孙星明教授

2001,Ph.D.ComputerScience,FudanUniversity,China.

1988,M.S.ComputingScience,DalianUniversityofScience&Technology,China.

1984,B.S.Mathematics,HunanNormalUniversity,China.

WorkExperiences:

2011-Now:Professor,DeaninCollegeofComputer&Software,NanjingUniversityofInformationScience&Technology.DirectorinJiangsuProvincialCenterforNetworkSecurityEngineering.

2003-2010:Professor,ViceDeaninSchoolofComputer&Communication,HunanUniversity.DirectorinHunanProvincialKeyLaboratoryofNetwork&InformationSecurity,

2006-2007:VisitingProfessorinUniversityCollegeLondon,UK.

2008-2010:VisitingProfessorinUniversityofWarwick,UK.

2000-2003:Professor,DeaninDepartmentofComputerScienceandTechnologyinHunanUniversityofTechnology.

1994-1999:AssociateprofessorinDepartmentofMathematicsinXiangtanNormalUniversity

1988-1993:LecturerinDepartmentofMathematicsinXiangtanNormalUniversity

1984-1987:AssistantlecturerinDepartmentofMathematicsinXiangtanNormalUniversity

国家自然科学基金委员会专家组成员;

中国信息安全测评中心华中测评中心副主任;

IEEE高级会员;

全国数字水印与信息隐藏专家委员会委员;

中国计算机学会理论计算机专业委员会委员;

担任《IEEETIFS》、《IEEETCSVT》、《IEEETIP》、《IEEECL》、《IEEESPL》等十多种国际著名刊物的审稿人,ICCCS2015、ICCCS2016、ICCCS2017大会主席,IWDH、ICFATTIM等十多个国际学术会议的程序委员会成员,第八届全国信息隐藏暨多媒体信息安全学术大会程序委员会主席,IEEE亚太云计算会议(IEEEAP-Cloud'2012)程序委员会副主席。

在IEEETransactionsonInformationForensicsandSecurity、IEEETransactionsonParallelandDistributedSystems、IEEETransactionsonImageProcessing、IEEETransactiononCircuitsandSystemsforVideoTechnology、InfoCom等国内外重要期刊和会议上发表高质量论文100多篇。多篇论文被美国Purdue大学,英国剑桥大学,挪威信息安全国家实验室等国内外同行专家引用,目前ESI全球高被引论文7篇。

MainresearchprojectsasPI:

[1]NSFCkeyprogram“ResearchonCoverlessInformationHidingBasedonBigTextData”,fundedbytheNationalNaturalScienceFoundationofChinaunderGrantno.U1536206,from2016.1to2019.12.

[2]NSFCkeyprogram“Researchondatasecurityincloudcomputing”,fundedbytheNationalNaturalScienceFoundationofChinaunderGrantno.61232016,from2003.1to2017.12

[3]“ResearchonWirelessSensorNetworkBasedDenseMeteorologicalObservationStations”,fundedbyMinistryofScienceandTechnologyofChina,andChinaMeteorologicalAdministrationunderGrantno.GYHY201206033,from2012.1to2014.12.

[4]“ResearchonDamSecurityMonitoringbyWirelessNetwork”,fundedbyMinistryofScienceandTechnologyofChina,andMinistryofWaterResourcesofChinaunderGrantno.201301030,from2013.1to2015.12.

[5]“China-JapanJointResearchonWirelessSensorNetworkBasedDenseMeteorologicalObservationSystems”,fundedbythegovernmentofChinaandJapanunderGrantno.2013DFG12860,from2013.3to2015.10.

[6]NSFCkeyprogram“Researchontextcontentsecurity”,fundedbytheNationalNaturalScienceFoundationofChinaunderGrantno.60736016,from2008.1to2011.12.

[7]NSFCproject“Researchonreversiblevisiblewatermarkingofcompressedimage”,fundedbytheNationalNaturalScienceFoundationofChinaunderGrantno.60973128,from2010.1to2012.12.

[8]National973sub-projectin“ResearchonBasicTheoryandKeyTechnologiesofWirelessSensorNetwork”,fundedbytheNationalBasicResearchProgramofChinaunderGrantno.2006CB303000,from2007.1to2010.12.

[9]National973project“Researchonforensicsofdigitalmedia”,fundedbytheNationalBasicResearchProgramofChinaunderGrantno.2010CB334706,from2010.1to2012.12.

[10]NSFCproject“Dynamicsoftwarewatermarkingbasedonobfuscatedcompiler”,fundedbyNationalNaturalScienceFoundationofChinaunderGrantNo.60573045,from2006.1to2008.12.

[11]NSFCproject“Textwatermarkingandtextinformationsecurity”,fundedbyNationalNaturalScienceFoundationofChina(NSFC)underGrantNo.60373062,from2004.1to2006.12.

[12]“KnowledgediscoveryofthestructureofChineselanguageanditsapplication”,fundedbyKeyResearchProjectofMinistryofEducationofChinaunderGrantNo.03092,from2004.1to2006.12.

SelectedPublicationsinRecentYears:

[1]XiaZhihua,XiongNealN.,VasilakosAthanasiosV.,SunXingming.EPCBIR:Anefficientandprivacy-preservingcontent-basedimageretrievalschemeincloudcomputing.INFORMATIONSCIENCES,2017,387,pp.195-204.

[2]ShenJian,WangChen,WangAnxi,SunXingming,MohSangman,HungPatrickC.K..Organizedtopologybasedroutingprotocolinincompletelypredictablead-hocnetworks.COMPUTERCOMMUNICATIONS,2017,99,pp.107-118.

[3]ZhouZhili,WangYunlong,WuQ.M.Jonathan,YangChing-Nung,SunXingming.EffectiveandEfficientGlobalContextVerificationforImageCopyDetection.IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,2017,12(1),pp.48-63.

[4]FuZhangjie,WuXinle,GuanChaowen,SunXingming,RenKui.TowardEfficientMulti-KeywordFuzzySearchOverEncryptedOutsourcedDataWithAccuracyImprovement.IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,2016,11(12),pp.2706-2716.

[5]XiaZhihua,WangXinhui,ZhangLiangao,QinZhan,SunXingming,RenKui.APrivacy-PreservingandCopy-DeterrenceContent-BasedImageRetrievalSchemeinCloudComputing.IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,2016,11(11),pp.2594-2608.

[6]PanZhaoqing,JinPeng,LeiJianjun,ZhangYun,SunXingming,KwongSam.FastreferenceframeselectionbasedoncontentsimilarityforlowcomplexityHEVCencoder.JOURNALOFVISUALCOMMUNICATIONANDIMAGEREPRESENTATION,2016,40(),pp.516-524.

[7]PanZhaoqing,LeiJianjun,ZhangYun,SunXingming,KwongSam.FastMotionEstimationBasedonContentPropertyforLow-ComplexityH.265/HEVCEncoder.IEEETRANSACTIONSONBROADCASTING,2016,62(3),pp.675-684.

[8]FuZhangjie,RenKui,ShuJiangang,SunXingming,HuangFengxiao.EnablingPersonalizedSearchoverEncryptedOutsourcedDatawithEfficiencyImprovement.IEEETRANSACTIONSONPARALLELANDDISTRIBUTEDSYSTEMS,2016,27(9),pp.2546-2559.

[9]ZhangYanhua,SunXingming,WangBaowei.EfficientAlgorithmforK-BarrierCoverageBasedonIntegerLinearProgramming.CHINACOMMUNICATIONS,2016,13(7),pp.16-23.

[10]YuanChengsheng,SunXingming,LvRui.FingerprintLivenessDetectionBasedonMulti-ScaleLPQandPCA.CHINACOMMUNICATIONS,2016,13(7),pp.60-65.

[11]YuanChengsheng,XiaZhihua,SunXingming,SunDecai,LvRui.Fingerprintlivenessdetectionusingmultiscaledifferenceco-occurrencematrix.OPTICALENGINEERING,2016,55(6),pp.63111.

[12]ZhouZhili,YangChing-Nung,ChenBeijing,SunXingming,LiuQi,WuQ.M.Jonathan.EffectiveandEfficientImageCopyDetectionwithResistancetoArbitraryRotation.IEICETRANSACTIONSONINFORMATIONANDSYSTEMS,2016,E99D(6),pp.1531-1540.

[13]XiaZhihua,WangXinhui,SunXingming,LiuQuansheng,XiongNaixue.SteganalysisofLSBmatchingusingdifferencesbetweennonadjacentpixels.MULTIMEDIATOOLSANDAPPLICATIONS,2016,75(4),pp.1947-1962.

[14]XiaZhihua,WangXinhui,SunXingming,WangQian.ASecureandDynamicMulti-KeywordRankedSearchSchemeoverEncryptedCloudData.IEEETRANSACTIONSONPARALLELANDDISTRIBUTEDSYSTEMS,2016,27(2),pp.340-352.

[15]PanZhaoqing,ZhangYun,LeiJianjun,XuLong,SunXingming.EarlyDIRECTmodedecisionbasedonall-zeroblockandratedistortioncostformultiviewvideocoding.IETIMAGEPROCESSING,2016,10(1),pp.9-15.

[16]PanZhaoqing,ChenLiming,SunXingming.LowComplexityHEVCEncoderforVisualSensorNetworks.SENSORS,2015,15(12),pp.30115-30125.

[17]YangBin,SunXingming,XinXiangyang,HuWeifeng,WuYouxin.Imagecopy-moveforgerydetectionbasedonsped-uprobustfeaturesdescriptorandadaptiveminimal-maximalsuppression.JOURNALOFELECTRONICIMAGING,2015,24(6),pp.63016.

[18]ShenJian,TanHaowen,MohSangman,ChungIlyong,LiuQi,SunXingming.EnhancedSecureSensorAssociationandKeyManagementinWirelessBodyAreaNetworks.JOURNALOFCOMMUNICATIONSANDNETWORKS,2015,17(5),pp.453-462.

[19]FuZhangjie,SunXingming,XiJie.DigitalForensicsofMicrosoftOffice2007-2013DocumentstoPreventCovertCommunication.JOURNALOFCOMMUNICATIONSANDNETWORKS,2015,17(5),pp.525-533.

[20]SunXingming,YanShuangshuang,WangBaowei,XiaLi,LiuQi,ZhangHui.AirTemperatureErrorCorrectionBasedonSolarRadiationinanEconomicalMeteorologicalWirelessSensorNetwork.SENSORS,2015,15(8),pp.18114-18139.

[21]ChenXianyi,SunXingming,SunHuiyu,XiangLingyun,YangBin.Histogramshiftingbasedreversibledatahidingmethodusingdirected-predictionscheme.MULTIMEDIATOOLSANDAPPLICATIONS,2015,74(15),pp.5747-5765.

[22]YangBin,SunXingming,ChenXianyi,ZhangJianjun,LiXu.ExposingPhotographicSplicingbyDetectingtheInconsistenciesinShadows.COMPUTERJOURNAL,2015,58(4),pp.588-600.

[23]LiJian,LiXiaolong,YangBin,SunXingming.Segmentation-BasedImageCopy-MoveForgeryDetectionScheme.IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,2015,10(3),pp.507-518.

[24]LiXu,SunXingming,LiuQuansheng.ImageIntegrityAuthenticationSchemeBasedonFixedPointTheory.IEEETRANSACTIONSONIMAGEPROCESSING,2015,24(2),pp..

[25]FuZhangjie,SunXingming,LiuQi,ZhouLu,ShuJiangang.AchievingEfficientCloudSearchServices:Multi-KeywordRankedSearchoverEncryptedCloudDataSupportingParallelComputing.IEICETRANSACTIONSONCOMMUNICATIONS,2015,E98B(1),pp.190-200.

[26]ChenBeijing,ShuHuazhong,CoatrieuxGouenou,ChenGang,SunXingming,CoatrieuxJeanLouis.ColorImageAnalysisbyQuaternion-TypeMoments.JOURNALOFMATHEMATICALIMAGINGANDVISION,2015,51(1),pp.124-144.

[27]ShenJian,MohSangman,ChungIlyong,SunXingming.BufferSchemeOptimizationofEpidemicRoutinginDelayTolerantNetworks.JOURNALOFCOMMUNICATIONSANDNETWORKS,2014,16(6),pp.656-666.

[28]FuZhangjie,ShuJiangang,SunXingming,LingeNigel.SmartCloudSearchServices:VerifiableKeyword-basedSemanticSearchoverEncryptedCloudData.IEEETRANSACTIONSONCONSUMERELECTRONICS,2014,60(4),pp.762-770.

[29]ZhouZhili,SunXingming,ChenXianyi,ChangCheng,FuZhangjie.Anovelsignaturebasedonthecombinationofglobalandlocalsignaturesforimagecopydetection.SECURITYANDCOMMUNICATIONNETWORKS,2014,7(11),pp.1702-1711.

[30]ChenBeijing,LiuQuansheng,SunXingming,LiXu,ShuHuazhong.RemovingGaussiannoiseforcolourimagesbyquaternionrepresentationandoptimisationofweightsinnon-localmeansfilter.IETIMAGEPROCESSING,2014,8(10),pp.591-600.

[31]XiaZhihua,WangXinhui,SunXingming,WangBaowei.Steganalysisofleastsignificantbitmatchingusingmulti-orderdifferences.SECURITYANDCOMMUNICATIONNETWORKS,2014,7(8),pp.1283-1291.

[32]XiangLingyun,SunXingming,LuoGang,XiaBin.Linguisticsteganalysisusingthefeaturesderivedfromsynonymfrequency.MULTIMEDIATOOLSANDAPPLICATIONS,2014,71(3),pp.1893-1911.

[33]ZhangHui,WuQ.M.Jonathan,ThanhMinhNguyen,SunXingming.SyntheticApertureRadarImageSegmentationbyModifiedStudent'st-MixtureModel.IEEETRANSACTIONSONGEOSCIENCEANDREMOTESENSING,2014,52(7),pp.4391-4403.

[34]ChenBeijing,CoatrieuxGouenou,ChenGang,SunXingming,CoatrieuxJeanLouis,ShuHuazhong.Full4-DquaterniondiscreteFouriertransformbasedwatermarkingforcolorimages.DIGITALSIGNALPROCESSING,2014,28(),pp.106-119.

[35]FuZhangjie,SunXingming,LingeNigel,ZhouLu.AchievingEffectiveCloudSearchServices:Multi-keywordRankedSearchoverEncryptedCloudDataSupportingSynonymQuery.IEEETRANSACTIONSONCONSUMERELECTRONICS,2014,60(1),pp.164-172.

[36]YangBin,SunXingming,ChenXianyi,ZhangJianjun,LiXu.AnEfficientForensicMethodforCopy-moveForgeryDetectionBasedonDWT-FWHT.RADIOENGINEERING,2013,22(4),pp.1098-1105.

[37]ShenJian,ZhengWenying,WangJin,ZhengYuhui,SunXingming,LeeSungyoung.AnEfficientVerifiablyEncryptedSignaturefromWeilPairing.JOURNALOFINTERNETTECHNOLOGY,2013,14(6),pp.947-952.

[38]ChenXianyi,SunXingming,SunHuiyu,ZhouZhili,ZhangJianjun.Reversiblewatermarkingmethodbasedonasymmetric-histogramshiftingofpredictionerrors.JOURNALOFSYSTEMSANDSOFTWARE,2013,86(10),pp.2620-2626.

[39]XiaZhihua,WangShufang,SunXingming,WangBaowei.Steganalysisofleastsignificantbitmatchingbasedonimagehistogramandcorrelation.JOURNALOFELECTRONICIMAGING,2013,22(3),pp.33008.

[40]FuZhangjie,SunXingming,LiuYuling,LiBo.Textsplit-basedsteganographyinOOXMLformatdocumentsforcovertcommunication.SECURITYANDCOMMUNICATIONNETWORKS,2012,5(9),pp.957-968.

[41]TanLina,SunXingming,SunGuang.Print-ScanResilientTextImageWatermarkingBasedonStrokeDirectionModulationforChineseDocumentAuthentication.RADIOENGINEERING,2012,21(1),pp.170-181.

[42]FuZhangjie,SunXingming,LiuYuling,LiBo.ForensicinvestigationofOOXMLformatdocuments.DIGITALINVESTIGATION,2011,8(1),pp.48-55.

[43]LuoHaijun,SunXingming,YangHengfu,XiaZhihua.ARobustImageWatermarkingBasedonImageRestorationUsingSIFT.RADIOENGINEERING,2011,20(2),pp.525-532.

[44]XiaZhihua,SunXingming,LiangWei,QinJiaohua,LiFeng.JPEGimagesteganalysisusingjointdiscretecosinetransformdomainfeatures.JOURNALOFELECTRONICIMAGING,2010,19(2),pp.23006.

[45]YangHengfu,SunXingming,SunGuang,TianZuwei.LosslessAuthenticationWatermarkingBasedonAdaptiveModularArithmetic.RADIOENGINEERING,2010,19(1),pp.52-61.

[46]YangHengfu,SunXingming,SunGuang.AHigh-CapacityImageDataHidingSchemeUsingAdaptiveLSBSubstitution.RADIOENGINEERING,2009,18(4),pp.509-516.

[47]QinJiaohua,SunXingming,XiangXuyu,NiuChangming.Principalfeatureselectionandfusionmethodforimagesteganalysis.JOURNALOFELECTRONICIMAGING,2009,18(3),pp.33009.

[48]YangYing,SunXingming,YangHengfu,LiChang-Tsun,XiaoRong.AContrast-SensitiveReversibleVisibleImageWatermarkingTechnique.IEEETRANSACTIONSONCIRCUITSANDSYSTEMSFORVIDEOTECHNOLOGY,2009,19(5),pp.656-667.

近年承担的主要科研项目

1)国家自然科学基金-通用技术联合基金重点项目“基于文本大数据的无载体信息隐藏研究”(U1536206),2016.1-2019.12。

2)国家自然科学基金重点项目“云计算环境中数据安全的理论与关键技术研究”(61232016),2013.1-2017.12。

3)国家公益性行业(气象)科研专项项目“基于传感器网络的加密气象观测关键技术研究”(GYHY201206033),2012.01-2014.12。

4)国家公益性行业(水利)科研专项项目“土石坝安全多源监测集约化与可视化系统研究”(GYHY201301030),2013.01-2015.12。

5)国家科技部国际合作项目“中日基于传感器网络的气象观测系统合作开发”(S2013GR0445),2012.07-2014.12。

6)国家自然科学基金重点项目“文本内容安全研究”(60736016),2008.1-2011.12。

7)国家自然科学基金项目“压缩域可逆可见图像水印研究”(60973128),2010.1-2012.12。

8)国家973前期项目“隐写分析的基础理论和关键技术研究”(2009CB326202)(主持人之一),2009.4-2011.9。

9)国家973前期项目“数字媒体取证研究”(2010CB334706)(主持人之一),2010.4-2013.4。

10)国家973前期项目“文本零知识水印基础理论和关键技术研究”(2011CB311808)(主持人之一),2011.4-2014.4。

11)国家973项目“无线传感网络的基础理论及关键技术研究”(2006CB303000)(子课题主持人),2006.9-2010.12。

12)国家自然科学基金项目“基于混淆编译理论的动态软件水印研究”(60573045),2006.1-2008.12。

13)国家自然科学基金项目“文本数字水印及文本信息安全研究”(60373062),2004.1-2006.12。

14)国家信息安全专项,项目编号h13049sc。

15)国家信息安全专项,项目编号p2005012ea。

16)国家信息安全专项,项目编号p2007006ea。

17)国家信息安全专项,项目编号p2009008ea。

18)国家信息安全专项,项目编号p2010004ea。

19)国家信息安全专项,项目编号p2011002ea。

20)国家信息安全专项,项目编号p201201I043。

1)湖南省科技进步二等奖(2013年):“软件及文本数字水印与信息隐藏技术与应用”,排名第一;

2)湖南省科技进步二等奖(2010年):“电子文档安全分发系统”,排名第一;

3)湖南省自然科学优秀论文奖(2010年)一等奖一篇,排名第二(学生第一);

4)湖南省自然科学优秀论文奖(2006年)二等奖一篇,排名第一。

THE END
1.学生在校期间兼职工作机会多如何找到适合自己的兼职岗位对于很多在校学生来说,兼职工作或寻找额外收入来源已经成为一种常见的需求。不少学生在课外时间寻找机会来获得一些生活费、学费或其他支出。因此,很多学生会问,“卖的学生一般去哪里找?”在这篇文章中,我们将探讨一些学生常见的兼职渠道和找到这些工作的途径。 https://www.gdjunquan.com/jqjc/55644.html
2.大学生兼职app排行榜前十名偏玩手游盒子分享十大大学生兼职app排行榜前十名手机应用,编辑为您推荐手机大学生兼职app排行榜第一名到前5名到前十名的应用。找大学生兼职app有哪些、大学生兼职app哪个好用,上偏玩手游盒子https://m.pianwan.com/s/zj-2115541
3.学生兼职赚钱平台有哪些?(精选5大靠谱平台推荐)这些岗位通常与学生所学专业相关度较高,如计算机专业的学生可以找到软件开发、测试的兼职实习岗位;金融专业的学生可以参与金融机构的市场调研、数据分析等兼职实习工作。实习僧与众多高校和企业建立了良好的合作关系,其发布的兼职实习信息具有较高的可信度。而且,在兼职实习过程中,学生可以得到企业导师的指导和帮助,学习到https://www.jianshu.com/p/61ac9e192d80
4.大学生兼职软件,理想兼职平台,一键掌握机会!这款大学生兼职软件是一个集合了各类兼职信息的平台,无论你对什么感兴趣,总能找到心仪的兼职,这里有家教、服务员、市场推广、设计等各种岗位,应有尽有! 操作起来超级方便!只需动动手指,下载软件、注册账号,就能轻松浏览各种兼职信息,软件界面设计简洁明了,让我们这些“手残党”也能轻松上手。 https://app.haiugo.com/post/15064.html
5.适合学生党赚钱的兼职,,这8个副业^网站,一天能赚400多块(附:赚钱小七好物分享 在得物App发布了一条热门动态!快来围观,就等你啦!https://m.dewu.com/note/trend/details?id=254788166
6.职位详情湖南说吧文化传播有限公司 线上AI伴读英语助教兼职(无需备课居家办公)4K-8K/月 全国 本科及以上 投递简历 模拟面试 薪酬福利:无发布时间:2024年12月11日点击人次:51职位描述 岗位职责: 一、岗位职责: 1. 公司提供AI智能软件和授课内容, 你负责按照流程和标准模板真人伴读和复习(伴读内容:单词、语法、https://job.hutb.edu.cn/detail/job?id=2469544
7.学院会计系导师介绍:柯滨中山大学导师介绍Bin Ke, Kathy Petroni, and Yong Yu. (2008). The effect of Regulation FD on transient institutional investorsa€? trading behavior. Journal of Accounting Research, 46(4), 853-883. Steven Huddart, Bin Ke, Charles Shi. (2007). Jeopardy, Non-Public Information, and Insider Trading Around SEhttps://yz.kaoyan.com/zsu/daoshi/53d60db864d92.html
8.暑假做一些兼职工作会更好的翻译是:Youstillareastudenta但你眼中太温柔 正在翻译,请等待 [translate] a你现在还是一个学生,专心学习,寒暑假做一些兼职工作会更好 You now are a student, the wholly absorbed study, the winter and summer vacation does some part-time employment to be able to be better [translate] http://ruidianyu.zaixian-fanyi.com/fan_yi_3071305
9.何清中国科学院大学社会兼职 2018-05-12-今,中国人工智能学会知识工程与分布智能专业委员会, 副主任委员 2014-04-25-今,中国电子学会大数据专家委员会, 委员 2012-05-31-今,中国通信学会大数据专家委员会, 委员 2009-06-01-今,中国电子学会云计算专家委员会, 委员 2003-08-01-今,中国人工智能学会, 副秘书长 https://people.ucas.ac.cn/~heqing
10.青岛农业大学农学院导师教师信息介绍简介于晓娜3、6th Japan-China-Korea Graduate Student Forum. Sep. 2013. Tokyo, Japan. Comparative mapping of Raphanus sativus genome using Brassica markers and QTL analysis for the Fusarium wilt resistance trait. (Oral presentation and won an Outstanding Award ) 学术兼职 山东省科技特派员相关http://school.freekaoyan.com/shandong/qau/2020/12-20/16084350561286612.shtml
11.《Python系列》Python详细入门教程python教程print("http:\\\www.baidu.com")# 原字符-不希望字符串中的转义字符起作用,就使用原字符,就是在字符串前加上r或者Rprint(r"http:\\www.baidu.com")# 原字符使用-末尾不能使用一个反斜杠结尾会报错,需要的话,使用两个# print(r"http:\\www.baidu.com\")print(r"http:\\www.baidu.com","\b\\"https://blog.csdn.net/qq_67344578/article/details/137862494