Xin Zhou

ORCID: 0000-0003-1076-1033
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Plasmonic and Surface Plasmon Research
  • Chaos-based Image/Signal Encryption
  • Random lasers and scattering media
  • Advanced Optical Imaging Technologies
  • Advanced Steganography and Watermarking Techniques
  • Cancer Genomics and Diagnostics
  • Plant and animal studies
  • Insect and Arachnid Ecology and Behavior
  • Photonic Crystals and Applications
  • Advanced Optical Sensing Technologies
  • Gold and Silver Nanoparticles Synthesis and Applications
  • Orbital Angular Momentum in Optics
  • Genomics and Rare Diseases
  • Digital Holography and Microscopy
  • Digital Media Forensic Detection
  • Photonic and Optical Devices
  • Optical Coatings and Gratings
  • Animal and Plant Science Education
  • Sparse and Compressive Sensing Techniques
  • Metamaterials and Metasurfaces Applications
  • Remote Sensing and LiDAR Applications
  • Advanced Fiber Laser Technologies
  • Advanced Measurement and Detection Methods
  • Advanced Image Fusion Techniques
  • Melanoma and MAPK Pathways

Sichuan University
2016-2025

University of Chinese Academy of Sciences
2021-2025

Harbin Institute of Technology
2018-2025

China Agricultural University
2011-2025

Hainan Medical University
2023-2025

Huazhong University of Science and Technology
2021-2025

Harvard University
2023-2025

Lenovo (China)
2025

Intel (United States)
2025

Dana-Farber Cancer Institute
2023-2025

To study the effect of ShenKang Injection (SKI) on kidneys DKD rats and its oxidative stress mediated by Keap1/Nrf2/Ho-1 signaling pathway through network pharmacology in vivo vitro experiments.SKI drug targets were screened TCMSP, GenGards, OMIM, Drugbank, TTD, Disgenet databases, two intersected for PPI analysis target prediction was performed GO KEGG. A total 40 SD randomly divided into 10 control group 30 model group. After fed 8 W with high-sugar high-fat diets, a constructed one-time...

10.1016/j.phymed.2023.154915 article EN cc-by-nc-nd Phytomedicine 2023-06-10

The challenges of bee research in Asia are unique and severe, reflecting different cultures, landscapes, faunas. Strategies frameworks developed North America or Europe may not prove applicable. Virtually none these species have been assessed by the IUCN there is a paucity public data on even basics distribution. If we do know present, their distribution threats, cannot protect them, but our knowledge base vanishingly small compared to rest world. To better understand meet challenges, this...

10.1016/j.biocon.2023.110173 article EN cc-by-nc-nd Biological Conservation 2023-08-07

With the wide application of UAVs in modern intelligent warfare as well civil fields, demand for C-UAS technology is increasingly urgent. Traditional detection methods have many limitations dealing with “low, slow, and small” targets. This paper presents a pure laser automatic tracking system based on Geiger-mode avalanche photodiode (Gm-APD). Combining target motion state prediction Kalman filter adaptive Camshift, Cam–Kalm algorithm proposed to achieve high-precision stable moving The also...

10.3390/rs17010165 article EN cc-by Remote Sensing 2025-01-06

A novel, to the best of our knowledge, color computational ghost imaging scheme is presented for reconstruction a object image, which greatly simplifies experimental setup and shortens acquisition time. Compared conventional schemes, it only adopts one digital light projector project speckles single-pixel detector receive intensity, instead utilizing three monochromatic paths separately synthesizing branch results. Severe noise distortion, are common in imaging, can be removed by utilization...

10.1364/ol.418628 article EN Optics Letters 2021-03-16

High voltage/high temperature operation aggravates the risk of capacity attenuation and thermal runaway layered oxide cathodes due to crystal degradation interfacial instability. A combined strategy bulk regulation surface chemistry design is crucial handle these issues. Here, we present a simultaneous Li2WO4-coated gradient W-doped 0.98LiNi0.5Mn0.5O2·0.02Li2WO4 cathode through modulating content exotic dopant stoichiometric lithium salt during lithiation calcination. Benefiting from...

10.1039/d4sc03805c article EN cc-by-nc Chemical Science 2024-01-01

A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, inherent diffusion property of DRPE cleverly utilized to make up insufficiency RSA cryptography, while for simultaneous transmission cipher text two phase-masks, which not possible under technique. This technique combines complementary advantages DPRE encryption techniques brings security convenience efficient...

10.1364/oe.17.003270 article EN cc-by Optics Express 2009-02-17

Background: Encrypting plain images into noise-like cipher is a common method in image encryption. However, when appear public networks, they are more likely to attract attention and suffer cryptanalysis. To solve this problem, researchers propose the concept of visually meaningful encryption scheme, which encrypts image. Objective: In order realize visual security increase information capacity, paper proposes flexible secure multi-image compression, hiding scheme based on two-dimensional...

10.1016/j.heliyon.2023.e14072 article EN cc-by Heliyon 2023-02-27

Abstract Cancer cells require high levels of iron for rapid proliferation, leading to a significant upregulation the carrier protein Transferrin Receptor (TfR) on their cell surface. Leveraging this phenomenon and exceptionally fast endocytosis rate TfR, we introduce TArgeting Chimeras (TransTAC), novel molecular archetype membrane degradation in cancers other types. TransTACs repurpose naturally recycling receptor TfR1 degradation. To accomplish this, utilized combination engineering...

10.1101/2023.08.10.552782 preprint EN cc-by-nc-nd bioRxiv (Cold Spring Harbor Laboratory) 2023-08-13

Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception confusion both sender receiver sides, so on. In this Letter, we show that an optical encryption system based computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation ciphertext. It leaves chance attack in which attackers can forge set fake keys according the intercepted If forged key be transmitted by some disguised...

10.1364/ol.392424 article EN Optics Letters 2020-06-16

Abstract A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding is presented. First, scrambling, diffusing are performed on the two plain images, privacy images obtained, respectively. Then, re-encrypted theory to obtain secret images. Finally, integer wavelet transform (IWT) carrier image coefficients, then embedded into coefficients 2k correction performed, obtained result processed by inverse IWT a encrypted image. rules selected for...

10.1007/s40747-023-00989-6 article EN cc-by Complex & Intelligent Systems 2023-02-13

Despite the urgent need for conservation consideration, strategic action plans preservation of Asian honeybee,

10.24272/j.issn.2095-8137.2022.414 article EN 动物学研究 2023-01-01
Coming Soon ...