Xiaoyu Zhou

ORCID: 0000-0002-9261-8208
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Catalytic C–H Functionalization Methods
  • Advanced Image and Video Retrieval Techniques
  • Advanced Data Compression Techniques
  • Advanced Vision and Imaging
  • Complex Network Analysis Techniques
  • Catalytic Cross-Coupling Reactions
  • Image Retrieval and Classification Techniques
  • Computer Graphics and Visualization Techniques
  • Robotic Locomotion and Control
  • 3D Surveying and Cultural Heritage
  • Advanced Graph Neural Networks
  • Robotic Path Planning Algorithms
  • Control and Dynamics of Mobile Robots
  • Advanced Software Engineering Methodologies
  • Cyclopropane Reaction Mechanisms
  • Retinal Imaging and Analysis
  • Video Coding and Compression Technologies
  • Endometriosis Research and Treatment
  • Synthesis and Catalytic Reactions
  • Underwater Vehicles and Communication Systems
  • Wireless Signal Modulation Classification
  • Advanced Sensor and Control Systems

Obstetrics and Gynecology Hospital of Fudan University
2025

Jimei University
2021-2024

Peking University
2023-2024

Tongji University
2023-2024

Sun Yat-sen University
2018-2023

Xiamen University
2023

Waseda University
2023

Tianjin University
2023

Nanchang University
2023

China Construction Eighth Engineering Division (China)
2023

Multifunctionalization from the interception of active intermediates is an attractive synthetic strategy for efficient construction complex molecular scaffolds in atom and step economic fashion. However, design reactions involving metal carbynoids that exhibit carbene/carbocation behavior currently limited, developing catalyst-controlled highly enantioselective versions poses significant challenges. In this study, we present first asymmetric trifunctionalization with rhodium carbynoids. This...

10.1021/jacs.3c10460 article EN Journal of the American Chemical Society 2023-11-22

Transition metal-catalyzed enantioselective C-H activation of prochiral sulfoximines for non-annulated products remains a formidable challenge. We herein report iridium-catalyzed borylation N-silyl diaryl using well-designed chiral bidentate boryl ligand with bulky side arm. This method is capable accommodating broad range substrates under mild reaction conditions, affording vast array high enantioselectivities. also demonstrated the synthetic utility on preparative-scale diverse downstream...

10.1002/anie.202217130 article EN Angewandte Chemie International Edition 2022-12-13

While recent low-cost radar-camera approaches have shown promising results in multi-modal 3D object detection, both sensors face challenges from environmental and intrinsic disturbances. Poor lighting or adverse weather conditions degrade camera performance, while radar suffers noise positional ambiguity. Achieving robust detection requires consistent performance across varying conditions, a topic that has not yet been fully explored. In this work, we first conduct systematic analysis of...

10.48550/arxiv.2502.13071 preprint EN arXiv (Cornell University) 2025-02-18

In social networks, link prediction predicts missing links in current networks and new or dissolution future is important for mining analyzing the evolution of networks. past decade, many works have been done about The goal this paper to comprehensively review, analyze discuss state-of-the-art A systematical category techniques problems presented. Then are analyzed discussed. Typical applications also addressed. Achievements roadmaps some active research groups introduced. Finally, challenges

10.48550/arxiv.1411.5118 preprint EN other-oa arXiv (Cornell University) 2014-01-01

Sigmatropic rearrangement provides a versatile strategy to site-selectively reorganize carbon-skeleton with high atom- and step-economy. Herein, we disclose Mn(I)-catalyzed sigmatropic of β, γ-unsaturated alcohols via C-C σ bond activation. A variety α-aryl-allylic α-aryl-propargyl could undergo in-situ 1,2- or 1,3- rearrangements allow for converting complex structural arylethyl- arylvinyl- carbonyl compounds under simple catalytic system. More importantly, this catalysis model can be...

10.1038/s41467-023-37299-x article EN cc-by Nature Communications 2023-04-03

Loop closure detection is an important component of visual simultaneous localization and mapping (SLAM). However, most existing loop methods are vulnerable to complex environments use limited information from images. As higher-level image multi-information fusion can improve the robustness place recognition, a semantic–visual–geometric information-based algorithm (SVG-Loop) proposed in this paper. In detail, reduce interference dynamic features, semantic bag-of-words model was firstly...

10.3390/rs13173520 article EN cc-by Remote Sensing 2021-09-05

This paper proposes a joint coding and reversible data hiding method for absolute moment block truncation (AMBTC) compressed images. Existing methods use predictor to predict the quantization levels of AMBTC codes. Equal-length indicators, secret bits prediction errors are concatenated construct output code stream. However, might not highly correlate with their neighbors predictive coding, equal-length indicators impede efficiency. The proposed uses integer transform represent by means...

10.3390/sym10070254 article EN Symmetry 2018-07-02

This paper introduces an advanced grayscale-invariant authentication method for color images. Prior work directly utilizes the most significant bits (MSBs) of red and blue channels code generation embeds these codes into least (LSBs). Concurrently, green channel is adjusted to sustain consistent grayscale values. However, this direct utilization MSBs often leads a decline in image quality results number unsolvable pixels. To address challenges, we present new approach specifically designed...

10.1016/j.jksuci.2023.101726 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2023-08-24

Since digital media is gaining popularity nowadays, people are more concerned about its integrity protection and authentication since tampered may result in unexpected problems. Considering a better technique, this paper proposes an efficient tamper detection scheme for absolute moment block truncation coding (AMBTC) compressed images. In AMBTC, each image represented by two quantization levels (QLs) bitmap. Requiring insignificant computation cost, it attracts not only wide range of...

10.3390/sym10080318 article EN Symmetry 2018-08-02

In this paper, we propose an efficient method for authenticating the absolute moment block truncation coding (AMBTC) compressed images with capability to recover tampered blocks. The existing methods may not be able detect some types of intentional tampering. Meanwhile, blocks are only recovered by their means, causing unpleasant mosaic-like appearance. proposed classifies image into groups according similarities, and group information is recorded recovery purpose. multiple copies scrambled...

10.1371/journal.pone.0212802 article EN cc-by PLoS ONE 2019-02-27

Autonomous navigation has played an increasingly significant role in quadruped robot system. However, most existing works on robots using traditional search-based or sample-based methods do not consider the kinodynamic characteristics of robots, generating kinodynamically infeasible parts, that are difficult to track. In this paper, we introduce a complete system considering omnidirectional abilities robots. First, use path finding method obtain smooth, dynamically feasible, time-optimal...

10.1109/aim46487.2021.9517405 article EN 2022 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM) 2021-07-12

The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, marked image qualities of these can be enhanced, and their authentication methods may fail some special We propose a secure AMBTC scheme that preserves high fidelity with excellent detectability. In proposed approach, bit in bitmaps codes is sequentially toggled generate set codes. one causes least distortion embedded into quantization levels...

10.1371/journal.pone.0230997 article EN cc-by PLoS ONE 2020-04-16

Existing 3D single object trackers (SOTs) of a point cloud all apply downscaling when extracting features from points. This operation leads to loss spatial and structural information, degrading tracking performance sparsely distributed small-scale objects. To address this problem, structure aware SOT is proposed. Specifically, the backbone network combined with auxiliary learn point-wise representations. During training stage, subsidiary used perform additional tasks supervisions, which...

10.1117/1.jei.30.4.043010 article EN Journal of Electronic Imaging 2021-07-22

Recent novel view synthesis methods obtain promising results for relatively small scenes, e.g., indoor environments and scenes with a few objects, but tend to fail unbounded outdoor single image as input. In this paper, we introduce SAMPLING, Scene-adaptive Hierarchical Multiplane Images Representation Novel View Synthesis from Single Image based on improved multiplane images (MPI). Observing that depth distribution varies significantly employ an adaptive-bins strategy MPI arrange planes in...

10.1109/iccv51070.2023.02087 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

Link prediction is a significant and fundamental research issue in the field of network science. Numerous similarity-based algorithms have been widely applied due to low computational cost high accuracy. The topological features networks like community structure are beneficial link prediction. In this paper, we first introduce Weighted Two-level Neighborhood Similarity (WTNS) index that integrates resource allocation local path index. Then define Strength Community (SCL) as quantitative...

10.1142/s021797922250120x article EN International Journal of Modern Physics B 2022-06-08

To solve the problems of limited energy and hard to replace battery in underwater wireless sensor networks, a routing plan, as well an balancing strategy is proposed charge nodes by autonomous vehicles (AUV). Based on building flow balance constraint model power consumption model, cycle optimization maximize ratio break time total AUV one cycle, simulated annealing algorithm used optimal path AUV. Simulation results show that scheme can extend network lifetime while energy. <sup>1</sup>

10.1109/ctisc54888.2022.9849835 article EN 2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC) 2022-04-22
Coming Soon ...