Xiaoming Xiong

ORCID: 0000-0002-2421-7621
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Residue Arithmetic
  • Coding theory and cryptography
  • VLSI and FPGA Design Techniques
  • Cryptography and Data Security
  • CCD and CMOS Imaging Sensors
  • Advanced Neural Network Applications
  • Spinal Fractures and Fixation Techniques
  • Cryptographic Implementations and Security
  • Advanced Image and Video Retrieval Techniques
  • Sparse and Compressive Sensing Techniques
  • Embedded Systems Design Techniques
  • Thin-Film Transistor Technologies
  • Advanced Memory and Neural Computing
  • Parallel Computing and Optimization Techniques
  • VLSI and Analog Circuit Testing
  • Soft Robotics and Applications
  • Surgical Simulation and Training
  • Antenna Design and Optimization
  • Speech and Audio Processing
  • Advancements in Semiconductor Devices and Circuit Design
  • Direction-of-Arrival Estimation Techniques
  • Spine and Intervertebral Disc Pathology
  • Vehicular Ad Hoc Networks (VANETs)

Guangdong University of Technology
2015-2025

Xiamen Medical College
2022-2023

Huazhong University of Science and Technology
2023

Tongji Hospital
2023

Conference Board
2021-2022

Xi’an Jiaotong-Liverpool University
2021

Guangxi University of Finance and Economics
2021

Sichuan Cancer Hospital
2019-2020

Sichuan Provincial Hospital of Traditional Chinese Medicine
2020

Jiangxi Normal University
2011

In the field of robotics, soft robots have been showing great potential in areas medical care, education, service, rescue, exploration, detection, and wearable devices due to their inherently high flexibility, good compliance, excellent adaptability, natural safe interactivity. Pneumatic occupy an essential position among because features such as lightweight, efficiency, non-pollution, environmental adaptability. Thanks its mentioned benefits, increasing research interests attracted...

10.3390/act11030092 article EN cc-by Actuators 2022-03-16

Purpose The purpose of this paper is to develop a human activity-aware adaptive shared control solution for human–robot interaction in surgical operation. Hands-on and teleoperation are two main procedures switched frequently teleoperated minimally invasive surgery (MIS). detailed activity the can be defined recognized using sensor information. In paper, novel continuous method proposed manipulators with Cartesian impedance scenario. Design/methodology/approach A by adjusting weight function...

10.1108/aa-12-2021-0174 article EN Assembly Automation 2022-05-10

Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential efficiently for less plaintext sensitivity, many plain cryptosystems have been developed. Most adopted traditional permutation–diffusion structure still some drawbacks and flaws: (1) encryption schemes using only confusion operation diffusion relate inadequately achieve high sensitivity; (2) in algorithms, generation of...

10.3390/e20070535 article EN cc-by Entropy 2018-07-18

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most these cannot resist powerful chosen-plaintext attack and chosen-ciphertext efficiently for less sensitivity to plain-image. This paper presents symmetric color system based on plaintext-related random access bit-permutation mechanism (PRRABPM). In proposed scheme, new is used shuffle 3D bit matrix transformed from an original image, making RGB...

10.3390/e20040282 article EN cc-by Entropy 2018-04-13

Abstract In this paper, a secure plaintext‐related image encryption scheme based on compressive sensing and tent‐sine system is proposed. First, the discrete wavelet transform (DWT) used to plain get coefficient matrix. Second, several chaotic sequences generated by map are scramble matrix construct measurement Afterward, performed obtain small‐sized encrypted image. Finally, an related plaintext designed. particular, proposed uses original information participate in process, ensuring high...

10.1049/ipr2.12429 article EN cc-by-nc IET Image Processing 2022-02-03

Abstract Tumor‐associated macrophages (TAMs) play critical roles in reprogramming other immune cells and orchestrating antitumor immunity. However, the interplay between TAMs tumor responsible for enhancing evasion remains insufficiently understood. Here, we revealed that interleukin (IL)‐1β was among most abundant cytokines within vitro tumor‐macrophage coculture system, enhanced IL‐1β expression associated with impaired cytotoxicity of CD8 + T human ovarian cancer, indicating possibility...

10.1002/mco2.242 article EN cc-by MedComm 2023-03-30

By leveraging the power of open-source software, EDA tool offers a cost-effective and flexible solution for designers, researchers, hobbyists alike. Open-source promotes collaboration, innovation, knowledge sharing within community. It emphasizes role toolchain in accelerating development electronic systems, reducing design costs, improving quality. This paper presents an project, iEDA, aiming to build basic infrastructure technology evolution closing industrial-academic gap area. As...

10.1109/asp-dac58780.2024.10473983 article EN 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) 2024-01-22

Abstract In telemedicine, diverse medical images transmitted between doctors and patients contain sensitive personal information. Thus, there is an urgent need for reliable efficient image encryption to protect these during transmission. this paper, a simultaneous permutation diffusion framework (SPDF) introduced based on new chaotic map. Firstly, combining the Chebyshev map iterative with infinite collapse (ICMIC), we propose one-dimensional system (1D-CICMIC) which exhibits higher...

10.1088/1402-4896/ad3bf4 article EN Physica Scripta 2024-04-08

10.1109/tcad.2025.3532823 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025-01-01

10.1109/tcad.2025.3543436 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025-01-01

In FPGA routing, machine learning-based optimization methods have achieved improved routing solutions by integrating traditional heuristics with predictive capabilities. However, these approaches mostly relied on single-task learning models black-box nature and often neglected the complex trade-offs inter-dependencies between metrics. To address limitations, this paper introduces a novel multi-task method. congestion-wirelength co-learning stage, simultaneous prediction of congestion...

10.1145/3728467 article EN ACM Transactions on Design Automation of Electronic Systems 2025-04-07

Summary 1. It has been reported that resveratrol exerts the inhibitory effects on aging through activation of sirtuin 1 (SIRT1) and dimethylarginine dimethylaminohydrolase (DDAH)/asymmetric (ADMA) pathway involved in high glucose‐induced endothelial cell senescence. 2. The aims this work were to explore whether BTM‐0512, a novel derivative resveratrol, was able exert beneficial effect cellular senescence regulating DDAH/ADMA regulatory BTM‐0512 related SIRT1. 3. model cells induced by...

10.1111/j.1440-1681.2010.05368.x article EN Clinical and Experimental Pharmacology and Physiology 2010-02-04

In this paper, a low hardware consumption design of elliptic curve cryptography (ECC) over GF(p) in embedded applications is proposed. The adder-based architecture explored to reduce the performing scalar multiplication (SM). Interleaved Modular Multiplication Algorithm and Binary Inversion are improved implemented with two full-word adder units. register units for data storage also optimized. based on twelve pipeline structure was Xilinx Virtex-4 platform. Design Compiler used synthesized...

10.3390/electronics7070104 article EN Electronics 2018-07-03

The security of smart devices is facing great challenges. This article presents a new hybrid cipher framework suitable for such devices. Using software/hardware (SW/HW) co-design method, an efficient encryption/decryption and digital signature scheme based on SM2, SM3, SM4 algorithms implemented. First, the partitioned into software hardware parts analysis result pure solution overhead under conditions design constraints. Second, flow whole embedded are realized by SW/HW co-design. Finally,...

10.1109/tcad.2019.2939330 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2019-09-04

Elliptic curve cryptography (ECC) is widely used in practical applications because ECC has far fewer bits for operands at the same level of security than other public-key cryptosystems such as RSA. The performance an processor usually determined by modular multiplication (MM) and point (PM) operations. For recommended prime field, MM operation can consist fast reduction In this paper, a 256-bit implemented 129-bit (half-word) multiplier using Karatsuba–Ofman algorithm. modulo operation,...

10.3390/electronics8040431 article EN Electronics 2019-04-14

Placement is essential in very large-scale integration (VLSI) physical design, as it directly affects the design cycle. Despite extensive prior research on placement, achieving fast and efficient placement remains challenging because of increasing complexity. In this paper, we comprehensively review progress optimization from perspective accelerating VLSI design. It can help researchers systematically understand problem corresponding means, thereby advancing modern research. We highlight...

10.3390/electronics12020337 article EN Electronics 2023-01-09

In this article, a new low-profile broadband circularly polarized antenna with single-layer metasurface is designed. The composed of 4 × rotated rectangle-loops. Compared to single rectangle, introducing inner-cut rectangle slot can increase the design flexibilities by changing size for wider operating bandwidth and reduce in same frequency. proposed has advantages wide 3-dB axial ratio from 5.4 6.05 GHz an excellent 10-dB impedance 5 GHz.

10.1002/mmce.22226 article EN International Journal of RF and Microwave Computer-Aided Engineering 2020-04-06
Coming Soon ...