Haodong Li

ORCID: 0000-0003-0532-9481
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Image Processing Techniques and Applications
  • Advanced Image Processing Techniques
  • Luminescence and Fluorescent Materials
  • Chaos-based Image/Signal Encryption
  • Cancer-related molecular mechanisms research
  • Music and Audio Processing
  • Advanced battery technologies research
  • Law in Society and Culture
  • Medical Imaging Techniques and Applications
  • Natural product bioactivities and synthesis
  • Signaling Pathways in Disease
  • Human Motion and Animation
  • Advanced MRI Techniques and Applications
  • Cancer-related gene regulation
  • Organic Light-Emitting Diodes Research
  • Molecular Sensors and Ion Detection
  • Influenza Virus Research Studies
  • 3D Shape Modeling and Analysis
  • Distributed Control Multi-Agent Systems
  • RNA regulation and disease
  • Video Analysis and Summarization
  • Advanced Battery Materials and Technologies

Xiangtan University
2023-2025

Hangzhou City University
2025

Anhui University of Science and Technology
2025

Shenzhen University
2018-2024

Fuzhou University
2023-2024

Guiyang Medical University
2024

Key Laboratory of Chemistry for Natural Products of Guizhou Province and Chinese Academy of Sciences
2024

Lanzhou University
2021-2024

Hong Kong University of Science and Technology
2024

University of Hong Kong
2024

The emergence of powerful image editing software has substantially facilitated digital tampering, leading to many security issues. Hence, it is urgent identify tampered images and localize regions. Although much attention been devoted tampering localization in recent years, still challenging perform practical forensic applications. reasons include the difficulty learning discriminative representations traces lack realistic for training. Since Photoshop widely used practice, this paper...

10.1109/tifs.2021.3070444 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

10.1109/cvpr52733.2024.00623 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Two novel human beta-chemokines, Ck beta-8 or myeloid progenitor inhibitory factor 1 (MPIF-1), and beta-6 MPIF-2, were discovered as part of a large scale cDNA sequencing effort. The MPIF-1 MPIF-2 cDNAs isolated from aortic endothelium activated monocyte libraries, respectively. Both the cloned into baculovirus vector expressed in insect cells. mature recombinant protein consists 99 amino acids is most homologous to macrophage inflammatory (MIP)-1alpha, showing 51% identity. It displays...

10.1084/jem.185.7.1163 article EN The Journal of Experimental Medicine 1997-04-07

Image forensics has attracted wide attention during the past decade. However, most existing works aim at detecting a certain operation, which means that their proposed features usually depend on investigated image operation and they consider only binary classification. This leads to misleading results if irrelevant and/or classifiers are used. For instance, JPEG decompressed would be classified as an original or median filtered it was fed into filtering detector. Hence, is important develop...

10.1109/tcsvt.2016.2599849 article EN IEEE Transactions on Circuits and Systems for Video Technology 2016-08-12

Image inpainting, an image processing technique for restoring missing or damaged regions, can be utilized by forgers removing objects in digital images. Since no obviously perceptible artifacts are left after it is necessary to develop methods detecting the presence of inpainting. In general, there two main categories inpainting techniques: exemplar-based and diffusion-based techniques. Although several have been proposed still effective method Usually, tampered regions manipulated...

10.1109/tifs.2017.2730822 article EN IEEE Transactions on Information Forensics and Security 2017-07-21

The overall electrochemical performances of Ni–Zn batteries are still far from satisfactory, specifically for rate performance and cycling stability Herein, we demonstrated a high-performance flexible Ni//Zn battery with outstanding durability high power density based on self-supported NiCo2O4 nanosheets as cathode Zn anode. This is able to deliver remarkable capacity 183.1 mAh g−1 good (82.7% retention after 3500 cycles). More importantly, this achieves an admirable 49.0 kW kg−1 energy...

10.1016/j.gee.2017.09.003 article EN cc-by-nc-nd Green Energy & Environment 2017-10-11

Image inpainting has been substantially improved with deep learning in the past years. Deep can fill image regions plausible contents, which are not visually apparent. Although is originally designed to repair images, it even be used for malicious manipulations, e.g., removal of specific objects. Therefore, necessary identify presence an image. This paper presents a method locate manipulated by inpainting. The proposed employs fully convolutional network that based on high-pass filtered...

10.1109/iccv.2019.00839 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2019-10-01

WOW (Wavelet Obtained Weights) [5] is one of the advanced steganographic methods in spatial domain, which can adaptively embed secret message into cover image according to textural complexity. Usually, more complex an region, pixel values within it would be modified. In such a way, achieve good visual quality resulting stegos and high security against typical steganalytic detectors. Based on our analysis, however, we point out limitations embedding algorithm, namely, easy narrow down those...

10.1145/2600918.2600935 article EN 2014-06-10

Over the past decade, many efforts have been made in passive image forensics. Although it is able to detect tampered images at high accuracies based on some carefully designed mechanisms, localization of regions a fake still presents challenges, especially when type tampering operation unknown. Some researchers realized that necessary integrate different forensic approaches order obtain better performance. However, several important issues not comprehensively studied, for example, how select...

10.1109/tifs.2017.2656823 article EN IEEE Transactions on Information Forensics and Security 2017-01-23

In modern steganography, embedding modifications are highly concentrated on the textural regions within an image, as such difficult to model for steganalysis. Previous studies have shown that compared with non-adaptive strategies, this content adaptive strategy achieves stronger security against existing Based experiments and analyses, however, we found property would inevitably lead a large limitation in steganography. That is, it is possible steganalyzers estimate probably been modified...

10.1109/tifs.2015.2507159 article EN IEEE Transactions on Information Forensics and Security 2015-12-10

A novel LDL-associated phospholipase A2 (LDL-PLA2) has been purified to homogeneity from human LDL obtained plasma apheresis. This enzyme activity toward both oxidized phosphatidylcholine and platelet activating factor (PAF). simple purification procedure involving detergent solubilization affinity ion exchange chromatography devised. Vmax Km for the are 170 micromol.min-1.mg-1 12 micromol/L, respectively. Extensive peptide sequence LDL-PLA2 facilitated identification of an expressed tag...

10.1161/01.atv.16.4.591 article EN Arteriosclerosis Thrombosis and Vascular Biology 1996-04-01

Image forensics have made great progress during the past decade. However, almost all existing forensic methods can be regarded as specific way, since they mainly focus on detecting one type of image processing operations. When operations changes, performances usually degrade significantly. In this paper, we propose a universal strategy based steganalytic model. By analyzing similarity between steganography and operation, find that to modify many pixels without considering some inherent...

10.1145/2600918.2600941 article EN 2014-06-10

In recent years, deep learning has achieved breakthrough results in various areas, such as computer vision, audio recognition, and natural language processing. However, just several related works have been investigated for digital multimedia forensics steganalysis. this paper, we design a novel CNN (convolutional neural networks) to detect steganography the time domain. Unlike most existing based methods which try capture media contents, carefully network layers suppress content adaptively...

10.1145/3082031.3083234 article EN 2017-06-14

ABSTRACT This study extends the dynamic event‐triggered fixed‐time consensus results of nonlinear multi‐agent systems (NMASs) from undirected graphs to general directed graphs. Three novel distributed control (ETC) protocols are proposed. Instead a constant, threshold is introduced in triggering function. The proposed controllers, along with their conditions, can ensure fewer trigger times and controller updates, resulting lower energy consumption. To avoid continuous communication between...

10.1002/rnc.7839 article EN International Journal of Robust and Nonlinear Control 2025-01-31

Traditional disposal methods such as landfilling and land reclamation are insufficient to mitigate the environmental impact of construction spoil, making non-sintered blocks a promising approach for resource utilization. This study investigates production performance steel slag soil an alternative conventional cement-based materials blocks. The optimal manufacturing parameters were identified sodium silicate solution with 6% Na2O, 30% content, liquid/solid ratio 0.18, forming pressure 10...

10.3390/ma18071596 article EN Materials 2025-04-01

Aqueous alkaline batteries represent an emerging kind of energy storage device, which hold great promise to power electronics with both high density and density.

10.1039/c7ta08451j article EN Journal of Materials Chemistry A 2017-01-01

The most devastating and catastrophic deterioration of myocardial ischemia-reperfusion injury (MIRI) is cardiomyocyte death. Here we aimed to evaluate the role lncRNA-ZFAS1 in MIRI delineate its mechanism action. level was elevated hearts, artificial knockdown mice improved cardiac function. Notch1 a potential target lncRNA-ZFAS1, could bind promoter region recruit DNMT3b induce methylation. Nicotinamide mononucleotide promote expression by competitively inhibiting improving apoptosis cardiomyocytes

10.1016/j.jacbts.2022.06.004 article EN cc-by-nc-nd JACC Basic to Translational Science 2022-09-01

The quantization artifacts and blocking are the two significant properties in JPEG compressed images. Most relative forensic techniques usually use such inherent to provide some evidences on how image data is acquired and/or processed. A wise attacker, however, may perform post-operations confuse fool current techniques. Recently, Stamm et al. [1] propose a novel anti-JPEG compression method via adding anti-forensic dither DCT coefficients further reducing artifacts. In this paper, we found...

10.1109/icip.2012.6466840 article EN 2012-09-01

Digital multimedia steganalysis has attracted wide attention over the past decade. Currently, there are many algorithms for detecting image steganography. However, little research been devoted to audio steganalysis. Since statistical properties of and files quite different, features that effective in may not be audio. In this article, we design an improved steganalytic feature set derived from both time Mel-frequency domains some typical steganography domain, including LSB matching,...

10.1145/3190575 article EN ACM Transactions on Multimedia Computing Communications and Applications 2018-04-25
Coming Soon ...