Zhihua Wu

ORCID: 0000-0002-6761-2007
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Memory and Neural Mechanisms
  • Neuroscience and Neuropharmacology Research
  • Neural dynamics and brain function
  • Neurobiology and Insect Physiology Research
  • Visual perception and processing mechanisms
  • Advanced Steganography and Watermarking Techniques
  • Optical Wireless Communication Technologies
  • Animal Behavior and Reproduction
  • Digital Media Forensic Detection
  • Power Systems Fault Detection
  • Smart Grid and Power Systems
  • Insect and Arachnid Ecology and Behavior
  • PAPR reduction in OFDM
  • Network Security and Intrusion Detection
  • Power Systems and Technologies
  • Advanced MIMO Systems Optimization
  • Advanced Image Fusion Techniques
  • Cooperative Communication and Network Coding
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Signal Processing Techniques
  • Software-Defined Networks and 5G
  • Neuroscience and Neural Engineering
  • Advanced Wireless Network Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • Industrial Vision Systems and Defect Detection

Liming Vocational University
2011-2025

Shanghai University
2023-2024

Institute of Biophysics
2007-2023

Chinese Academy of Sciences
1999-2023

ZTE (China)
2011

Qi2
2011

Zen-Noh (Japan)
2011

ZTE (United States)
2011

State Key Laboratory of Brain and Cognitive Science
2009

Changsha University of Science and Technology
2008-2009

Copy-move forgery detection is a crucial task in digital image forensics, aiming to identify duplicated regions within an image. Traditional methods often locate the forged but struggle distinguish between original and copied areas. We introduce new method that addresses this issue. Initially, extracts low-frequency components of using contourlet transform. These are then divided into overlapping blocks, singular value features extracted from each block. The feature vectors sorted...

10.1587/transinf.2024edp7249 article EN IEICE Transactions on Information and Systems 2025-01-01

Dodging rapidly approaching objects is a fundamental skill for both animals and intelligent robots. Flies are adept at high-speed collision avoidance. However, it remains unclear whether the fly algorithm can be extracted applicable to real-time machine vision. In this study, we developed computational model inspired by looming detection circuit recently identified in Drosophila. Our results suggest that face of considerably noisy local motion signals, key achieve accurate attributed two...

10.1016/j.isci.2023.106337 article EN cc-by-nc-nd iScience 2023-03-05

Rat hippocampal cells exhibit characteristic phase-dependent firings when oscillation in frequency range around 8Hz is present. Based on the hypothesis that theta phase coding generated by synchronization of neural activities, an autoassociative network model hippocampus and entorhinal cortex was analyzed to explore mechanisms underlying episodic memory. Phase rhythm enables instantaneous acquisition experienced events including temporal spatial contents. Further comparison with...

10.1142/s0219635204000488 article EN Journal of Integrative Neuroscience 2004-06-01

Summary A wide variety of animal species including humans and fruit flies see second-order motion lacking coherent spatiotemporal correlations in luminance. Recent electrophysiological recordings, together with intensive psychophysical studies, are bringing to light the neural underpinnings perception mammals. However, where how higher-order signals processed fly brain is poorly understood. Using rich genetic tools available Drosophila examining optomotor responses several stimuli, we...

10.1242/jeb.079095 article EN Journal of Experimental Biology 2012-01-01

10.1016/j.neunet.2017.08.004 article EN publisher-specific-oa Neural Networks 2017-08-30

Flies detect and track moving targets among visual clutter, this process mainly relies on motion. Visual motion is analyzed or computed with the pathway from retina to T4/T5 cells. The computation of local directional was formulated as an elementary movement detector (EMD) model more than half a century ago. Solving target detection figure-ground discrimination problems can be equivalent extracting boundaries between background based discontinuities in output retinotopic array EMDs....

10.1371/journal.pcbi.1011077 article EN cc-by PLoS Computational Biology 2023-04-21

Quick and accurate location of faults is the basic task fault as well an important research subject in power system relay protection. The traveling wave principles double terminal locating method described, main causes generation errors actual application are investigated. A novel presented based on existing method. arriving intervals travelling from location, reflected opposite bus recorded. new applied Zhuzhou grid, results show that it has high accuracy.

10.1109/td-asia.2009.5356916 article EN 2009-10-01

According to the both-terminal traveling wave fault location, a novel network-based location algorithm is presented in this paper. In algorithm, information fusion technology applied, and path analyzed through shortest propagation principle. The arrival times recorded by remote substation converted into at reference substations which are closest line. Then morbid converted-times eliminated all valid fused with decided weight, exact position calculated last. paper can effectively resolve...

10.1109/icicta.2008.467 article EN 2008-10-01

Flying insects rely mainly upon visual motion to detect and track objects. There has been a lot of research on fly inspired algorithms for object detection, but few have developed based alone. One the daunting difficulties is that neural circuit mechanisms underlying foreground-background segmentation are still unclear. Our previous modeling study proposed lobula held parallel pathways with distinct directional selectivity, each which could retinotopically discriminate figures moving in its...

10.1088/1748-3190/ad5ba3 article EN cc-by Bioinspiration & Biomimetics 2024-06-25

It is a challenging work to solve the geometric attack in field of digital watermarking. In order synchronization between host image and watermark, normalization introduced. Firstly, geometrically invariant space constructed by using normalization, region interest (ROI) obtained from normalized utilizing centroid theory. Then, contourlet transform performed on ROI. Low-pass sub-band coefficients are divided into non-overlapping blocks. Finally, as energy blocks not same, an adaptive...

10.1109/access.2023.3319669 article EN cc-by-nc-nd IEEE Access 2023-01-01

A novel line non-unit protection principle based on traveling wave is proposed in the paper, it measures instantaneous frequency of crest at point transmission near trap. If large than lower cut off trap, internal fault thus detected. The influence trap for also investigated. Hilbert-Huang Transform (HHT) used extracting special signals. Theoretical analysis and EMTP simulation results show correction.

10.1109/pes.2009.5275255 article EN 2009-07-01

As JPEG is one of the most popularly used image formats, localizing forgeries plays a special role in passive forensics. In this paper, copy-move forgery detection scheme combined scale invariant feature transform (SIFT) with discrete cosine (DCT) coefficient analysis images proposed. Generally, all matching sift keypoints are located at suspected regions obviously by means sift-based forensic methods. But they cannot discriminate between original and forged regions. order to localize...

10.1109/icct46805.2019.8947235 article EN 2019-10-01
Coming Soon ...