The personal data
ResumeShuai REN was born in 1982, in Taiyuan, Shanxi, going on to earn his Computer Science bachelor degree from Northwest Polytechnical University (NPU) from 2001 to 2005. He later received the master and Ph.D. in Computer Science from NPU respectively in 2008 and 2010. In late 2010, Shuai started to serve as a lecture in School of Information Engineering, Chang’an Univerisity after he graduated from NPU. Later, he became the Master Supervisor in December 2012 and an associate professor in November 2013. From September 2016, he started to visit UCSD as a one-year visiting scholar.Along with his accumulation of research achievement, Shuai, as the first author, released around 24 academic papers, 4 of which were included in Science Citation Index and 10 were included in the Engineering Index. Additionally, he is holding 4 national patents in computer science field. He is in charge of 4 academic projects and has taken part in several engineering and academic projects. Social positionResearchMy interests are all over the map, ranging from the Trusted Computing in Vehicle Network, to the Digital Watermarking, to the Confidential Communication by Digital Carriers, to Low Complexity Algorithm in Digital Media Analysis, to Information Security Risk Assessment for Complicated Systems. Open CourseInformation Hiding (https://www.xuetangx.com/courses/course-v1:CHD+24123150+_/about), Signals and Systems, Introductory Theory of IoT, IoT Security, Digital Image Processing, Network Video Surveillance Technology. Research project2016年 [1] The Mooc Project for “Information Hiding Technology”, founded by National Engineering Master Professional Degree Steering Committee in China, 2016-2017, in charge. 2015年 [1] Information Hiding Technology Research based on Sample Characteristic Recognition and Carrier Cluster Fast Computation, Founded by the National Post-Doctoral Scientific Foundation in China, 2015-2017,in charge. [2] The Application Research on Multi-Carriers Pre-processing Combined with Multi-Sample-Characteristics in Low Perceptibility Confidential Information Sharing. Shaanxi Province Postdoctoral Science Foundation, 2015-2017. 2014年 [1] Confidential Information Sharing-Oriented Research on Cognitive Techniques of Conventional Carriers. Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2014JM2-6105),2014-2016. [2] Information Hiding Research on Tibetan Characters Communication Security. National Natural Science Foundation of Tibet (Grant No. 2015ZR-14-20). 2014-2016. 2013年 [1] Research on High Performance Information Hiding Algorithm for Confidential Communication. Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2013JM8018), 2013-2014. [2]The Application and Industrialization of Relay Protection Information Management Technology for the Power Supply System Security, Xi’an Science and Technology Bureau (CXY1318), 2013-2014. [3] Research on Data Digging and Network Technology for Setting Sheet and Related Documents Classification and Extraction, Hongri Software Company, XAREAUN2013090101. [4]Research on Embedded System Information Flow Measurement and Security Form Testing, The Special Foundation of College and University Subordinated to Education Ministry, 2013G1241118, 2013-2016. 2012年 [1] Risk Assessment Research on the Employment Qualification of Foreigner Experts for Teaching, Jilin Provincial Bureau of Foreign Experts, 2012-7-101-2, 2012-2013. [2] Research on Cross-Regional Intelligent Shipping Identification Recognition and Trusted Safety Environment Key Technology, Ministry of Transportation of China, 2012-364-208-600, 2012-2014. [3] Research and Application of Information Service Technology of Yangtze River Delta Region Shipping Network and Beijing-Hangzhou Canal Intelligent Shipping System, Ministry of Transportation of China, 2012-364-208-200, 2012-2014. 2011年 [1] Research on High-Performance Information Hiding Algorithm and Security Analysis Model, CHD2011JC074, 2011-2012. [2] Research on the Computation Hologram Stripes Show Simulation Device, China Aviation Industry Group, 201111354, 2011-22013. 2009年 [1] Research on the Scanning and Copying Automatic Exposure and Its Stability Surveillance System, China Aviation Industry Group, 20092283, 2009-2012. Thesis2017年 [01] Ren Shuai, Zhang Tao, Yang Tao, Suo Li, Mu Dejun. Information Hiding Algorithm Based on Spherical Segmentation of 3D Model,2017,37 (X):XXXX-XXXX. [02] Ren Shuai, Suo Li, Zhang Tao, Yang Tao, Mu Dejun.Information hiding algorithm based on 3D high efficiency video coding background, Journal of Computer Application. 2017,37 (6):1616-1619. [03] REN Shuai, ZHAO Xiangmo, ZHANG Tao, SHI Fangxia, MU Dejun. Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis. Journal of Computer Science. 2017,44(3):187-191. 2016年 [01] Ren Shuai, Zhang Tao, Fangxia Shi. Research on Information Hiding Scheme for 3D Models Based on Profile Analysis. Journal of Computer Application. 2016, 36(3):642-646. 2015年 [01] Ren Shuai(任帅), Zhang Tao(张弢), Fangxia Shi(石方夏). Characteristic Analysis of Carrier Based on the Filtering and a Multi-wavelet Method for the Information Hiding. Discrete and Continuous Dynamical Systems - Series S (DCDS-S). 2015,8(6):1291-1299 (SCI检索). [02] Ren Shuai(任帅), Zhang Tao(张弢), Fangxia Shi(石方夏). The Application of Improved-DAA for the Vehicle Network Node Security in Single- and Multi-Trusted Domain. Discrete and Continuous Dynamical Systems - Series S (DCDS-S). 2015,8(6):1301-1309 (SCI检索). [03] Ren Shuai(任帅),Zhao Xiangmo(赵祥模),Zhang Tao(张弢),Lou Zongzong(娄棕棕). A Covert Communication-Oriented Carrier Pre- Processing Scheme based on CARDBAL2 and Color Transfer Theory. Applied Mathematics & Information Sciences. 2015, 9 (6):3281-3286. [04] Ren Shuai(任帅),Zhao Xiangmo(赵祥模),Zhang Tao(张弢).Information Hiding for Medical Privacy Protection based on GHM and Canny Edge Detection. Applied Mathematics & Information Sciences. 2015, 9 (3):1587-1592. 2014年 [01] Ren Shuai(任帅), Lei Jingxiang(雷敬祥), Zhang Tao(张弢) and Duan Zongtao(段宗涛). Fast Watermarking of Traffic Images Secure Transmission in Effective Representation Mode. Applied Mathematics & Information Sciences. 2014, 8 (5): 2565-2569. (SCI检索). [02] Shuai REN (任帅), Jing-xiang LEI (雷敬祥), Tao ZHANG(张弢) and De-jun MU(慕德俊). Research of High Performance Information Hiding Scheme Based on Gaussian Pyramid and CARDBAL2 multi-wavelet for Secret Communication. International Journal of Applied Mathematics and Statistics (IJAMAS). 2014, 52 (6):234-251. 2013年 [01] Ren Shuai(任帅), Mu Dejun(慕德俊), Zhang Tao(张弢). Information Hiding Algorithm Based on Gaussian Pyramid and Color Field Structure. International Journal of Digital Content Technology and its Applications (JDCTA). 2013, 7 (5): 222-229. 2012年 [01] Ren Shuai, Mu Dejun, Zhang Tao. THE STUDY ON STRONG INFORMATION HIDING ALGORITHM BASED ON COLOR FIELD STRUCTURE AND GAUSSIAN PYRAMID. Computer Technology and Development. 2012, 23 (9): 131-134. [02] Ren S(任帅), Zhang T(张弢), Mu DJ(慕德俊). Study of Reversible Information Hiding Scheme Based on GHM and ASA. Applied Mathematics & Information Sciences. 2012, 6 (2): 253-260. (SCI检索). [03] Ren Shuai(任帅), Zhang Tao(张弢), Mu Dejun(慕德俊). Study of High Performance Information Hiding Algorithm Based on CL multi-wavelet Transform and Color Field Structure Analysis Process. Advances in Information Sciences and Service Sciences. 2012, 4 (14): 46-52. (EI检索). [04] Ren Shuai(任帅), Zhang Tao(张弢). A High-performance Information Hiding Algorithm Based on CL multi-wavelet transform and DCT. International Journal of Advancements in Computing Technology. 2012, 4 (8): 137-144. (EI检索). [05] Ren Shuai(任帅), Zhang Tao(张弢).Study of high performance information hiding scheme based on CL multi-wavelet and annulus sector analysis. International Journal of Digital Content Technology and its Applications. 2012, 6 (4): 58-68. (EI检索). 2011年 [01] Ren Shuai(任帅), Zhang Tao(张弢). Study of reversible information hiding scheme based on CARDBAL2 and color field structure. Advanced Materials Research. 2011, 225-226: 275-279. (EI检索). [02] Ren Shuai(任帅), Mu Dejun(慕德俊), Zhang Tao(张弢). Study of reversible information hiding scheme based on CL Multi-Wavelet Transform and DCT. The 3rd International Conference on Networks Security, Wireless Communications and Trusted Computing. 2011, 1:35-38. 2010年 [01] Ren Shuai, Mu Dejun, Zhang Tao. A New and Better Information Hiding (IH) Algorithm Based on GHM (Geronimo Hardin Massopust) Multi-Wavelet Transform and Adaptive Color Transfer. Journal of Northwestern Polytechnical University. 2010, 28 (2): 264-269. 2009年 [01] Ren Shuai(任帅), Mu Dejun(慕德俊), Zhang Tao(张弢), Hu Wei(胡伟). Study of Information Hiding Algorithm Based on GHM and Color Transfer Theory. Optoelectronics Letters. 2009, 5(6): 0453-0458. (EI检索). [02] Ren Shuai(任帅), Mu Dejun(慕德俊), Zhang Tao(张弢), Hu Wei(胡伟). Study of Reversible Information Hiding Scheme Based on GHM and Color Mod Vector Structure. Proceedings - 2009 International Conference on Computational Intelligence and Software Engineering, CiSE 2009. (EI检索). [03] Ren Shuai(任帅), Mu Dejun(慕德俊), Zhang Tao(张弢), Hu Wei(胡伟). Study of Reversible Information Hiding Scheme Based on GHM and CBP. 2009 International Conference on Artificial Intelligence and Computational Intelligence, AICI 2009. 2009, 1:345-349. (EI检索). [04] REN Shuai, MU Dejun, ZHANG Tao, YAO Lei. Design and Simulation of User Security in DRMS Based on Trusted Computing. Computer Simulation. 2009, 26 (8): 120-123. [05] REN Shua, MU De-jun, ZHANG Tao, ZHANG De-gang. Peer- to Peer Anonymous Communication Network Based on Trusted Computing. Computer Measurement & Control. 2009, 17 (5): 965-966, 976. [06] REN Shua, MU De-jun, ZHANG Tao, YAO Lei. Survey of Information Security Risk Assessment Methods. Information Security and Communications Privacy. 2009, (2): 54-56. 2008年 [01] Ren Shuai(任帅), Zhang Tao(张弢), Mu Dejun(慕德俊), Zhang Degang(张德刚). Application of Trusted Computing to the Ad Hoc Networks Security. Asian Journal of Information Technology. 2008, 7(8): 370-373. 2006年 [01] REN Shuai, MU De-jun, ZHU Ling-bo. A Model of Information Security Evaluation Based on Gray Analytical Hierarchy Process. Journal of Computer Application. 2006, 26 (9): 2111-2113. 2017年 [01] 任帅,张弢. 《信息隐藏技术》,西安电子科技大学出版社,2017年03月13日,ISBN:9787560644042。 2014年 [01] 任帅,张丽姿,张连华. 《现代多媒体信息处理技术研究》,水利水电出版社,2014年06月01日,ISBN:9787517019107。 Technological AchievementsHonor RewardWork experience |