Zhan Yu

ORCID: 0000-0001-6587-4671
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Random lasers and scattering media
  • Advanced Optical Imaging Technologies
  • Low-power high-performance VLSI design
  • Advanced Steganography and Watermarking Techniques
  • Orbital Angular Momentum in Optics
  • Digital Filter Design and Implementation
  • Chaos-based Image/Signal Encryption
  • Advanced Wireless Communication Techniques
  • Wireless Communication Networks Research
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Analog and Mixed-Signal Circuit Design
  • VLSI and FPGA Design Techniques
  • VLSI and Analog Circuit Testing
  • Neural dynamics and brain function
  • Biometric Identification and Security
  • Face and Expression Recognition
  • Advanced Photonic Communication Systems
  • Digital Media Forensic Detection
  • Coding theory and cryptography
  • Image and Video Quality Assessment
  • Optical Network Technologies
  • Optical Coherence Tomography Applications
  • Photonic and Optical Devices
  • Numerical Methods and Algorithms

Sichuan University
2021-2024

China Telecom
2024

China Telecom (China)
2024

Xiamen University of Technology
2021

University of Electronic Science and Technology of China
2020

Shandong University
2020

Zhejiang University of Technology
2019

Xiamen University
2018-2019

Beijing Normal University
2013-2016

Nanjing University of Information Science and Technology
2007-2014

We present a new color computational ghost imaging strategy using sole single-pixel detector and training by simulated dataset, which can eliminate the actual workload of acquiring experimental datasets reduce sampling times for experiments. First, relative responsibility device to different channels is experimentally detected, then enough data sets are neural network based on response value. Because simulation process much simpler than experiment, set be almost unlimited, trained model has...

10.1364/ao.447761 article EN Applied Optics 2022-01-06

A full-duplex radio over fiber link scheme with 16 quadrature amplitude modulation (16-QAM) 10 Gb/s downstream and 2.5 upstream signals is proposed. In the downlink, 60 GHz dual-tone optical millimeter- (mm-) wave signal carrier generated by 15 local oscillator via a Mach–Zehnder modulator frequency quadrupling. The 16-QAM 5 IF up-converted to 65 modulating it on one of two tones single-sideband (SSB) at central station. At remote base station, SSB mm-wave detected high-speed photodiode....

10.1364/jocn.4.000557 article EN Journal of Optical Communications and Networking 2012-06-08

Abstract An encryption method based on computational ghost imaging (CGI) with chaotic mapping and DNA encoding is proposed. To reduce the amount of keys in CGI-based system, algorithm used to generate random sequence as speckle measurement matrix CGI system. The data bucket detector subjected block operations, which introduce nonlinear characteristics process. problem linear vulnerability system has been greatly improved. Numerical simulation results show that, compared traditional method,...

10.1088/2040-8986/ac6597 article EN Journal of Optics 2022-04-08

Abstract An imaging method through a dynamic scattering medium is presented based on computational ghost (CGI) and convolutional neural network (CNN). The CNN adopted to improve CGI quality, its training set obtained from numerical simulation rather than actual experiments, which greatly reduces the workload. A concise mathematical model given reflect absorption effects of medium. By adding Gaussian white noise with different intensities detected light intensity sequence, undulation caused...

10.1088/1612-202x/acc245 article EN Laser Physics Letters 2023-04-28

An identity-based matchmaking encryption (IB-ME) scheme proposed at JOC 2021 supports anonymous but authenticated communications in a way that communication parties can both specify the senders or receivers on fly. IB-ME is easy to be used several network applications requiring privacy-preserving for its efficient implementation and special syntax. In literature, schemes are built from variants of Diffie-Hellman assumption all fail retain security quantum attackers. Despite rigorous proofs...

10.2139/ssrn.4592147 preprint EN 2023-01-01

A very simple reorganization of a Booth-encoded carry-save array multiplier is shown to reduce power dissipation in DSP applications. The proposed architecture, rather straightforward rearrangement the standard array, particularly suitable for applications where one multiplier's input signals has large dynamic range. We take advantage sign-extension zero-encoding property Booth encoder total switching activity adder hence lowering dissipation. structure been synthesized using Synopsys Design...

10.1109/sips.2000.886755 article EN 2002-11-08

We derive exact expressions of the symbol error rate (SER) performance orthogonal, frequency-hopped, noncoherent M-ary frequency-shift-keying (FH/MFSK) receivers in presence independent multitone jamming (MTJ), as well thermal and other wideband Gaussian noises. Both signal tones multiple are affected independently by Rician fading. slow-hopping fast-hopping systems considered. In our derivation, we exploit fact that multipath components can be combined with noises to form a single process....

10.1109/26.966077 article EN IEEE Transactions on Communications 2001-01-01

This paper shows that a simple modification to the Booth-encoding algorithm can be used increase probability of zero coded digit. increases in partial product bits Booth-encoded multiplier and reduces average number transitions by 3.75% over traditional for random input sequence. In addition, we show transition carry-bits adders is directly related bits, reduced approximately 7%. HSPICE simulations proposed encoding reduce power dissipation more than 4% 16/spl times/16 two's complement...

10.1109/iscas.1999.777806 article EN 2003-01-20

Compressive ghost imaging (CGI) can effectively reduce the number of measurements required for reconstruction. In most cases, however, when using illumination patterns as measurement matrices, CGI has not demonstrated ability to reconstruct high-quality images at an ultra-low sampling rate perfect claimed by compressive sensing theory. According our analysis, reason is that non-negative nature light intensity causes matrix in be inconsistent with essential requirements good theory, leading...

10.1364/oe.482134 article EN cc-by Optics Express 2023-01-04

While arithmetic circuits using 2's complement representation are easy to implement, it is well-known that the sign-extension bits of a number cause high switching activity in digital circuits. Such undesirable low power applications. In this work, we exploit property and propose reduced numbers avoid sign-extension. Instead having at MSB side datapath, proposed avoids MSBs altogether, therefore reduces dissipation With technique, maximum magnitude detected dynamically generated represent...

10.1109/vtsa.2001.934496 article EN 2002-11-13

Joint module selection and retiming is a powerful technique to optimize the implementation cost speed of circuit specified using synchronous data-flow graph (DFG). In implementing high-speed circuits, use carry-save signal representation also arithmetic circuits. This paper first combine these two techniques solve joint problem while allowing representation. To this efficiently, we propose mixed-representation (MFG) that allows signals be expressed in We accurately model costs associated...

10.1145/337292.337773 article EN Proceedings of the 40th conference on Design automation - DAC '03 2000-01-01

This paper presents an efficient architecture for the first carry-save integrator stage in a high-speed cascaded integrator-comb (CIC) decimation filter based on exploiting carry propagation properties accumulator. The can reduce number of registers (by 6.3% to 13.5% our examples) and replace large full-adders by half-adders (18% 42% examples), thus saving area power. Significant savings are achieved when rate is high stages small.

10.1109/asic.1998.722984 article EN 2002-11-27

An analytical model that describes small-scale local area fading experienced by narrowband radio receivers consisting of N dominant specular waves and an arbitrary number additional weaker lumped into a Gaussian distributed diffuse component was recently proposed. The exact envelope pdf this is in definite integral form involving product zeroth-order Bessel functions. A closed formula for known only = 2. For analytic studies, closed-form expression 3 desirable. In paper, we derived new terms...

10.1109/tvt.2007.897206 article EN IEEE Transactions on Vehicular Technology 2007-07-01

Instance search is an interesting task as well a challenging issue due to the lack of effective feature representation. In this paper, instance level representation built upon fully convolutional instance-aware segmentation proposed. The ROI-pooled from segmented region. So that instances in various sizes and layouts are represented by deep features uniform length. This further enhanced use deformable ResNeXt blocks. Superior performance observed terms its distinctiveness scalability on...

10.48550/arxiv.1806.03576 preprint EN other-oa arXiv (Cornell University) 2018-01-01

10.1016/j.jvcir.2021.103253 article EN Journal of Visual Communication and Image Representation 2021-07-30

Abstract A real single-channel color image encryption method based on computational ghost imaging is proposed. Compared with the currently proposed scheme, does not decompose into three gray-scale images or encode it a grayscale for encryption. Instead, speckle patterns are used as key to directly encrypt. The ciphertext and thus has camouflage properties certain extent. Furthermore, optical setup easy be implemented generated by chaotic system, which only guarantees security but also...

10.1088/1612-202x/ac979d article EN Laser Physics Letters 2022-10-27

Abstract Compressed sensing algorithm can be used in color ghost imaging to restore the image of object at less demand measurements times. However, quality reconstructed is usually not satisfactory. In this paper, we propose a sequential method that complete simple architecture and improve image, which optimize compressed get better result by post-processing measurement matrix establishing new process. Under condition same times reconstruction algorithm, compared with unpost-processing one,...

10.1088/1402-4896/acc216 article EN Physica Scripta 2023-03-07

Ghost imaging technology has a great application potential in optical security because of its non-local characteristics. In this paper, on the basis computational ghost imaging, an authentication scheme is proposed that utilizes correspondence technique for preliminary reconstruction object image, and then authenticates image by nonlinear correlation algorithm. Different from previous schemes usually adopted random selection measurements, method consciously selects bucket detector...

10.1364/ao.501263 article EN Applied Optics 2023-09-18

Abstract Optical encryption based on ghost imaging has the advantages of high-speed parallel processing and multi-dimensional information. However, in practical application, a large number speckle patterns are required to achieve encryption, resulting significant increase transmission costs low efficiency. In this paper, compressive sensing-based method using sparse speckles is proposed. The used characteristics easy compression greatly reducing amount keys. According calculation, memory...

10.1088/1402-4896/ad16ff article EN Physica Scripta 2023-12-19
Coming Soon ...