Dr. Jinghui Peng | Covert Communication | Best Researcher Award
Work Experience 💼:
Dr. Jinghui Peng currently serves as an Associate Professor in the School of Cyber Security at Guangdong Polytechnic Normal University, China, a position he has held since August 2020. Prior to this, he completed his Ph.D. at the University of West London, where he specialized in Information Security. Throughout his academic career, Dr. Peng has made significant contributions to the field of cybersecurity, particularly in areas such as steganalysis and the application of neural networks in secure communications. His work has led to several research grants and collaborations with institutions such as the Guangdong Basic and Applied Basic Research Foundation Committee.
Awards and Honors
Dr. Jinghui Peng has received several prestigious awards and honors in recognition of his contributions to the field of Information Security and cybersecurity. Notably, he has secured multiple research grants, including those from the Guangdong Basic and Applied Basic Research Foundation and the Guangzhou Municipal Science and Technology Bureau. These grants support his ongoing research in cybersecurity and secure communications. His work has earned recognition in the academic community, with several publications in high-impact journals such as IEEE Transactions on Dependable and Secure Computing, further solidifying his standing as a prominent researcher in his field.
Research Interests:
Dr. Jinghui Peng’s research interests primarily focus on Information Security, with a particular emphasis on steganalysis, secure communications, and the application of machine learning techniques such as neural networks. His work explores innovative methods to enhance data protection and privacy, specifically through advanced algorithms and feature fusion techniques. Dr. Peng is also interested in the intersection of cybersecurity and emerging technologies, aiming to develop new solutions for safeguarding digital communications. His research continues to contribute to advancements in the fields of cybersecurity and information security, addressing critical challenges in securing modern communication systems.
📚 Publication
Audio steganalysis using multi‐scale feature fusion‐based attention neural network
- Journal: IET Communications
- Date: 2024-12-16
- DOI: 10.1049/cmu2.12806
- Contributors: Jinghui Peng, Yi Liao, Shanyu Tang
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication
- Journal: IEEE Transactions on Industrial Electronics
- Date: 2021-04
- DOI: 10.1109/TIE.2020.2979567
- Contributors: Jinghui Peng, Shanyu Tang
- Journal: IEEE Transactions on Dependable and Secure Computing
- Year: 2019
- DOI: 10.1109/tdsc.2019.2946138
- ISSN: 1545-5971, 1941-0018, 2160-9209
- Contributors: Jinghui Peng, YiJing Jiang, Shanyu Tang, Farid Meziane
Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
- Journal: Zenodo
- Date: 2019-06-01
- DOI: 10.5281/ZENODO.3299971
- Contributors: Jinghui Peng, Jia Li
- Journal: Engineering Applications of Artificial Intelligence
- Date: 2017-06
- DOI: 10.1016/j.engappai.2016.06.002
- ISSN: 0952-1976
- Contributors: Ran Liu, Jinghui Peng, Shanyu Tang
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking
- Journal: Multimedia Tools and Applications
- Date: 2017-01
- DOI: 10.1007/s11042-015-3224-y
- ISSN: 1380-7501, 1573-7721
- Contributors: Jinghui Peng, Shanyu Tang, Liping Zhang, Ran Liu
An Efficient Approximation Method for Calculating Confidence Level of Negative Survey
- Journal: Mathematical Problems in Engineering
- Year: 2015
- DOI: 10.1155/2015/958154
- ISSN: 1024-123X, 1563-5147
- Contributors: Ran Liu, Jinghui Peng, Shanyu Tang
Conclusion
Dr. Jinghui Peng’s contributions to cybersecurity and information security make him a strong candidate for the Best Researcher Award. His innovative research, impactful publications, industry collaborations, and ongoing commitment to advancing the field highlight his exceptional dedication and achievements in the cybersecurity domain.