Pan Chen

ORCID: 0000-0002-1296-9770
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Indoor and Outdoor Localization Technologies
  • Hepatitis B Virus Studies
  • Liver Disease Diagnosis and Treatment
  • Reproductive Biology and Fertility
  • Underwater Vehicles and Communication Systems
  • Esophageal Cancer Research and Treatment
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • Speech and Audio Processing
  • Circular RNAs in diseases
  • Video Surveillance and Tracking Methods
  • Extracellular vesicles in disease
  • Cancer-related molecular mechanisms research
  • Immune cells in cancer
  • Single-cell and spatial transcriptomics
  • Cancer Immunotherapy and Biomarkers
  • Epigenetics and DNA Methylation
  • Oral microbiology and periodontitis research
  • Sparse and Compressive Sensing Techniques
  • Lung Cancer Treatments and Mutations
  • Radiomics and Machine Learning in Medical Imaging
  • Acute Lymphoblastic Leukemia research
  • Gastric Cancer Management and Outcomes

Zhejiang University
2018-2025

Jinhua Central Hospital
2023-2024

Henan Provincial People's Hospital
2024

Zhengzhou University
2024

National University of Defense Technology
2023-2024

China Medical University
2010-2024

Hunan Cancer Hospital
2024

Central South University
2024

Shanghai Jiao Tong University
2010-2024

Henan University of Science and Technology
2009-2024

Abstract Cancer immunotherapies have shown clinical success in various types of tumors but the patient response rate is low, particularly breast cancer. Here we report that malignant cancer cells can transfer active TGF-β type II receptor (TβRII) via tumor-derived extracellular vesicles (TEV) and thereby stimulate signaling recipient cells. Up-take vesicle-TβRII (EV-TβRII) low-grade tumor initiates epithelial-to-mesenchymal transition (EMT), thus reinforcing stemness increasing metastasis...

10.1038/s41467-022-31250-2 article EN cc-by Nature Communications 2022-08-01

This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich’s structure, the proposed method contains permutation, modulation, diffusion (PMD) operations. avoids shortcoming in traditional schemes of strictly shuffling pixel positions before encryption. Information entropy is employed to influence generation keystream. The initial keys used permutation stages interact with each other. As result, acts as indivisible entity enhance...

10.1142/s0218127418500104 article EN International Journal of Bifurcation and Chaos 2018-01-01

Color, as a notable and stable attribute of vehicles, can serve useful reliable cue in variety applications intelligent transportation systems. Therefore, vehicle color recognition natural scenes has become an important research topic this area. In paper, we propose deep-learning-based algorithm for automatic recognition. Different from conventional methods, which usually adopt manually designed features, the proposed is able to adaptively learn representation that more effective task...

10.1109/tits.2015.2430892 article EN IEEE Transactions on Intelligent Transportation Systems 2015-06-05

Vehicle information recognition is a key component of intelligent transportation systems. Color plays an important role in vehicle identification. As has its inner structure, the main challenge color to select region interest (ROI) for recognizing dominant color. In this paper, we propose method implicitly ROI recognition. Preprocessing performed overcome influence image quality degradation. Then, images selected by assigning subregions with different weights that are learned classifier...

10.1109/tits.2014.2308897 article EN IEEE Transactions on Intelligent Transportation Systems 2014-03-25

Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends algorithm. First, pair of public private keys generated by Subsequently, random message shown as plaintext key information encrypted the to achieve ciphertext information. Next, new transformation map established generate initial according substituted into fractional hyperchaotic equation calculate keystream. Finally, permutation diffusion...

10.1142/s0218127420502338 article EN International Journal of Bifurcation and Chaos 2020-12-09

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of drawbacks, namely, fixed key low sensitivity, some current algorithms, work tries to solve these two problems includes contributions: <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mo stretchy="false">(</mml:mo><mml:mn...

10.1155/2018/8402578 article EN cc-by Security and Communication Networks 2018-10-21

Abstract Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi‐image visual based on compressive sensing (CS) and Schur decomposition. First, multiple images are sparsed by discrete wavelet transform, the compressed obtained zigzag confusion CS. Second, these combined according to random sequences scrambled again obtain secret image. Third, carrier image subjected two‐level lifting transform where...

10.1002/ett.4071 article EN Transactions on Emerging Telecommunications Technologies 2020-08-10

In order to understand the hydrological process of expansive soil slopes, simulated rainfall experiments were conducted study effects slope gradient and initial moisture content on runoff infiltration for slopes located in south China. The field program consisted four neighboring (70%, 47%, 32%, 21%) instrumented by a collection system sensors (EC-5). Results from monitored tests indicate that there was delay response surface runoff. initiation time decreased with water increasing gradient....

10.3390/w12010222 article EN Water 2020-01-13

Abstract Dysregulated cell cycle progression has a critical role in tumorigenesis. Cell division 27 (CDC27) is core subunit of the anaphase-promoting complex/cyclosome, although specific CDC27 cancer remains unknown. In our study, we explored biological and clinical significance colorectal (CRC) growth investigated underlying molecular mechanisms. Results showed that expression significantly correlated with tumor poor patient survival. Functional assays demonstrated overexpression promoted...

10.1038/cddis.2015.402 article EN cc-by Cell Death and Disease 2016-01-28

The underlying mechanisms of bright light therapy (BLT) in the prevention individuals with subthreshold depression symptoms are yet to be elucidated. goal study was assess correlation between midbrain monoamine-producing nuclei treatment-related functional connectivity (FC) changes and depressive symptom improvements depression. This double-blind, randomized, placebo-controlled clinical trial conducted March 2020 June 2022. A total 74 young adults were randomly assigned receive 8-week BLT (

10.1037/amp0001218 article EN American Psychologist 2023-11-16

This study attempts to develop a novel apoptosis-related predictive model for cervical cancer. Differentially expressed genes were identified using TCGA, GEO, and MSigDB databases. A 13-gene prognostic was constructed multiple regression analyses. The low-risk group exhibited low tumor purity high ESTIMATE immune scores. Most of the checkpoints in at higher levels than those high-risk group. also had relatively more infiltrating cells. An independent pertaining cell apoptosis has been built...

10.1080/10255842.2025.2468324 article EN Computer Methods in Biomechanics & Biomedical Engineering 2025-02-26

Current single-cell RNA-seq approaches are hindered by preamplification bias, loss of strand origin information, and the inability to observe small-RNA mRNA dual transcriptomes. Here, we introduce a holo-transcriptome sequencing (Holo-Seq) that overcomes all three hurdles. Holo-Seq has same quantitative accuracy uniform coverage with complete information as bulk RNA-seq. Most importantly, can simultaneously small RNAs mRNAs in single cell. Furthermore, acquire RNA transcriptomes 32 human...

10.1186/s13059-018-1553-7 article EN cc-by Genome biology 2018-10-17

Harmful bacteria have seriously threatened human health and wealth for a long time. Herein, multifunctional drug delivery system based on UiO-66 was fabricated, it showed potent synergistic antibacterial effects when used in conjunction with photodynamic therapy chemotherapy. First, UiO-66-NH2 prepared via facile solvothermal method. Then, carboxylic zinc phthalocyanine, broad-spectrum photosensitizer, connected to by amidation. Next, chemical antibiotic linezolid loaded the pores, lysozyme...

10.1021/acs.langmuir.0c00292 article EN Langmuir 2020-03-27

This paper proposes a new image compression-encryption algorithm based on meaningful encryption framework. In block compressed sensing, the plain is divided into blocks, and subsequently, each rendered sparse. The zigzag scrambling method used to scramble pixel positions in all dimension reduction undertaken via compressive sensing. To ensure robustness security of our convenience subsequent embedding operations, merged, quantized, disturbed again obtain secret image. particular, landscape...

10.1155/2019/6572105 article EN Security and Communication Networks 2019-11-30

A plethora of prognostic biomarkers for esophageal squamous cell carcinoma (ESCC) that have hitherto been reported are challenged with low reproducibility due to high molecular heterogeneity ESCC. The purpose this study was identify the optimal ESCC using machine learning algorithms.Biomarkers related clinical survival, recurrence or therapeutic response patients were determined through literature database searching. Forty-eight linked prognosis used construct a interaction network based on...

10.1186/s12885-021-08647-1 article EN cc-by BMC Cancer 2021-08-09

Wi-Fi fingerprinting is widely used in indoor localization due to the ubiquitous availability of infrastructure environments. The basic assumption that received signal strength indicator (RSSI) distance consistent with location distance. However, fluctuation signals environments, nearest neighbors selected using RSSI may not be those whose corresponding locations are target, which could lead a large error. In this paper, we propose novel method for by transforming raw into features learned...

10.1109/tvt.2019.2959308 article EN IEEE Transactions on Vehicular Technology 2019-12-12
Coming Soon ...