- Digital Media Forensic Detection
- COVID-19 Clinical Research Studies
- Generative Adversarial Networks and Image Synthesis
- SARS-CoV-2 and COVID-19 Research
- Long-Term Effects of COVID-19
- Geomechanics and Mining Engineering
- Image Processing Techniques and Applications
- Advanced Optimization Algorithms Research
- Advanced Neural Network Applications
- Image and Signal Denoising Methods
- Sparse and Compressive Sensing Techniques
- Robotic Path Planning Algorithms
- Viral Infections and Vectors
- Geophysical Methods and Applications
- Advanced Steganography and Watermarking Techniques
- Civil and Geotechnical Engineering Research
- Domain Adaptation and Few-Shot Learning
- Image and Video Stabilization
- Advanced Image Processing Techniques
- Video Surveillance and Tracking Methods
- Advanced Image and Video Retrieval Techniques
- Genomics and Chromatin Dynamics
- Neural Networks and Applications
- Mosquito-borne diseases and control
- Visual Attention and Saliency Detection
Huizhou University
2022-2024
Weifang University of Science and Technology
2021-2024
Chinese Academy of Sciences
2020-2023
McMaster University
2023
Wuhan Institute of Virology
2020-2023
Lanzhou University of Technology
2023
Sun Yat-sen University
2023
Shenzhen Institutes of Advanced Technology
2020-2022
Yale University
2022
University of Chinese Academy of Sciences
2014-2021
Abstract SARS-CoV-2 induced marked lymphopenia in severe patients with COVID-19. However, whether lymphocytes are targets of viral infection is yet to be determined, although RNA or antigen has been identified T cells from patients. Here, we confirmed that could detected patient peripheral blood (PBCs) postmortem lung cells, and the infectious virus also antigen-positive PBCs. We next prove infects lymphocytes, preferably activated CD4 + vitro. Upon infection, RNA, subgenomic protein...
Advancements in digital technologies, such as the Internet of Things (IoT), fog/edge/cloud computing, and cyber-physical systems have revolutionized a broad spectrum smart city applications. The significant contributions rapid developments advanced artificial intelligence-based technologies approaches, like, machine learning deep learning, which are applied for extracting accurate information from extensive data, perform potential role IoT Moreover, blockchain technology's fast adoption also...
Lithological facies classification is a pivotal task in petroleum geology, underpinning reservoir characterization and influencing decision-making exploration production operations. Traditional methods, such as support vector machines Gaussian process classifiers, often struggle with the complexity nonlinearity of geological data, leading to suboptimal performance. Moreover, numerous prevalent approaches fail adequately consider inherent dependencies sequence measurements from adjacent...
Image splicing can be easily used for illegal activities such as falsifying propaganda political purposes and reporting false news, which may result in negative impacts on society. Hence, it is highly required to detect spliced images localize the regions. In this work, we propose a multi-task squeeze excitation network (SE-Network) localization. The proposed consists of two streams, namely label mask stream edge-guided stream, both adopt convolutional encoder-decoder architecture....
Abstract CRISPR-Cas systems are considered as barriers to horizontal gene transfer (HGT). However, the influence of such on HGT within species is unclear. Also, little known about impact bacterial evolution at population level. Here, using Bacillus cereus sensu lato model, we investigate interplay between and scale. We found that only a small fraction strains have (13.9% 1871), most defective based their content analysis. Comparative genomic analysis revealed this group, since harboring...
Copy-move forgery can be used for hiding certain objects or duplicating meaningful in images. Although copy-move detection has been studied extensively recent years, it is still a challenging task to distinguish between the source and target regions In this paper, convolutional neural network-transformer based generative adversarial network (CNN-T GAN) proposed forged image. A generator first utilized generate mask that similar groundtruth mask. Then, discriminator trained discriminate true...
Nonsmooth functions have been used to model discrete-continuous phenomena such as contact mechanics, and are also prevalent in neural network formulations via activation ReLU. At previous AD conferences, Griewank et al. showed that nonsmooth may be approximated well by piecewise-affine constructed using an AD-like procedure. Moreover, a function always represented "abs-normal form", encoding it collection of four matrices two vectors. We present new general complementarity for root-finding...
We showed that RVFV infection induced the complete autophagy process. Depletion of core genes ATG5 , ATG7 or SQSTM1 pharmacologic inhibition in macrophages strongly suppressed replication.
Quantization plays a pivotal role in JPEG compression with respect to the tradeoff between image fidelity and storage size, blind estimation of quantization parameters has attracted considerable interest fields steganalysis forensics. Existing methods have made great progress, but they usually suffer sharp decline accuracy when addressing small-size decompressed bitmaps due insufficiency coefficients. Aiming alleviate this issue, paper proposes generic clustering-based framework improve...
To securely transmit secret data between Internet of Things (IoT) nodes, it is required to the implement information hiding technique for secure communication in IoT environment. The traditional approaches generally select a multimedia file, such as texts, images, and video clips cover, then embed into cover by slight modification. However, not feasible directly apply these environment following reasons. First, hard some nodes effectively efficiently process complex data. Second,...
Evaluation of the zoonotic risk animal SARSr-CoVs is important for future disease preparedness. However, there are misconceptions regarding viruses.
Due to the outstanding penetrating detection performance of low-frequency electromagnetic waves, through-wall radar (TWR) has gained widespread applications in various fields, including public safety, counterterrorism operations, and disaster rescue. TWR is required accomplish tasks, such as people detection, counting, positioning practical applications. However, most current research primarily focuses on one or two tasks. In this paper, we propose a multitask network that can simultaneously...
As silicon integration complexity increases with 3D stacking and Through-Silicon-Via (TSV), so does the occurrence of memory IO defects associated test validation time. This ultimately leads to an overall cost increase. On a 14nm Intel SOC, reusable BIST engine called Converged-Pattern-Generator-Checker (CPGC) are architected detect defects, combined software assisted repair technology automatically cell on stacked Wide-IO DRAM. Additionally, we also present CPGC gate count, power,...
During meiosis, the stepwise release of sister chromatid cohesion is crucial for equal distribution genetic material to daughter cells, enabling generation fertile gametophytes. However, molecular mechanism that protects centromeric from at meiosis I unclear in Arabidopsis (Arabidopsis thaliana). Here, we report protein phosphatase 2A regulatory subunits B'α and B'β participate control separation. The double mutant b'αβ exhibited severe male female sterility, caused by lack a nucleus or...
A miniaturized square resonator bandpass filter with circular stubs is designed, fabricated, and characterized. Analytical calculations were carried out to determine the critical parameters design was optimized using a 3D electromagnetic finite-element solver. The measured results in good agreement designed results. proposed exhibits significant improvement bandwidth compared conventional filters.