Wenyin Zhang

ORCID: 0000-0002-0370-448X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Medical Image Segmentation Techniques
  • Advanced Image and Video Retrieval Techniques
  • Chaos-based Image/Signal Encryption
  • Blockchain Technology Applications and Security
  • Image Retrieval and Classification Techniques
  • Advanced Neural Network Applications
  • Brain Tumor Detection and Classification
  • Digital Media Forensic Detection
  • Visual Attention and Saliency Detection
  • Advanced Algorithms and Applications
  • Caching and Content Delivery
  • Olfactory and Sensory Function Studies
  • Cryptography and Data Security
  • Nonlinear Dynamics and Pattern Formation
  • Recommender Systems and Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Fluid Dynamics and Mixing
  • Medical Imaging and Analysis
  • Biometric Identification and Security
  • Handwritten Text Recognition Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Human Pose and Action Recognition
  • Gene Regulatory Network Analysis
  • Peer-to-Peer Network Technologies

Linyi University
2015-2025

Chinese Academy of Sciences
2005-2022

Changchun Institute of Applied Chemistry
2022

Qinghai University
2015

Zhejiang University
2014

Jilin Agricultural Science and Technology University
2013

Harbin Engineering University
2013

New Jersey Institute of Technology
2011

Tianjin University
2008-2009

Ningxia Academy of Agriculture and Forestry Sciences
2009

Land use and land cover (LULC) change analysis is a systematic technique that aids in the comprehension of physical non-physical interaction with natural habitat pursuit environmental sustainability. Research regarding LULC’s spatiotemporal changing patterns simulation future scenarios offers complete view present development possibilities. To simulate transition potential LULC simulation, we utilized multi-temporal remotely sensed big data from 1990 to 2020 10-year interval. Independent...

10.3390/land11030419 article EN cc-by Land 2022-03-14

Vehicular social networking is an emerging application of the Internet Vehicles (IoV) which aims to achieve seamless integration vehicular networks and networks. However, unique characteristics networks, such as high mobility frequent communication interruptions, make content delivery end-users under strict delay constraints extremely challenging. In this paper, we propose a social-aware edge computing architecture that solves problem by using some vehicles in network servers can store...

10.1109/tits.2023.3250320 article EN cc-by IEEE Transactions on Intelligent Transportation Systems 2023-03-14

10.1007/s10773-018-3989-7 article EN International Journal of Theoretical Physics 2019-01-03

In this paper, a large-scale underwater image database for salient object detection or saliency is presented in detail. This called the OUC-VISION database, which contains 4400 images of 220 individual objects. Each captured with four pose variations (the frontal-, opposite-, left-, and right-views each object) five spatial locations located at top-left corner, top-right center, bottom-left bottom-right corner) to obtain 20 images. Meanwhile, publicly available also provides relevant...

10.1109/icme.2017.8019324 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2017-07-01

Cryptocurrency based on blockchain technology has gradually become a choice for people to invest in, and several users have participated in the accumulation of massive transaction data. Complete records blockchains openness data provide researchers with opportunities mine analyze blockchains. Network modeling analysis cryptocurrency are common methods analysis. The attribute graphs can insights into various economic indicators, illegal activities, general Internet security, among others....

10.26599/tst.2021.9010080 article EN Tsinghua Science & Technology 2022-07-21

Extrapolating future human motion based on the historical pose sequence is foundation of various intelligent applications. Numerous deep learning-based algorithms have been designed to address this task, achieving state-of-the-art performance different benchmark datasets. However, most existing methods employ three-dimensional coordinates joints demonstrate dynamic contexts implicitly. Unfortunately, it remains challenging in capturing information from sequence. In paper, we advocate...

10.1109/tcsvt.2023.3284013 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-06-08

Abstract Hypoxia, overexpressed glutathione (GSH) and depletable H 2 O in tumor microenvironment (TME) are three major obstacles to the development of reactive oxygen species (ROS)‐mediated antitumor therapy. Herein, a photodynamic/chemodynamic synergistic therapeutic nanoagent, DMOS@CuO /ICG‐HA (DCI), is synthesized based on copper peroxide (CuO ) indocyanine green (ICG) co‐loaded disulfide‐bond‐incorporated dendritic mesoporous organosilica (DMOS), with modification hyaluronic acid (HA)....

10.1002/adom.202202040 article EN Advanced Optical Materials 2022-11-18

To tackle the problems of questioning authenticity products faced in e-commerce live streaming and low data integrity process product transactions, concept traceability a authentication scheme that integrates blockchain technology are proposed. The proposed deploys strategy on Ethereum form smart contract calls method body by executing to realize quality. A combination on-chain off-chain is used store private information guarantee integrity. Security analysis results show can make risk...

10.3390/electronics11203314 article EN Electronics 2022-10-14

Deep learning has allowed great progress to be made in obtaining more accurate prediction results for brain tumor segmentation. The current mainstream research approaches obtain segmentation accuracy improvements by modifying deep-learning model architectures, while ignoring the computational and storage efficiency issues of In this paper, we proposed an improved knowledge distillation method: coordinate (CD), which integrates channel space information completes training student network with...

10.3390/app122311980 article EN cc-by Applied Sciences 2022-11-23

10.1007/s12652-019-01529-2 article EN Journal of Ambient Intelligence and Humanized Computing 2019-10-11

A novel watermarking technique for Chinese text is presented in this paper, based on the thought of mathematical expression a character and its automatic generation. The proposed method embeds signals into some characters with occlusive components by readjusting size closed rectangular regions these components. algorithm very simple totally content. Experiments show that more robust transparent than counterpart methods. It will play an important role protecting security documents over Internet.

10.1109/ictta.2006.1684670 article EN 2006-10-24

Deep-learning-based registration methods can not only save time but also automatically extract deep features from images. In order to obtain better performance, many scholars use cascade networks realize a coarse-to-fine progress. However, such will increase network parameters by an n-times multiplication factor and entail long training testing stages. this paper, we in the stage. Unlike others, role of second is improve performance first function as augmented regularization term whole...

10.3390/s23063208 article EN cc-by Sensors 2023-03-17

Image segmentation is the foundation of multi-flow high speed video analysis. Based on improved canny operator, we provide a method to bubble gas/liquid two-phase flow image segmentation, which takes more gray distribution information into account, uses gauss sigma smooth filter maintain edges and eliminate noise, then by non-maximum control grads lag-threshold process, clear edge obtained. The very effective for analysis recognition multi-flow.

10.1109/csse.2008.1396 article EN 2008-01-01

A visual secret sharing (VSS) scheme is intended to share information in a group avoid potential treat of interruption and modification. In this paper, we present novel VSS based on the improved local binary pattern (LBP) operator. It makes full use contrast features LBP for concealing image data into different shares, which can be used recover easily exactly. By varying extensions, design various kinds schemes information. Compared currently available algorithms, proposed demonstrates...

10.1142/s0218001418500179 article EN International Journal of Pattern Recognition and Artificial Intelligence 2017-10-10
Coming Soon ...