- Plasmonic and Surface Plasmon Research
- Chaos-based Image/Signal Encryption
- Random lasers and scattering media
- Advanced Optical Imaging Technologies
- Advanced Steganography and Watermarking Techniques
- Cancer Genomics and Diagnostics
- Plant and animal studies
- Insect and Arachnid Ecology and Behavior
- Photonic Crystals and Applications
- Advanced Optical Sensing Technologies
- Gold and Silver Nanoparticles Synthesis and Applications
- Orbital Angular Momentum in Optics
- Genomics and Rare Diseases
- Digital Holography and Microscopy
- Digital Media Forensic Detection
- Photonic and Optical Devices
- Optical Coatings and Gratings
- Animal and Plant Science Education
- Sparse and Compressive Sensing Techniques
- Metamaterials and Metasurfaces Applications
- Remote Sensing and LiDAR Applications
- Advanced Fiber Laser Technologies
- Advanced Measurement and Detection Methods
- Advanced Image Fusion Techniques
- Melanoma and MAPK Pathways
Sichuan University
2016-2025
University of Chinese Academy of Sciences
2021-2025
Harbin Institute of Technology
2018-2025
China Agricultural University
2011-2025
Hainan Medical University
2023-2025
Huazhong University of Science and Technology
2021-2025
Harvard University
2023-2025
Lenovo (China)
2025
Intel (United States)
2025
Dana-Farber Cancer Institute
2023-2025
To study the effect of ShenKang Injection (SKI) on kidneys DKD rats and its oxidative stress mediated by Keap1/Nrf2/Ho-1 signaling pathway through network pharmacology in vivo vitro experiments.SKI drug targets were screened TCMSP, GenGards, OMIM, Drugbank, TTD, Disgenet databases, two intersected for PPI analysis target prediction was performed GO KEGG. A total 40 SD randomly divided into 10 control group 30 model group. After fed 8 W with high-sugar high-fat diets, a constructed one-time...
The challenges of bee research in Asia are unique and severe, reflecting different cultures, landscapes, faunas. Strategies frameworks developed North America or Europe may not prove applicable. Virtually none these species have been assessed by the IUCN there is a paucity public data on even basics distribution. If we do know present, their distribution threats, cannot protect them, but our knowledge base vanishingly small compared to rest world. To better understand meet challenges, this...
With the wide application of UAVs in modern intelligent warfare as well civil fields, demand for C-UAS technology is increasingly urgent. Traditional detection methods have many limitations dealing with “low, slow, and small” targets. This paper presents a pure laser automatic tracking system based on Geiger-mode avalanche photodiode (Gm-APD). Combining target motion state prediction Kalman filter adaptive Camshift, Cam–Kalm algorithm proposed to achieve high-precision stable moving The also...
A novel, to the best of our knowledge, color computational ghost imaging scheme is presented for reconstruction a object image, which greatly simplifies experimental setup and shortens acquisition time. Compared conventional schemes, it only adopts one digital light projector project speckles single-pixel detector receive intensity, instead utilizing three monochromatic paths separately synthesizing branch results. Severe noise distortion, are common in imaging, can be removed by utilization...
High voltage/high temperature operation aggravates the risk of capacity attenuation and thermal runaway layered oxide cathodes due to crystal degradation interfacial instability. A combined strategy bulk regulation surface chemistry design is crucial handle these issues. Here, we present a simultaneous Li2WO4-coated gradient W-doped 0.98LiNi0.5Mn0.5O2·0.02Li2WO4 cathode through modulating content exotic dopant stoichiometric lithium salt during lithiation calcination. Benefiting from...
A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, inherent diffusion property of DRPE cleverly utilized to make up insufficiency RSA cryptography, while for simultaneous transmission cipher text two phase-masks, which not possible under technique. This technique combines complementary advantages DPRE encryption techniques brings security convenience efficient...
Background: Encrypting plain images into noise-like cipher is a common method in image encryption. However, when appear public networks, they are more likely to attract attention and suffer cryptanalysis. To solve this problem, researchers propose the concept of visually meaningful encryption scheme, which encrypts image. Objective: In order realize visual security increase information capacity, paper proposes flexible secure multi-image compression, hiding scheme based on two-dimensional...
Abstract Cancer cells require high levels of iron for rapid proliferation, leading to a significant upregulation the carrier protein Transferrin Receptor (TfR) on their cell surface. Leveraging this phenomenon and exceptionally fast endocytosis rate TfR, we introduce TArgeting Chimeras (TransTAC), novel molecular archetype membrane degradation in cancers other types. TransTACs repurpose naturally recycling receptor TfR1 degradation. To accomplish this, utilized combination engineering...
Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception confusion both sender receiver sides, so on. In this Letter, we show that an optical encryption system based computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation ciphertext. It leaves chance attack in which attackers can forge set fake keys according the intercepted If forged key be transmitted by some disguised...
Abstract A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding is presented. First, scrambling, diffusing are performed on the two plain images, privacy images obtained, respectively. Then, re-encrypted theory to obtain secret images. Finally, integer wavelet transform (IWT) carrier image coefficients, then embedded into coefficients 2k correction performed, obtained result processed by inverse IWT a encrypted image. rules selected for...
Despite the urgent need for conservation consideration, strategic action plans preservation of Asian honeybee,