上海大學通信與信息工程學院導師:張新鵬
![上海大學通信與信息工程學院導師:張新鵬 上海大學通信與信息工程學院導師:張新鵬](http://img.okaoyan.com/上海大學/3.jpg)
上海大學通信與信息工程學院導師:張新鵬內容如下,更多考研資訊請關注我們網站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費考研資源可以領取,有各種考研問題,也可直接加我們網站上的研究生學姐微信,全程免費答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)
微信,為你答疑,送資源
![](http://m.btfokj.cn/images/okaoyanzuoxi.jpg)
上海大學通信與信息工程學院導師:張新鵬 正文
?個人簡介
辦公室:上海大學寶山校區東區通信樓(翔英樓)815室
通信地址:上大路99號83號信箱上海大學通信學院
郵政編碼:200444
電話:021-66137263
電子郵件:xzhang@shu.edu.cn
?教育經歷
2004年畢業于上海大學通信與信息工程學院,獲工學博士學位
2001年于上海大學通信與信息工程學院獲工學碩士學位
1995年畢業于吉林大學數學系,獲理學學士學位
?工作經歷
2011~2012,德國Konstanz大學,Humboldt學者資深研究員
2010~2011,美國紐約州立大學Binghamton分校,訪問學者
2008~ ,上海大學通信與信息工程學院,教授
2006~2008,上海大學通信與信息工程學院,副教授
2004~2006,上海大學通信與信息工程學院,講師
?研究領域
多媒體信息安全、信息隱藏、數字取證、加密域信號處理、圖像處理
?科研項目
2015~2017,加密圖像壓縮研究,上海市曙光計劃,主持
2015~2018,密文圖像中的可逆信息隱藏,國家自然科學基金,主持
2013~2015,廣義率失真優化的信息隱藏,上海市浦江人才計劃,主持
2012~2015,上海高校特聘教授(東方學者)專項資助,主持
2012~2014,高度安全的數字隱寫研究,教育部博士點基金(博導類),主持
2011~2013,廣義隱寫編碼與多載體安全隱寫研究,國家自然科學基金,主持
2010~2012,數字圖像內容的真偽鑒定研究,上海市科委國際合作項目,主持
2010~2012,數字圖像中的新型安全隱寫,上海市科技啟明星跟蹤計劃,主持
2010~2011,新型數字隱寫編碼研究,教育部科研重點項目,主持
2009~2011,數字圖像真實性的被動取證研究,國家自然科學基金,主持
2009~2011,數字隱寫中的新型編碼研究,上海市教委科研創新重點項目,主持
2007~2009,數字圖像反隱寫關鍵技術,國家高技術研究發展計劃(863計劃),主持
2006~2008,數字圖像中的隱寫分析與反隱寫綜合措施研究,上海市青年科技啟明星計劃,主持
2006~2008,具有統計隱蔽性和抗干擾性的安全密寫研究,國家自然科學基金,主持
2004~2007,抗統計分析的數字圖像密寫研究,上海市科委基礎研究重點項目,主持
2004~2006,具有多重免疫性的安全數字水印協議與算法研究,上海市教委青年基金,主持
?授課情況
信息科技概覽(本科生通識課)
信息時代的思維(本科生新生研討課)
信息論與編碼(本科生)
數字圖像處理(本科生)
信息網絡與安全(本科生)
通信與信息新技術進展(研究生)
?近期論文
International Journal Papers:
1. Z. Qian, and X. Zhang, Reversible Data Hiding in Encrypted Image with Distributed Source Encoding, IEEE Trans. on Circuits and Systems for Video Technology, (to appear)
2. G. Feng, H. Zhang, and X. Zhang, Effective Feature Selection for Image Steganalysis Using Extreme Learning Machine, Journal of Electronic Imaging, (to appear)
3. Y. Ren, S. Wang, and X. Zhang, Fully Secure Expressive Ciphertext-Policy Attribute-Based Encryption without Random Oracles, Information, (to appear)
4. F. Li, X. Zhang, J. Yu, and H. Cheng, Digital Image Steganalysis Based on Local Textural Features and Double Dimensionality Reduction, Security and Communication Networks, (to appear)
5. L. Shen, P. An, X. Zhang, and Z. Zhang, Adaptive Transform Size Decision Algorithm for High-Efficiency Video Coding Inter Coding, Journal of Electronic Imaging, (to appear)
6. X. Zhang, and W. Zhang, Semantic Image Compression Based on Data Hiding, IET Image Processing, 9(1), pp. 54-61, 2015.
7. G. Feng, Y. Lan, X. Zhang, and Z. Qian, Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine, IEEE Trans. on Cybernetics, 45(2), pp. 279-288, 2015.
8. Z. Qian, X. Zhang, and Y. Ren, JPEG Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation, 26(1), pp. 9-13, 2015.
9. L. Shen, Z. Zhang, X. Zhang, P. An, and Z. Liu, Fast TU Size Decision Algorithm for HEVC Encoders Using Bayesian Theorem Detection, Signal Processing: Image Communication, 32, pp. 121-128, 2015.
10. X. Zhang, Y. Ren, L. Shen, Z. Qian, and G. Feng, Compressing Encrypted Images with Auxiliary Information, IEEE Trans. on Multimedia, 16(5), pp. 1327-1336, 2014.
11. X. Zhang, Z. Qian, G. Feng, and Y. Ren, Efficient Reversible Data Hiding in Encrypted Images, Journal of Visual Communication and Image Representation, 25(2), pp. 322-328, 2014.
12. X. Zhang, C. Qin, and L. Shen, Efficient Wet Paper Embedding for Steganography with Multi-layer Construction, Annals of Telecommunications, 69, pp. 441-447, 2014.
13. X. Zhang, G. Sun, L. Shen, and C. Qin, Compression of Encrypted Images with Multi-layer Decomposition, Multimedia Tools and Applications, 72, pp. 489-502, 2014.
14. Z. Qian, X. Zhang, and S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Trans. on Multimedia, 16(5), pp. 1486-1491, 2014.
15. F. Li, X. Zhang, J. Yu, and W. Shen, Adaptive JPEG Steganography with New Distortion Function, Annals of Telecommunications, 69, pp. 431-440, 2014.
16. Z. Qian, and X. Zhang, Improved Anti-forensics of JPEG Compression, Journal of Systems and Software, 91, pp. 100-108, 2014.
17. B. Chen, G. Feng, X. Zhang, and F. Li, Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier, Signal, Image and Video Processing, 8(8), pp. 1475-1482, 2014.
18. X. Han, Z. Qian, G. Feng, and X. Zhang, Reversible Data Hiding in Encrypted Images Based on Image Interpolation, International Journal of Digital Crime and Forensics, 6(2), pp. 73-84, 2014.
19. Y. Ren, Z. Niu, and X. Zhang, Fully Anonymous Identity-based Broadcast Encryption without Random Oracles, International Journal of Network Security, 16(4), 256-264, 2014.
20. R. Schmitz, S. Li, C. Grecos, and X. Zhang, Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms, International Journal of Multimedia Data Engineering and Management, 5(4), pp. 36-52, 2014.
21. X. Zhang, Reversible Data Hiding with Optimal Value Transfer, IEEE Trans. on Multimedia, 15(2), pp. 316-325, 2013.
22. X. Zhang, Commutative Reversible Data Hiding and Encryption, Security and Communication Networks, 6, pp. 1396-1403, 2013.
23. Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Trans. on Information Forensics & Security, 8(1), pp. 55-63, 2013.
24. L. Shen, Z. Liu, X. Zhang, W. Zhao, and Z. Zhang, An Effective CU Size Decision Method for HEVC Encoders, IEEE Trans. on Multimedia, 15(2), pp. 465-470, 2013.
25. F. Li, X. Zhang, B. Chen, and G. Feng, JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier, IEEE Signal Processing Letters, 20(3), pp. 233-236, 2013.
26. G. Sun, X. Zhang, G. Li, and J. Yin, Robust Degraded Face Recognition with Novel Face Representation and Multi-scale Fusion, Optical Engineering, 52(7), 2013.
27. Y. Ren, S. Wang, and X. Zhang, Practical Parallel Key-Insulated Encryption with Multiple Helper Keys, Computers and Mathematics with Applications, 65(9), pp. 1403-1412, 2013.
28. C. Qin, C.-C. Chang, W.-B. Lee, and X. Zhang, A Secure Image Delivery Scheme with Regional Protection Capability Using Image Inpainting and Editing, The Imaging Science Journal, 61, pp. 509-517, 2013.
29. X. Zhang, G. Feng, Y. Ren, and Z. Qian, Scalable Coding of Encrypted Images, IEEE Trans. on Image Processing, 21(6), pp. 3108-3114, 2012.
30. X. Zhang, Separable Reversible Data Hiding in Encrypted Image, IEEE Trans. on Information Forensics & Security, 7(2), pp. 526-532, 2012.
31. X. Zhang and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), pp. 179-185, 2012.
32. H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), pp. 123-126, 2012.
33. G. Feng, Z. Qian, and X. Zhang, Evolutionary Selection Extreme Learning Machine Optimization for Regression, Soft Computing, 16(9), pp. 1485-1491, 2012.
34. C. Qin, S. Wang, and X. Zhang, Simultaneous inpainting for image structure and texture using anisotropic heat transfer model, Multimedia Tools and Applications, 56(3), pp. 469-483, 2012.
35. Z. Qian, and X. Zhang, Lossless Data Hiding in JPEG Bitstream, Journal of Systems and Software, 85(2), pp. 309-313, 2012.
36. G. Feng, Z. Qian, and X. Zhang, Spectrum-Estimation Based Lossless Information Recovery for Sparse Array Patterns, Telecommunication Systems, 49(2), pp. 163-169, 2012.
37. X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics & Security, 6(4), pp. 1223-1232, 2011.
38. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Trans. on Image Processing, 20(2), pp. 485-495, 2011.
39. X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Trans. on Information Forensics & Security, 6(1), pp. 53-58, 2011.
40. X. Zhang, Reversible Data Hiding in Encrypted Image, IEEE Signal Processing Letters, 18(4), pp. 255-258, 2011.
41. X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), pp. 233-243, 2011.
42. X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54(2), pp. 385-395, 2011.
43. Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), pp. 559-562, 2011.
44. Y. Ren, S. Wang, and X. Zhang, Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption, Journal of Internet Technology, 12(4), pp. 647-658, 2011.
45. C. Qin, F. Cao, and X. Zhang, Efficient Image Inpainting Using Adaptive Edge-Preserving Propagation, The Imaging Science Journal, 59(4), pp. 211-218, 2011.
46. Z. Qian, G. Feng, X. Zhang, and S. Wang, Image Self-Embedding with High-Quality Restoration Capability, Digital Signal Processing, 21(2), pp. 278-286, 2011.
47. Z. Tang, S. Wang, X. Zhang, W. Wei, and Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52(2-3), pp. 325-345, 2011.
48. Z. Tang, S. Wang, X. Zhang, and W. Wei, Structural Feature Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), pp. 75-91, 2011.
49. C. Kim, D. Shin, D. Shin, and X. Zhang, Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, Communications in Computer and Information Science, 186(1), pp. 130-138, 2011.
50. X. Zhang, Efficient Data Hiding with Plus-Minus One or Two, IEEE Signal Processing Letters, 17(7), pp. 635-638, 2010.
51. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), pp. 3026-3036, 2010.
52. S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), pp. 1170-1178, 2010.
53. W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Trans. on Information Theory, 56(3), pp. 1262-1270, 2010.
54. H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved Modification Direction Methods, Computers and Mathematics with Applications, 60(2), pp. 319-325, 2010.
55. W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Trans. on Information Forensics & Security, 5(3), pp. 507-517, 2010.
56. Z. Qian, X. Zhang, G. Feng, and Y. Ren, Color Filter Array Interpolation Based Self Recovery with Anti-cropping Capability, International Journal of Multimedia Intelligence and Security, 1(2), pp. 191-203, 2010.
57. C. Qin, Q. Mao, and X. Zhang, Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes, Journal of Multimedia, 5(5), pp. 427-433, 2010.
58. Y. Ren, D. Gu, S. Wang, and X. Zhang, New Fuzzy Identity Based Encryption Scheme in the Standard Model, Informatica, 21(3), pp. 393-407, 2010.
59. Y. Ren, D. Gu, S. Wang, and X. Zhang, Hierarchical Identity-Based Proxy Re-encryption without Random Oracles, International Journal of Foundations of Computer Science, 21(6), pp. 1049-1063, 2010.
60. X. Zhang and S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), pp. 675-679, 2009.
61. X. Zhang, S. Wang and W. Zhang, Steganography Combining Data Decomposition Mechanism and Stego-coding Method, Informatica, 33(1), pp. 41–48, 2009.
62. X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Trans. on Multimedia, 10(8), pp. 1490-1499, 2008.
63. X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, pp. 553-556, 2008.
64. Z. Tang, S. Wang, X. Zhang, W. Wei, and S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence and Technology, 2(1), pp. 18-26, 2008.
65. X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), pp. 1191-1192, 2007.
66. W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), pp. 848-851, 2007.
67. X. Zhang and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), pp. 727-730, 2007.
68. W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), pp. 680-682, 2007.
69. X. Zhang, W. Zhang and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), pp. 482-483, 2007.
70. X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), pp. 125-128, 2007.
71. X. Zhang and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image & Signal Processing, 153(6), pp. 825-836, 2006.
72. X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), pp. 781-783, 2006.
73. X. Zhang and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), pp. 165-168, 2006.
74. X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E88-A(12), pp. 3663-3667, 2005.
75. X. Zhang and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), pp. 67-70, 2005.
76. X. Zhang and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25(8), pp. 967-973, 2004.
77. X. Zhang and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25(3), pp. 331-339, 2004.
78. X. Zhang and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), pp. 1801-1804, 2002.
79. S. Wang and X. Zhang, Least Square Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), pp. 392-397, 2002.
80. S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), pp. 398-402, 2002.
添加上海大學學姐微信,或微信搜索公眾號“考研派小站”,關注[考研派小站]微信公眾號,在考研派小站微信號輸入[上海大學考研分數線、上海大學報錄比、上海大學考研群、上海大學學姐微信、上海大學考研真題、上海大學專業目錄、上海大學排名、上海大學保研、上海大學公眾號、上海大學研究生招生)]即可在手機上查看相對應上海大學考研信息或資源。
![上海大學考研公眾號](http://img.okaoyan.com/gzh/上海大學.png)
![考研派小站公眾號](http://img.okaoyan.com/gzh/kyp.jpg)
上海大學
本文來源:http://m.btfokj.cn/shanghaidaxue/daoshi_492773.html
推薦閱讀
-
上海大學法學院導師:諶瑜
研究方向:勞動與社會保障法、涉外民商法個人簡介:諶瑜,女,安徽蚌埠人,副教授,碩士生導師,兼任上海市江三角律師事務所律師。年畢業于安徽大學法律系法學專業,獲法學士學位;年畢……
日期:10-09 閱讀量:20 -
上海大學法學院導師:陳琦華
研究方向:法律社會學、行政法與行政訴訟法、司法制度個人簡介:陳琦華,女,上海市人,中共黨員,法學博士,碩士生導師。兼任上海市浦東新區人民法院人民陪審員。主講課程:本科生:《……
日期:10-09 閱讀量:20 -
上海大學法學院導師:陳敬根
個人簡介:陳敬根,男,遼寧丹東人,滿族,中共黨員,法學博士,副教授、副編審,碩士生導師,律師(三級),中國國際經濟貿易法學研究會理事。研究方向:海商法、海事法、海洋法、海事……
日期:10-09 閱讀量:20 -
上海大學法學院導師:陳劍平
陳劍平研究方向:金融法、經濟法個人簡介:陳劍平(),男,教授年月生,浙江鎮海人。年畢業于復旦大學分校法律系。年起在上海大學任教。曾擔任文學院法律系經濟法教研室主任、法律系主……
日期:10-09 閱讀量:20 -
上海大學法學院導師:傅文園
研究方向:訴訟法、知識產權法個人簡介:傅文園,女,浙江紹興人,副教授,碩士生導師,兼任中國高校知識產權研究會副秘書長,上海市仲裁委員會仲裁員,上海市知識產權仲裁院仲裁員,上……
日期:10-09 閱讀量:20 -
上海大學法學院導師:崔文玉
研究方向:商法、中日韓比較法個人簡介:崔文玉,吉林省延吉人,共產黨員,副教授,碩士生導師。主要講授商法(商法總論、公司法、破產法、票據法、保險法)日本商法學習經歷:年月年月……
日期:10-09 閱讀量:20 -
上海大學法學院導師:金成華
研究方向:國際法、國際經濟法、國際投資法、醫療法個人簡介:金成華:吉林人,朝鮮族,中共黨員,法學博士,法學博士后,副教授,碩士生導師主講課程:本科生的《國際法》、《國際經濟……
日期:10-09 閱讀量:20 -
上海大學法學院導師:江界華
研究方向:刑法犯罪心理學、犯罪學個人簡介:江界華,男,副教授。早年畢業于復旦大學分校政法系法律專業。后從事法院審判工作,于年起在上海大學任教。年至年應邀赴日本東洋大學為其外……
日期:10-09 閱讀量:20 -
上海大學法學院導師:鄭飛
一、個人情況:鄭飛,法學博士、博士后,副教授,碩士生導師吉林省雙陽縣第二中學中國人民公安大學偵察系刑偵專業吉林省林業公安干警學校長春稅務學院法學系現在上海大學法學院中國人民……
日期:10-09 閱讀量:20 -
上海大學法學院導師:趙清林
個人簡介:趙清林,男,生月生,湖北監利人,漢族,中共黨員,法學博士,副教授,碩士生導師。研究方向:行政法學主講課程:本科生的《行政法與行政訴訟法》、《憲法》,研究生的《行政……
日期:10-09 閱讀量:20 -
上海大學法學院導師:趙輝
趙輝:男,湖北十堰人,漢族,中共黨員,法學博士,副教授研究方向:中國刑法學、比較刑法學主講課程:刑法學、刑事訴訟法學一、學歷及工作經歷(一)學歷年月湖北大學經濟學院國際金融……
日期:10-09 閱讀量:20 -
上海大學法學院導師:張玉蓉
研究方向:知識產權法、知識產權管理、與信息技術有關的知識產權問題、與國際貿易有關的知識產權問題個人簡介:張玉蓉,女,湖北荊門人,中共黨員,中德聯合培養知識產權管理學博士,副……
日期:10-09 閱讀量:20 -
上海大學法學院導師:張秀全
研究方向:民法基礎理論;合同法;物權法;商法基礎理論;公司法;破產法;保險法;知識產權法等。個人簡介:張秀全,男,河南濟源人,中共黨員,法學博士,教授,博導,副院長,兼任中……
日期:10-09 閱讀量:20 -
上海大學法學院導師:袁真富
個人簡介:袁真富,男,年月生,四川大竹人,漢族,中共黨員,法學博士(社會學專業),副教授,知識產權學院副院長,兼任上海知識產權研究所副所長、高級研究員,東方知識產權俱樂部(……
日期:10-09 閱讀量:20 -
上海大學法學院導師:袁杜娟
個人簡介:袁杜娟,女,年月生,江西吉安人,漢族,法學博士、副教授,兼任上海捷華律師事務所律師。研究方向:國際經濟法學、國際商法學主講課程:本科生《國際商法》、《法律英語》等……
日期:10-09 閱讀量:20 -
上海大學法學院導師:徐靜琳
研究方向:比較法學港澳基本法行政法學個人簡介:徐靜琳,女,上海市人。上海大學法學院教授,上海大學港澳臺法研究中心主任。年畢業于云南大學,年西南政法學院主修法制史憲法學,年香……
日期:10-09 閱讀量:20 -
上海大學法學院導師:許春明
研究方向:知識產權法、信息網絡法、知識產權管理個人簡介:許春明,男,年月生,江蘇省蘇州市吳江區人,教授、博士生導師,管理學博士、法學碩士、工學學士,知識產權學院副院長(主持……
日期:10-09 閱讀量:20 -
上海大學法學院導師:王勉青
王勉青研究方向:知識產權個人簡介:一、學歷及工作經歷(一)學歷年月中國政法大學本科畢業,獲法學學士學位。年月上海社科院研究生畢業,獲法學碩士學位。年月華東師范大學研究生畢業……
日期:10-09 閱讀量:20 -
上海大學法學院導師:陶鑫良
陶鑫良教授簡況:陶鑫良,男,上海浦東人,大學畢業于上海機械學院(現上海大學前身之一)鋼鐵冶金專業,研究生畢業于復旦大學管理學院,從事知識產權教學、研究和法律服務近三十年。現……
日期:10-09 閱讀量:20 -
上海大學法學院導師:沈四寶
研究方向:商法、國際經濟法個人簡介:沈四寶,出生于年月,上海市人,教授、博士生導師,現任上海大學法學院院長,第二屆教育部社科委員、國務院學位委員會法學評議組成員,中國法學會……
日期:10-09 閱讀量:20