张勇,1976年生,博士,深圳大学ATR国防科技重点实验室教授,硕士生导师,中国人工智能学会理事,中国航空学会信息融合专业委员会委员、副总干事,中国指挥控制学会青年工作委员会委员,深圳市高层次专业技术人才(地方级)。先后分别于1997年7月在南京通信工程学院获学士学位,2001年3月和2004年6月在解放军理工大学获硕士学位和博士学位,2007年1月于哈尔滨工业大学博士后流动站出站并评为副教授,同年转业到哈尔滨工业大学工作。2007年1月至2008年9月为哈尔滨工业大学深圳研究生院副教授,全面负责信息安全技术研究中心工作。2008年10月调入深圳大学ATR国防科技重点实验室工作。主要研究方向包括:多媒体信息安全、视频分析与检索、云计算、应用软件研发、系统集成与优化等。主持过国家科技支撑计划、国家863项目、国防预研基金、中国博士后科学基金、哈工大校基金、深圳市科技计划、重点实验室开放课题和与华为技术有限公司横向课题等10余项项目研究工作;参与过国家863项目、国家自然科学基金(面上项目和重点项目)、115预研基金、国防预研基金、广东省自然科学基金、广东省科技计划和深圳市科技计划等10余项项目的研究工作。获授权国家发明专利4项,申请国家发明专利5项,申请PCT专利3项,获计算机软件著作权1项,2010年获全军科技进步一等奖1项。已在国内外刊物和会议上发表学术论文40来篇
Zhe-Ming Lu, Bo Li, Qing-Ge Ji, Zhi-Feng Tan, Yong Zhang. Robust video identification approach based on local non-negative matrix factorization, International Journal of Electronics and Communications (AEÜ), Vol.69, No. 1, pp:82-89 , 2015, SCI收录
Qing-Ge JI, Zhi-Feng TAN, Zhe-Ming LU, Yong ZHANG. An Improved Video Identification Scheme Based on Video Tomography, IEICE Transactions on Information and System, Vol.E97-D, No.4, pp: 919-927, 2014, SCI 收录
张海辉,张勇,欧争光. 基于任务驱动的云计算平台漏洞扫描系统,深圳大学学报理工版,2014年1月, 31(1), pp:71-76
LUO Cheng, Zhang Yong and XIE Wei-xin. Traffic Regulation based Congestion Control algorithm in Sensor Networks,Journal of Information Hiding and Multimedia Signal Processing,2014年4月,5(2),pp:187-198,Ei收录
Yong ZHANG,Shi-Ze GUO,Zhe-Ming LU,Hao LUO,Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables,IEICE Transactions on Communications,Vol. E96-B,No. 2,pp: 624-631,,2013,SCI收录
Zhang Yong,Lu ZheMing,Zhao DongNing,An oblivious fragile watermarking scheme for images utilizing edge transitions in BTC bitmaps,Science China-Information Sciences,Vol. 55,No. 11,pp: 2570-2581,2012,SCI收录
Yong ZHANG,Zhe-Ming LU,Color Image Retrieval Based on VQ Index Co-occurrence Graphs,ICIC Express Letters,Part B:Applications,Vol. 3,No. 3,pp: 551-555,2012,Ei收录
Yong Zhang, Zhe-ming Lu, Dong-ning Zhao. Quantization based Semi-fragile Watermarking Scheme for H.264 Video. Information Technology Journal. Vol.9, No.7, July 2010 Pages: 1476-1482, ISSN: 1812-5638,Ei收录
Yong Zhang, Zhe-ming Lu, Dong-ning Zhao. A Blind Image Watermarking Scheme Using Fast Hadamard Transform. Information Technology Journal. Vol.9, No.7, July 2010 Pages: 1369-1375, ISSN: 1812-5638,Ei收录
Y. Zhang, H. Zhang, X. M. Niu. The Key Management of the Encrypted Database Based on XML, International Journal of Innovative Computing, Information and Control, Vol 5, No. 7, July 2009, pp:1919-1926, SCI收录
ABID KHAN, Xiamu Niu and Zhang Yong.A Robust Framework for protecting Computation Results of Mobile Agents, Information Technology Journal, 2008,7(1): 24-31,Ei收录
Abid KHAN, Xia-mu NIU and Yong Zhang. Mobile Agent Computation Results Protection with Head Sealing, International Journal of Computer Sciences and Engineering Systems, Vol.2, No.1, January 2008 Pages: 13-18, ISSN: 0973-4406
Abid Khan, X. M. Niu, Y. Zhang. A Hybrid Approach for Mobile Agent Security using Reversible Watermarking and Dynamic Data Structure. International Journal of Computer Sciences and Engineering Systems, 2007, 1(1): 48-53. ISSN: 0973-4406
张勇, 牛夏牧. 一种用于关系数据库的可逆水印技术.电子学报, 2006年34卷12A期,2425-2428,Ei收录
Y. ZHANG, B. YANG, X. M. NIU. Reversible Watermarking for Relational Database Authentication. Journal of Computers, July 2006, 17(2):59-65.
Y. ZHANG, X. M. NIU, D. N. ZHAO. A Method of Protecting Relational Databases Copyright with Cloud Watermark. International Journal of Information & Communication Engineering, 2005, 1,ISSN: 1307-6884
张勇,赵东宁,李德毅. 相似云及其度量分析方法. 信息与控制. 2004.4 33(2):129-132.
赵东宁,张勇,李德毅. 基于云模型的文本数字水印技术.计算机应用.2003年12月增刊:100-102.
张勇,李长征,赵东宁,王进,蒋谊. 基于云模型的系统指标测试集产生策略. 系统仿真学报. 2003.11 15(11): 1550-1553.
张勇,赵东宁,李德毅. 水印关系数据库. 解放军理工大学学报(自然科学版).2003.10 4(5):1-4.
Y. Zhang, Y. J. Yang, J. P. Xu, H. Wang. A Modified Cluster-based Routing Protocol with Cloud Model. The Eighth International Conference on Intelligent Systems Design and Applications (ISDA2008), November 26-28, 2008, Kaohsiung, Taiwan, 368-372,Ei收录
Xuefeng Bai,Yong Zhang, Xiamu Niu. Traffic Identification of Tor and Web-Mix. The Eighth International Conference on Intelligent Systems Design and Applications (ISDA2008), November 26-28, 2008, Kaohsiung, Taiwan, 548-551,Ei收录
Y. Zhang, J. F. Yin, B. Y. Dai. A Blocking-Resistant Method for Anonymity System Based on Proxy and Data Hiding. The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2008), August 15-17, 2008, Harbin, China, 1321-1325,Ei收录
Y. Zhang, Wei-xin Li, Xia-mu Niu. A secure cipher index over encrypted character data in database. Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC2008, V2, July 12-15, 2008, Kunming, China, 1111-1116,Ei收录
Y. Zhang, W. X. Li, X. M. Niu. A Method of Bucket Index over Encrypted Character Data in Database. The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2007). 26-28 Nov. 2007. Kaohsiung, Taiwan. 186-189,Ei收录
Abid Khan, X. M. Niu,Y. Zhang. Protecting Mobile Agents Computation Results with Reversible Watermarking and Digital Signature. The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2007). 26-28 Nov. 2007. Kaohsiung, Taiwan. 566-569,Ei收录
C. J. Wang, X. M. Niu,Y. Zhang. Anonymity in PKI Environment. The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2007). 26-28 Nov. 2007. Kaohsiung, Taiwan. 570-573,Ei收录
ZHANG G. M.,ZHANG Y., CHEN M., XIONG H. Domain-based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. The Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2006). 18-20 Dec. 2006. Pasadena, California, USA. 282-288,Ei收录
Y. Zhang, J. C. Li, X. M. Niu, C. M. Li. Research on a Novel Hashing Stream Cipher. Lecture Notes in Computer Science, LNAI 4456/2007,481-490. International Conference on Computational Intelligence and Security, CIS2006, Nov 3-6,2006,Guangzhou, China,1339-1344,Ei收录
LI J. C.,ZHANG Y., KONG W. H., NIU X. M. Fingerprint Identification Based on Frequency Texture Analysis. 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), August 30 - September 1, 2006, Beijing. Pp: 121-125.
Y. ZHANG, X. M. NIU, D. N. ZHAO, etc. Relational Databases Watermark Technique Based on Content Characteristic. 2006 International Conference on Innovative Computing, Information and Control (ICICIC2006), August 30 - September 1, 2006, Beijing. Pp: 677-680.
ZHANG Y., NIU X. M., Abid Khan, LI Q., HAN Q. A Novel Method of Watermarking Relational Databases Using Character String. The Fifth IASTED International Conference on Artificial Intelligence and Applications (AIA2006), Innsbruck, Austria, February 13-16, 2006. Pp: 120-124,Ei收录
ZHANG Y., NIU X. M., WU D., ZHAO L. etc. A Method of Verifying Relational Databases Ownership with Image Watermark. ISTM/2005, 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, June 1-4, 2005, Dalian, China. Pp:6316-6319
ZHAO L., LI J. C., XU W. J.,ZHANG Y., NIU X. M.. Establishing A Secure Database Application Environment. ISTM/2005, 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, June 1-4, 2005, Dalian, China. Pp:5801-5803
Zhang, Yong, Niu, Xiamu, Zhao, Dongning. A Method of Protecting Relational Databases Copyright with Cloud Watermark Proceedings of World Academy of Science Engineering and Technology Vol 3, Conference of the World Academy of Science Engineering and Technology, January 26-28, 2005, Paris, France. Pp:68-72