryption key of audio and video in license using ciphertext to store; The function of user rights sharing, Users can share the license rights on the device to other users or devices, While other devices having the rights, native device license rights to make the appropriate changes (such as accordingly reducing the authorization play times).
This system was registered by The Computer Software Copyright of China (Registration No. 2013SR050957, 2013SR076402,
2014SR070147, 2015SR040282).

项目符号

DRM Player Audio & Video Digital Content Security Usage Control System, V1.0, V2.0 (2011-2013)
The system for digital audio and video control of full life cycle process, realize the important function of digital content based on cryptographic protection and its license’s generation , permits issued, trusted distribution, secure use and transfer and so on. Through using the method of Separation and distribution of digital content and its license and authorization usage control to prevent abuse and arbitrary sharing of resources, and achieve the function of security usage control and digital copyright protection for audio and video resources. The system is divided into two parts, Server and Client, Server mainly realizes the function of Digital content package which is based on 3DES cipher algorithm as well as Digital license generation of Content encryption key and authorization privileges, etc; Client mainly realizes the function of the decryption of digital audio and video content and playback usage control and authority transfer, etc.
Using C++ language, this system has realized security usage control Prototype system DRM Player for the full life cycle of digital audio and video content, which has effective protection for Authorized use and digital rights of audio and video content , realizing the Limited times security usage control function of digital audio video that Located in the user terminal, as well as security and controlled between users, flexible digital rights transfer, and the system runs stably, friendly man-machine interface and is easy to use.
System V2.0 for DRM audio and video digital content security usage control compared with V1.0, the new function Mainly including: The server added the function of binding the digital certificate and user's machine hardware information, and the function of encryption storage for digital certificate, making the digital certificate stored on the user's machine more security and controllable; The client GUI added the function of displaying the machine hardware information, the DOS interface added the function of diagnosis and displaying the specific cause of the encrypted audio video can’t play and checking the license hardware information.
This system was registered by The Computer Software Copyright of China (Registration No. 2011SR048666, 2013SR006111).

项目符号

Mobile Multimedia Audio and Video Player (2011-2013)
In recent years, with the progress of electronic information science and technology, the function of mobile phone that Consumers used is no longer just pure communications business, emergence of smart phones, music phones, Android phones, iPhone mobile phones, etc, function has developed to data services, internet services and multimedia services ,etc. The Multimedia audio and video playback function of mobile phone has become an important part of people's concern, a good performance of the mobile terminal multimedia audio and video player software to be favored. Compared with the traditional multimedia audio and video player, Mobile playback audio and video is easier to carry and use, which has a good market and application prospect.
Using the Eclipse development environment, by using SDK and ADT plugin for development and completion, which is a multimedia application software based on Android mobile phone platform system. The software can satisfy the basic needs of the use and playback of general multimedia audio and video for users, and the system runs stably, friendly man-machine interface and is easy to use.
This system was registered by The Computer Software Copyright of China (Registration No. 2012SR053601)

项目符号

Digital Content Management System for Online Audio and Video (2009-2011)
The system is based on open Internet platform, Designing And Realizing an audio and video digital rights management system , setting digital content resource online publishing, authorization management, usage control and License Transfer as a whole. Through using the method of authorization usage control for digital content to prevent abuse and arbitrary sharing of resources, and achieve the function of digital copyright protection for audio and video resources. The system is divided into two parts, foreground and background, Foreground mainly realizes the user to the purchase of digital content, Play online usage control, Security transfer of user licenses and Online Register and other functions. Background is mainly used for the management and distribution of digital audio and video , and the authorization management of registered user.
Using ASP.NET technology, Dreamweaver and C# as the proscenium development tool, Visual Studio 2008 as the development platform, SQL Server 2005 as the background database, The system has realized audio and video security usage control function about time limit and restrict deadline and limit the number of online audio and video, As well as the flexible between users, security and controlled of digital rights transfer, and the system runs stably, friendly man-machine interface and is easy to use.
This system was registered by The Computer Software Copyright of China (Registration No. 2011SR043045).

项目符号

iOS-Based Mobile Multimedia Player (2013)
The software is based on Objective-C, Using the iOS controls and XCode programming environment to realize the broadcast and the program interface processing of all kinds of media, this software integrated with audio and video playback function, meeting the basic needs to the use and broadcast of the general multimedia audio and video for user, and the system runs stably, friendly man-machine interface and is easy to use.
This system was registered by The Computer Software Copyright of China (Registration No. 201
3SR096143).

项目符号

Online Questionnaire Survey Platform (2010-2012)
With the increasing popularity of the Internet and the rapid growth of network users, Internet users gradually from professionals developed into a variety of general staff, Making more and more enterprises and researchers begin to use the Internet as a means of questionnaire survey. So, the opening online questionnaire survey management system is also needed to more and more people. This system has designed and implemented for the open web platform, implementing the create, distribute, manage, fill in and submit to all kinds of questionnaire survey and statistics comprehensive online survey management system. mainly including the development of survey papers to create and publish module, The questionnaire answers module, respondents management and email invitation module etc.
Using ASP.NET technology and C# as the proscenium development tool, SQL Server 2005 as the background database, Visual Studio 2008 as the development platform, this system has mainly realized the function of proscenium member registration, the questionnaire survey to create, release, etc; It is used for database management, to add, delete, and update on questionnaire for the administrator and the management of the registered user information, and other functions in background .
This system was registered by The Computer Software Copyright of China (Registration No. 2011SR080603).

项目符号

Network-Based Map Marker Decision-Making System V1.0 (2014)
With the rapid development of Internet and mobile Internet, and the public with the desires and requirements of participating the landscape and landmark design are more stronger. In the landscape planning filed, traditional top-down planning methods are not suitable for the current development. This system is aimed at using the convenient of internet and electronic map and changes the traditional pattern of artificial questionnaire investigate and makes users complete the map labeling of interesting scenery and landscape. Thus the system forms a statistic data, so that the data is used for designing decision support and reference of designer.

The system uses ASP.NET technology, with the Dreamweaver and C# as the foreground development tools ,Visual Studio 2008 as the development platform, SQL Server 2008 as the database and Baidu map as the interface. The system realizes the major functions of map labeling, survey questionnaire and data analysis etc.. And, the system runs stably and man-machine interface is friendly and easy to use.

This system was registered by The Computer Software Copyright of China (Registration No. 2014SR133532).

项目符号 Cross-Platform Digital Content Encryption Software (2010-2011)
The system for the actual needs of digital copyright protection of digital audio and video content copyright in the whole life cycle, Implements the process of server-side based on 3DES cipher algorithm digital content encryption and packaging ,which Suitable for Liunx and Windows two kinds of operating system platform, having cross-platform ability.
Using Java language, this system has realized the cross-platform digital audio and video content server encryption and decryption software, Effectively protecting the safe use and digital copyright of audio and video content, and the system runs stably, friendly man-machine interface and is easy to use.
This system was registered by The Computer Software Copyright of China (Registration No. 2011SR080603).
项目符号

Computer Supported Cooperative Work Platform Access Control System (2003-2005)
This system adopts RABAC (Role-Activity-Based Access Control) of proprietary intellectual property rights for CSCW model, which has realized access control and authorization management system for computer sponsored cooperative work (CSCW) system. The system includes the management of collaborative tasks, activities (tasks), collaborative users, collaboration entity and so on, as well as the centralized general authorization and User-level delegation authorization of CSCW system data resources. in addition, the effective management to collaborative role and rules of user operation permissions for this system, which can better realize authorization management of the resource access and access control required minimum privilege, separation of duties, pumping leisure right three basic security features.
This system can be effectively applied to the CSCW platform, the main function can better realize the main function about resource access ability of authorization management and entrust ,also can be easily transplanted to other information management system, ERP system, realize the security access control of enterprise units confidential sensitive data resources.
This system was registered by The Computer Software Copyright of China (Registration No. 2010SR034617)

项目符号

Database Security Management System for Oracle (2000-2003)
This system systematically designs and implements the database security management system, which adopts the RBAC and multilevel mandatory access control model ,including the security session management, user and role management, safety rule base management, multi-level security identification management, as well as the database audit function, etc. This system is suitable for the information system which is based on the construction of enterprise data information security platform of large-scale database Oracle, which has been practical applied in the engineering database system security in Flood control command decision support system in Heilongjiang Province provincial water resources bureau, to good effect.
This system can be easily transplanted to Sybase, SQL Server and other mainstream database system in large-scale information management system and ERP  as back-end data management, and realize seamless docking with them.


项目符号

The Research Group [Back]

项目符号

Brief Introduction (From SIGDRM™ to MCS): The Multimedia Content Security Innovative Research Group (MCSIRG, formerly SIGDRM™, EST. 2006) funded by The Education Department of Henan Province, affiliated to Henan University of Science and Technology, is chaired by Dr. Zhiyong (Zeroun) Zhang as Henan Province Distinguished Professor. As the special group culture, SIGDRM Weekly Letters and The Zeroun's Meeting (Biweekly Seminar) were established by Prof. Zhang in 2013 Dec and 2015 Mar, respectively, with an endeavor to create a better academic atmosphere than ever.  

In recent years, aiming at digital rights management for consumer electronics, multimedia social networks analysis and mining, multimedia cloud computing and security, the group members have dedicated themselves to carry out a number of national and provincial research projects that National Natural Science Fund of China, Plan For Scientific Innovation Talent of Henan Province, Plan for Innovation Talents of Science and Technology in Universities of Henan Province, China Postdoctoral Science Foundation, as well as The Key Science and Technology Program of Henan Province, etc. At the same time, Henan University of Science and Technology as the main drafter, they participated to draft China National Standards named as “Information technology digital rights management terminology ", and electronic industry standard specifications. In recent years, the group published above 100 papers in well-known academic journals, such as "Computer Journal", "Neural Network World", "Intelligent Automation & Soft Computing", "Multimedia Tools and Applications", "Social Network Analysis and Mining", "Discrete Applied Mathematics", "Chinese Electronic Journal (English version)", "Journal of Communication," “Journal of Computer Aided Design and Graphics”, as well as in international conferences as IEEE CCNC2009, IFIP NPC2007, ACM HPCS2010. There are above 60 papers indexed by SCI & EI Compendex. They held over 10 authorized China national invention patents, and 20 items of copyrighted computer software productions as "the multimedia audio and video digital copyright protection system of DRM Player V3.0". The research group has 10 faculty members, including 7 professors and doctors, 4 master's supervisors, 10 or so postgraduate students pursuing their degrees. There are above 10 postgraduates in total have been awarded the China National Scholarship for Postgraduate, First and Second Scholarship of Henan University of Science and Technology. Especially, a postgraduate was awarded as "Henan Province Best Postgraduate Thesis" in 2014. The group includes four Research Teams according to the ongoing research funds, i.e. Multimedia Social Network Security and Privacy (S&P) , Social Media Big Data Analysis and Mining (A&M), Multimedia Social Network Platform Research & Development (R&D) and Cryptography Fundamental Research and Applications (C&A), together one CyVOD Development Team. The research directions of the group focus on (1) Multimedia Social Networks Security and Privacy Protection, (2) Multimedia Social Networks Big Data Analysis and Mining, (3) Multimedia Social Networks Architecture and Wisdom, (4) (Mobile) Multimedia-oriented Digital Rights Management, (5) Frontier Cryptography Theories and Applied Cryptography, as well as (6) Information Technology & Information Management Convergence.

项目符号

(Dr. ZHANG Zhi-Yong, R&D) (Dr. ZHAO Chang-Wei, A&M) (Dr. TU Zi-Ran, C&A) (Dr. LI Yu-Xiang, A&M) 

(Dr. XIANG Fei, C&A)(Dr. JIN Zheng-Fen, A&M)(Dr. NIU Dan-mei, S&P)(Dr. ZHANG Li-Li, S&P)

项目符号 (Miss ZHANG Lan-Fang, Academic Secretary, secretary@sigdrm.org)

项目符号

Editorial Board, Guest Editor/TPC [Back]

项目符号

Editorial Board Member of Multimedia Tools and Applications (2015-, Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721, SCI IF=1.346)

项目符号

Editorial Board Member of Neural Network World (2015-, Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335, SCI IF=0.479)

项目符号

Editorial Board Member of EURASIP Journal on Information Security (2016-, Springer, ISSN: 1687-417X, EI Compendex)

项目符号

Associate Editor of Social Network Analysis and Mining (2013-, Springer, ISSN-Print: 1869-5450, ISSN-Online: 1869-5469)

项目符号

Editorial Board Member of Recent Advances in Electrical & Electronic Engineering (2015-, Online ISSN 2352-0973, Print ISSN 2352-0965, EI)

项目符号

Topic (DRM) Editor-in-Chief of International Journal of Digital Content Technology and Its Applications (2011-, AICIT, ISSN-Print: 1975-9339, ISSN-Online: 2233-9310)

项目符号

Leading Guest Editor, Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks, Journal of Computational Science (Elsevier, ISSN: 1877-7503, SCI IF=1.078) [HTML]

项目符号

Leading Guest Editor, Special Issue on Crowd Computing for Social Media Ecosystem, Applied Soft Computing (Elsevier, ISSN: 1568-4946, SCI IF=2.81) [HTML]

项目符号

Leading Guest Editor, Special Issue on Multimedia Social Network Security and Applications, Multimedia Tools and Applications (Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721, SCI IF=1.346) [HTML]

项目符号

Leading Guest Editor, Special Issue on Applied Soft Computing for Online Social Networks, Neural Network World (Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335, SCI IF=0.479) [HTML]

项目符号

Leading Guest Editor, Special Issue on Security, Trust and Risk in Multimedia Social Networks, Computer Journal (Oxford, ISSN-Print: 0010-4620, ISSN-Online: 1460-2067, SCI IF=0.787) [Guest Editorial] [HTML]

项目符号

Leading Guest Editor, Special Issue on Challenges for Multimedia Content Security in Social Networks , EURASIP Journal on Information Security (Springer, ISSN: 1687-417X, EI) [HTML]

项目符号

Co-Guest Editor, Special Issue on Recent Research in Computational Intelligence Paradigms into Security and Privacy for Online Social Networks (OSNs), Future Generation Computer Systems (Elsevier, ISSN: 0167-739X, SCI IF=2.786) [HTML]

项目符号

Co-Guest Editor, Special Issue on Swarm and Evolutionary Computational Approaches: Recent Advances in Networking and Internet of Things (IoT), International Journal of Networking and Virtual Organisations (ISSN Online: 1741-5225, ISSN Print: 1470-9503) [HTML]

项目符号

Leading Guest Editor, Special Issue on The Challenge of Multimedia Social Networks and Security, Recent Advances in Electrical & Electronic Engineering (Online ISSN 2352-0973, Print ISSN 2352-0965, EI) [Guest Editorial]

项目符号

Leading Guest Editor, Special Issue on Multimedia Contents Security in Social Networks Applications, Journal of Multimedia (JMM, ISSN: 1796-2048, EI) [HTML] [Guest Editorial]

项目符号

Leading Guest Editor, Special Issue on Security, Trust and Risk in Digital Rights Management Ecosystem, International Journal of Digital Content Technology and Its Applications (AICIT, ISSN-Print:1975-9339, ISSN-Online: 2233-9310, EI)


项目符号

Co-Chair, 2016 International Conference on Intelligent Cloud Computing, Wuhan, China, 2016. (ICC 2016)

项目符号

Technical Co-Sponsor, 4th International Conference on Advanced Computing, Networking, and Informatics, Rourkela, India, 2016. (ICACNI 2016)

项目符号

TPC Member, The International Conference on High Performance Computing & Simulation (2010 France, 2011 Turkey, 2014 Italy, 2015The Netherlands, 2016 Austria)

项目符号

TPC Member, International Conference on Future Computational Technologies and Applications (2013 Spain, 2014 Italy, 2015 France, 2016 Italy)

项目符号

TPC Member, International Conference on Advances in Computing, Communications and Informatics, Jaipur, India, 2016. (ICACCI 2016)

项目符号

Chair, Invited Session on Multimedia Social Networks and Soft Computing (ICGEC-2013-IS03), Seventh International Conference on Genetic and Evolutionary Computing (ICGEC-2013), Prague, Czech Republic, 2013. (ICGEC2013, Czech Republic), (ICGEC-2013-IS03)

项目符号

Chair, Invited Session on Multimedia and Cloud Computing Security (ICGEC-2012-IS01), Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, Japan, 2012. (ICGEC2012, Japan), (ICGEC-2012-IS01)

项目符号

Chair, Special Session on Digital Home Networks & Multimedia Contents Protection (DHN-MM 2011), 2011International Conference on High Performance Computing & Simulation, Istanbul, Turkey, 2010. (HPCS2011, Turkey), (DHN-MM2011)

项目符号

Chair, Invited Session on Digital Rights Management (ICGEC-2011-IS01), Fifth International Conference on Genetic and Evolutionary Computing (ICGEC-2011), Taiwan, 2011. (ICGEC2011, Taiwan), (ICGEC-2011-IS01)

项目符号

Chair, Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection (TUN-MM 2010), 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS2010, France), (TUN-MM2010)

项目符号

Chair, Invited Session on  Security and Trust in Ubiquitous Networks (ICGEC-2010-IS06), Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC2010, China), (ICGEC2010-IS06)

项目符号

Chair, Invited Session on Digital Rights Management (IAS-2009-IS15), The Fifth International Conference on Information Assurance and Security, Xi'an, China, 2009. (IAS2009, China), (IAS-2009-IS15)

项目符号 Chair, International Workshop on Digital Rights Management & Contents Protection (CIS-Workshop2009), conjunction with 2009 International Conference on Computational Intelligence & Security, Beijing, China, 2009. (CIS2009, China), (CIS-Workshop2009)

项目符号

Call For Papers/Chapters [Back]

 


Not Available Now.


 

项目符号

Past and Closed Special Issues/Book Chapters/Workshops/Invited Sessions

 

项目符号

Elsevier Book Chapters :Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Elsevier series on: Intelligent Data-Centric Systems: Sensor Collected Intelligence  [Official Website]

项目符号

Special Issue on The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks, Journal of Computational Science (Elsevier, ISSN: 1877-7503), [Official Website, html] [Call for Papers, PDF, 126k] [WikiCFP, html] [CCF, html]

项目符号

Special Issue on Crowd Computing for Social Media Ecosystem, Applied Soft Computing (Elsevier, ISSN: 1568-4946) [Official Website, html] [Call for Papers, PDF, 87k] [WikiCFP, html]

项目符号

Special Issue on Swarm and Evolutionary Computational Approaches: Recent Advances in Networking and Internet of Things (IoT), Int. J. of Networking and Virtual Organisations (InderScience, ISSN Online: 1741-5225, ISSN Print: 1470-9503) [Official Website, html] [Call for Papers, PDF, 223k] [WikiCFP, html]

项目符号

Special issue on Recent Research in Computational Intelligence Paradigms into Security and Privacy for Online Social Networks (OSNs), Elsevier Future Generation Computer Systems (Elsevier, ISSN: 0167-739X)  [Official Website, html] [WikiCFP, html]

项目符号

Special Issue on Applied Soft Computing for Online Social Networks, Neural Network World (Czech Republic, ISSN-Print: 1210-0552, ISSN-Online: 2336-4335) [Official Website, html] [Call for Papers, PDF, 103k] [WikiCFP, html]

项目符号

Special Issue on Multimedia Social Network Security and Applications, Multimedia Tools and Applications (Springer, ISSN-Print: 1380-7501, ISSN-Online: 1573-7721) [Official Website, html] [Call for Papers, PDF, 202k] [WikiCFP, html]

项目符号

Special Issue on Challenges for Multimedia Content Security in Social Networks, EURASIP Journal on Information Security (Springer, ISSN: 1687-417X) [Official Website, html] [Call for Papers, pdf] 

项目符号

Special Issue on Multimedia Social Networks Security and Big Data Analysis, International Journal of Big Data Intelligence (InderScience, ISSN-Print: 2053-1389, ISSN-Online: 2053-1397) [Official Website Html][CCF Html]

项目符号

Special Issue on Security, Trust and Risk in Multimedia Social Networks, The Computer Journal (Online ISSN 1460-2067 - Print ISSN 0010-46200-46200-4620) [Html]

项目符号

Invited Session on Multimedia Social Networks and Soft Computing (ICGEC-2013-IS03), Seventh International Conference on Genetic and Evolutionary Computing (ICGEC-2013), Prague, Czech Republic, 2013. (ICGEC-2013-IS03)

项目符号

Special Issue on Intelligence Digital Content Security, International Journal of Digital Content Technology and Its Applications (http://www.aicit.org/jdcta/global/si.html?jname=JDCTA#S44)

项目符号

Invited Session on Multimedia and Cloud Computing Security (ICGEC-2012-IS01), Sixth International Conference on Genetic and Evolutionary Computing (ICGEC-2012), Kitakyushu, Japan, 2012 (ICGEC2012, Japan), (ICGEC-2012-IS01)

项目符号

Special Issue on Multimedia Content Security in Social Networks Applications, Journal of Multimedia (http://www.academypublisher.com/jmm/si/jmmsi_mcs.html)

项目符号

Special Session on Digital Home Networks & Multimedia Content Protection (DHN-MM 2011), 2011International Conference on High Performance Computing & Simulation, Istanbul, Turkey, 2010. (http://cisedu.us/rp/hpcs11/conference/special-sessions/session-01---dhn-mm)

项目符号

Special Issue on Security, Trust and Risk in Digital Rights Management Ecosystem, International Journal of Digital Content Technology and Its Applications (http://www.aicit.org/jdcta/si.html

项目符号

Special Session on Trusted Ubiquitous Networks & Multimedia Content Protection (TUN-MM 2010), 2010 International Conference on High Performance Computing & Simulation, Caen, France, 2010. (HPCS2010, France), (TUN-MM2010)

项目符号

Invited Session on  Security and Trust in Ubiquitous Networks (ICGEC-2010-IS06), Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), Shenzhen, China, 2010. (ICGEC2010, China), (ICGEC2010-IS06)

项目符号

Invited Session on Digital Rights Management (IAS-2009-IS15), The Fifth International Conference on Information Assurance and Security, Xi'an, China, 2009. (IAS2009, China), (IAS-2009-IS15)

项目符号

International Workshop on Digital Rights Management & Content Protection (CIS-Workshop2009), conjunction with 2009 International Conference on Computational Intelligence & Security, Beijing, China, 2009. (CIS2009, China), (CIS-Workshop2009)


项目符号

Readings & Resources [Back]

项目符号

[My IEEE related to Digital Rights Management] [My Google Scholar Citations] [Springer] [WikiCFP] [Academic Resource] [Stanford Large Network Dataset Collection] [IEEE Big Data Initiative] [IEEE Cyber Security Initiative]

项目符号

[Agile Software Development] [Succeeding with Agile] [Gitlab] [Continue Integration] [Continue Integration Article] [Introduction to User Story] [Writing User Story] [Jenkins]

项目符号

[IEEE Transactions on Multimedia (IEEE)] [IEEE Trans. on Consumer Electronics (IEEE)] [IEEE Multimedia Magazine (IEEE)] [ACM Trans. on Multimedia Computing, Communications and Applications (ACM)] [Multimedia Tools and Applications (Springer)] [Multimedia Systems (Springer)] [IEEE Transactions on Dependable and Secure Computing (IEEE)] [IEEE Transactions on Information Forensics and Security (IEEE)] [ACM Transactions on Information and System Security (ACM)] [Computers & Security (Elsevier)] [Neurocomputing (Elsevier)] [Journal of Computer Security (IOS Press)] [EURASIP Journal on Information Security (Springer)] [IET Information Security (IET)] [Journal of Information Security and Applications (Elsevier)] [International Journal of Information Security and Privacy (Idea Group Inc)] [International Journal of Information and Computer Security (InderScience)] [Security and Communication Networks (Wiley)] [International Journal of Network Security (Taiwan)] [Security Informatics (Springer)] [The Computer Journal (Oxford Journals)] [World Wide Web (Springer)] [Personal and Ubiquitous Computing (Springer)] [Journal of Parallel  and Distributed Computing (Elsevier)] [Journal of Computational Science (Elsevier)] [Dynamic Games and Applications (Springer)] [Intelligent Automation and Soft Computing (U.S.A.)] [Neural Network World (Czech Republic)] [Journal of Computational Information Systems (Binary Information)] [Applied Soft Computing (Elsevier)] [Soft Computing (Springer)] [Social Networks (Elsevier)] [Social Network Analysis and Mining (Springer)] [Journal of Cloud Computing (Springer)] [Journal of Cloud Computing: Advances, Systems and Applications (Springer)] [Journal of Internet Services and Applications (Springer)] [Journal of Trust Management (Springer)] [Journal of Big Data (Springer)] [Enterprise Information System (Taylor & Francis)] [Journal of Network and Computer Applications (Elsevier)] [International Journal of Information Security (Springer)] [Future Generation Computer Systems (Elsevier)] [Communications of ACM (ACM)]

项目符号

[MIT Media Lab Affective Computing Group][Social Networks Dataset] [Research Dataset from CCF] [Springer Impact Factor 2014] [WikiCFP] [Papers Invited] [Conferences Alerts] [Springer AuthorMap]

项目符号

[ISU Calendar] [ISU CS] [ISU CS Smart Home Lab] [Software Engineering Research Group] [World's First Electronic Computer] [CoRE 1st Edition] [CoRE 2nd Edition]


项目符号

Miscellaneous [Back]

[IEEE] [ACM] [IFIP] [IEEE Computer Society] [IEEE Systems, Man, Cybermetics Society] [IEEE Consumer Electronics Society] [IEEE Computational Intelligence Society] [IEEE Robotics and Automation Society] [US NSF] [More links...]


项目符号

RecruitmenT  [Back]

The graduates, who are junior and senior majoring in mathematics, computer science and information management science, etc, full of spirit, research interests on the above mentioned fields, and basic technical capabilities, are encouraged to enter SIGDRM™ laboratory. Please send your CV and research plan/consideration to me through E-mail: xidianzzy@126.com. I would give you an offer ASAP based on an overall estimation. MCSL's philosophy is Deep· Dedicated· Determined· Dynamic. Join MCSL/IRG Today. Do what you like, like what you do.  


项目符号

My Office @ IsU (Memorial) [Back]

   Room B26D (Office), Atanasoff Hall

   Department of Computer Science

   Iowa State University, Ames, Iowa 50011, USA

 

 (Pictured by Zhang)


项目符号

My Office @ HAUST [Back]

   Room 509 (Office), Gongke Building #2

   Department of Computer Science

   Henan University of Science & Technology

   263 Kaiyuan Ave, Luolong District

   Luoyang, Henan 471023, P. R. of China

 

(Pictured by Zhang)




SIGDRM Homepage Copyrights ©Multimedia Content Security Innovative Research Group, SIGDRM™ 2006-2017. All Copyrights Reserved.