- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Generative Adversarial Networks and Image Synthesis
- Image Processing Techniques and Applications
- Advanced Image Processing Techniques
- Luminescence and Fluorescent Materials
- Chaos-based Image/Signal Encryption
- Cancer-related molecular mechanisms research
- Music and Audio Processing
- Advanced battery technologies research
- Law in Society and Culture
- Medical Imaging Techniques and Applications
- Natural product bioactivities and synthesis
- Signaling Pathways in Disease
- Human Motion and Animation
- Advanced MRI Techniques and Applications
- Cancer-related gene regulation
- Organic Light-Emitting Diodes Research
- Molecular Sensors and Ion Detection
- Influenza Virus Research Studies
- 3D Shape Modeling and Analysis
- Distributed Control Multi-Agent Systems
- RNA regulation and disease
- Video Analysis and Summarization
- Advanced Battery Materials and Technologies
Xiangtan University
2023-2025
Hangzhou City University
2025
Anhui University of Science and Technology
2025
Shenzhen University
2018-2024
Fuzhou University
2023-2024
Guiyang Medical University
2024
Key Laboratory of Chemistry for Natural Products of Guizhou Province and Chinese Academy of Sciences
2024
Lanzhou University
2021-2024
Hong Kong University of Science and Technology
2024
University of Hong Kong
2024
The emergence of powerful image editing software has substantially facilitated digital tampering, leading to many security issues. Hence, it is urgent identify tampered images and localize regions. Although much attention been devoted tampering localization in recent years, still challenging perform practical forensic applications. reasons include the difficulty learning discriminative representations traces lack realistic for training. Since Photoshop widely used practice, this paper...
Two novel human beta-chemokines, Ck beta-8 or myeloid progenitor inhibitory factor 1 (MPIF-1), and beta-6 MPIF-2, were discovered as part of a large scale cDNA sequencing effort. The MPIF-1 MPIF-2 cDNAs isolated from aortic endothelium activated monocyte libraries, respectively. Both the cloned into baculovirus vector expressed in insect cells. mature recombinant protein consists 99 amino acids is most homologous to macrophage inflammatory (MIP)-1alpha, showing 51% identity. It displays...
Image forensics has attracted wide attention during the past decade. However, most existing works aim at detecting a certain operation, which means that their proposed features usually depend on investigated image operation and they consider only binary classification. This leads to misleading results if irrelevant and/or classifiers are used. For instance, JPEG decompressed would be classified as an original or median filtered it was fed into filtering detector. Hence, is important develop...
Image inpainting, an image processing technique for restoring missing or damaged regions, can be utilized by forgers removing objects in digital images. Since no obviously perceptible artifacts are left after it is necessary to develop methods detecting the presence of inpainting. In general, there two main categories inpainting techniques: exemplar-based and diffusion-based techniques. Although several have been proposed still effective method Usually, tampered regions manipulated...
The overall electrochemical performances of Ni–Zn batteries are still far from satisfactory, specifically for rate performance and cycling stability Herein, we demonstrated a high-performance flexible Ni//Zn battery with outstanding durability high power density based on self-supported NiCo2O4 nanosheets as cathode Zn anode. This is able to deliver remarkable capacity 183.1 mAh g−1 good (82.7% retention after 3500 cycles). More importantly, this achieves an admirable 49.0 kW kg−1 energy...
Image inpainting has been substantially improved with deep learning in the past years. Deep can fill image regions plausible contents, which are not visually apparent. Although is originally designed to repair images, it even be used for malicious manipulations, e.g., removal of specific objects. Therefore, necessary identify presence an image. This paper presents a method locate manipulated by inpainting. The proposed employs fully convolutional network that based on high-pass filtered...
WOW (Wavelet Obtained Weights) [5] is one of the advanced steganographic methods in spatial domain, which can adaptively embed secret message into cover image according to textural complexity. Usually, more complex an region, pixel values within it would be modified. In such a way, achieve good visual quality resulting stegos and high security against typical steganalytic detectors. Based on our analysis, however, we point out limitations embedding algorithm, namely, easy narrow down those...
Over the past decade, many efforts have been made in passive image forensics. Although it is able to detect tampered images at high accuracies based on some carefully designed mechanisms, localization of regions a fake still presents challenges, especially when type tampering operation unknown. Some researchers realized that necessary integrate different forensic approaches order obtain better performance. However, several important issues not comprehensively studied, for example, how select...
In modern steganography, embedding modifications are highly concentrated on the textural regions within an image, as such difficult to model for steganalysis. Previous studies have shown that compared with non-adaptive strategies, this content adaptive strategy achieves stronger security against existing Based experiments and analyses, however, we found property would inevitably lead a large limitation in steganography. That is, it is possible steganalyzers estimate probably been modified...
A novel LDL-associated phospholipase A2 (LDL-PLA2) has been purified to homogeneity from human LDL obtained plasma apheresis. This enzyme activity toward both oxidized phosphatidylcholine and platelet activating factor (PAF). simple purification procedure involving detergent solubilization affinity ion exchange chromatography devised. Vmax Km for the are 170 micromol.min-1.mg-1 12 micromol/L, respectively. Extensive peptide sequence LDL-PLA2 facilitated identification of an expressed tag...
Image forensics have made great progress during the past decade. However, almost all existing forensic methods can be regarded as specific way, since they mainly focus on detecting one type of image processing operations. When operations changes, performances usually degrade significantly. In this paper, we propose a universal strategy based steganalytic model. By analyzing similarity between steganography and operation, find that to modify many pixels without considering some inherent...
In recent years, deep learning has achieved breakthrough results in various areas, such as computer vision, audio recognition, and natural language processing. However, just several related works have been investigated for digital multimedia forensics steganalysis. this paper, we design a novel CNN (convolutional neural networks) to detect steganography the time domain. Unlike most existing based methods which try capture media contents, carefully network layers suppress content adaptively...
ABSTRACT This study extends the dynamic event‐triggered fixed‐time consensus results of nonlinear multi‐agent systems (NMASs) from undirected graphs to general directed graphs. Three novel distributed control (ETC) protocols are proposed. Instead a constant, threshold is introduced in triggering function. The proposed controllers, along with their conditions, can ensure fewer trigger times and controller updates, resulting lower energy consumption. To avoid continuous communication between...
Traditional disposal methods such as landfilling and land reclamation are insufficient to mitigate the environmental impact of construction spoil, making non-sintered blocks a promising approach for resource utilization. This study investigates production performance steel slag soil an alternative conventional cement-based materials blocks. The optimal manufacturing parameters were identified sodium silicate solution with 6% Na2O, 30% content, liquid/solid ratio 0.18, forming pressure 10...
Aqueous alkaline batteries represent an emerging kind of energy storage device, which hold great promise to power electronics with both high density and density.
The most devastating and catastrophic deterioration of myocardial ischemia-reperfusion injury (MIRI) is cardiomyocyte death. Here we aimed to evaluate the role lncRNA-ZFAS1 in MIRI delineate its mechanism action. level was elevated hearts, artificial knockdown mice improved cardiac function. Notch1 a potential target lncRNA-ZFAS1, could bind promoter region recruit DNMT3b induce methylation. Nicotinamide mononucleotide promote expression by competitively inhibiting improving apoptosis cardiomyocytes
The quantization artifacts and blocking are the two significant properties in JPEG compressed images. Most relative forensic techniques usually use such inherent to provide some evidences on how image data is acquired and/or processed. A wise attacker, however, may perform post-operations confuse fool current techniques. Recently, Stamm et al. [1] propose a novel anti-JPEG compression method via adding anti-forensic dither DCT coefficients further reducing artifacts. In this paper, we found...
Digital multimedia steganalysis has attracted wide attention over the past decade. Currently, there are many algorithms for detecting image steganography. However, little research been devoted to audio steganalysis. Since statistical properties of and files quite different, features that effective in may not be audio. In this article, we design an improved steganalytic feature set derived from both time Mel-frequency domains some typical steganography domain, including LSB matching,...