- Domain Adaptation and Few-Shot Learning
- Video Surveillance and Tracking Methods
- Advanced Neural Network Applications
- Glioma Diagnosis and Treatment
- Face recognition and analysis
- Gait Recognition and Analysis
- Tryptophan and brain disorders
- Multimodal Machine Learning Applications
- Neuroinflammation and Neurodegeneration Mechanisms
- Stress Responses and Cortisol
- Cancer Mechanisms and Therapy
- Advanced biosensing and bioanalysis techniques
- Quinazolinone synthesis and applications
- Cancer Cells and Metastasis
- Biosensors and Analytical Detection
- Human Pose and Action Recognition
- Adversarial Robustness in Machine Learning
- PI3K/AKT/mTOR signaling in cancer
- Cryptography and Data Security
- Ferroptosis and cancer prognosis
- Genetics, Aging, and Longevity in Model Organisms
- Machine Learning and ELM
- Human Mobility and Location-Based Analysis
- Cancer Research and Treatments
- Brain Tumor Detection and Classification
Nantong University
2024-2025
Zhejiang Chinese Medical University
2025
University of Michigan
2012-2023
Zhengzhou University
2021-2023
University of Electronic Science and Technology of China
2021-2023
AstraZeneca (United States)
2023
Renji Hospital
2023
Shanghai Institute of Hematology
2023
Shenzhen University
2023
Jiangxi University of Technology
2022
The blockchain-enabled internet of medical things (IoMT) is an emerging paradigm that could provide strong trust establishment and ensure the traceability data sharing in IoMT networks. One fundamental building blocks for Blockchain Elliptic Curve Digital Signature Algorithm (ECDSA). Nevertheless, when processing a large number transactions, verification multiple signatures will incur cumbersome overhead to nodes Blockchain. Although batch able promising approach verifies simultaneously...
(c) 2014. The copyright of this document resides with its authors. It may be distributed unchanged freely in print or electronic forms.
We propose a novel Generalized Zero-Shot learning (GZSL) method that is agnostic to both unseen images and semantic vectors during training. Prior works in this context map high-dimensional visual features the domain, which we believe contributes gap. To bridge gap, low-dimensional embedding of instances "visually semantic." Analogous data quantifies existence an attribute presented instance, components our prototypical part-type instance. In parallel, as thought experiment, quantify impact...
As we move toward large-scale object detection, it is unrealistic to expect annotated training data, in the form of bounding box annotations around objects, for all classes at sufficient scale; therefore, methods capable unseen detection are required. We propose a novel zero-shot method based on an end-to-end model that fuses semantic attribute prediction with visual features boxes seen and classes. While utilize during training, our agnostic information test-time. Our retains efficiency...
Zero-shot detection, namely, localizing both seen and unseen objects, increasingly gains importance for large-scale applications, with large number of object classes, since, collecting sufficient annotated data ground truth bounding boxes is simply not scalable. While vanilla deep neural networks deliver high performance objects available during training, detection degrades significantly. At a fundamental level, while detectors are capable proposing boxes, which include they often incapable...
Aging is the primary risk factor of most chronic diseases in humans, including cardiovascular diseases, osteoporosis and neurodegenerative these extensively damage quality life for elderly individuals. a multifaceted process with numerous factors influencing it. Efficient model organisms are essential research development anti-aging agents, particularly while investigating pharmacological mechanisms. This review discusses application Caenorhabditis elegans studying aging its related...
Most existing person re-identification (ReID) methods assume the availability of extensively labelled cross-view pairs and a closed-set scenario (i.e. all probe people exist in gallery set). These two assumptions significantly limit their usefulness scalability real-world applications, particularly with large scale camera networks. To overcome limitations, we introduce more challenging yet realistic ReID setting termed OneShot-OpenSet-RelD, propose novel Regularised Kernel Subspace Learning...
Existing person re-identification (re-id) methods assume the provision of accurately cropped bounding boxes with minimum background noise, mostly by manually cropping. This is significantly breached in practice when must be detected automatically given a very large number images and/or videos processed. Compared to carefully manually, auto-detected are far less accurate random amount clutter which can degrade notably re-id matching accuracy. In this work, we develop joint learning deep model...
The synthesis of a series single entity, bifunctional MEK1/PI3K inhibitors achieved by covalent linking structural analogs the ATP-competitive PI3K inhibitor ZSTK474 and ATP-noncompetitive MEK PD0325901 is described. Inhibitors displayed potent in vitro inhibition MEK1 (0.015 < IC50 (nM) 56.7) (54 341) enzymatic assays. Concurrent was demonstrated with 9 14 two tumor cell lines (A549, D54). produced dose-dependent decreased viability similar to combined administration equivalent doses...
Aberrant overexpression of endoplasmic reticulum (ER)-resident oxidoreductase protein disulfide isomerase (PDI) plays an important role in cancer progression. In this study, we demonstrate that PDI promotes glioblastoma (GBM) cell growth and describe a class allosteric inhibitors are selective for over other family members.
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many sharing. To tackle this problem efficiently, in article, we put forward the group-attribute-based (G-ABEET) scheme. presented G-ABEET allows sensors equipped vehicles to encrypt traffic an expressive access policy before it. Only users attributes required by ought shared ciphertexts,...
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity a wide range applications, and clouds are natural promoters. Cloud-assisted IoT combines the advantages cloud computing IoT, which able collect data from real world maximizes value collected by means sharing analysis. Meanwhile, secure convenient retrieval in servers becomes important requirement for both enterprises individual users. Public-key encryption with search functionality (shorten as PKE-SF)...
Most existing person re-identification (re-id) methods are unsuitable for real-world deployment due to two reasons: Unscalability large population size, and Inadaptability over time. In this work, we present a unified solution address both problems. Specifically, propose construct an identity regression space (IRS) based on embedding different training identities (classes) formulate re-id as problem solved by in the IRS. The IRS approach is characterised closed-form with high learning...
Abstract The use of industrial Escherichia coli strains for the production bio‐based chemicals offers a promising and sustainable solution to growing scarcity non‐renewable resources contributes protection environment. However, many limitations, such as inhibition from toxic substrates, hyperosmosis, by‐products, other adverse fermentation conditions, prevent attaining stable cell growth rate, efficient metabolic flux, satisfactory productivity. There has thus been much effort obtain E. that...
Glioblastoma(GBM) is a lethal disease characterized by inevitable recurrence. Here we investigate the molecular pathways mediating resistance, with goal of identifying novel therapeutic opportunities. We developed longitudinal in vivo recurrence model utilizing patient-derived explants to produce paired specimens(pre- and post-recurrence) following temozolomide(TMZ) radiation(IR). These specimens were evaluated for treatment response identify gene expression driving resistance. Findings...
The aim of this study was to investigate the protective effect Free and Easy Wanderer (FAEW) on avoidance behavior induced by feeding Heat-Killed Escherichia coli, elucidate underlying mechanisms. Initially, effects FAEW behavior, survival, neuroendocrine signaling gene expression, intestinal bloating were examined. impact gut-germline-neural assessed monitoring H4K8ac expression par-5 RNAi animals glp-1(e2141) mutants. RNA-sequencing conducted analyze potential pathways. Finally, examined...
Despite the use of ionizing radiation (IR) and temozolomide (TMZ), outcome for glioblastoma (GBM) patients remains dismal. Poly (ADP-ribose) polymerase (PARP) is important in repair pathways IR-induced DNA damage TMZ-induced alkylation at N7-methylguanine N3-methyldenine. However, optimized protocols administration PARP inhibitors have not been delineated. In this study, inhibitor ABT-888 was evaluated combination with compared to current standard-of-care a genetically engineered mouse GBM...