Yulan Zhang

ORCID: 0000-0003-1574-5286
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • COVID-19 Clinical Research Studies
  • Generative Adversarial Networks and Image Synthesis
  • SARS-CoV-2 and COVID-19 Research
  • Long-Term Effects of COVID-19
  • Geomechanics and Mining Engineering
  • Image Processing Techniques and Applications
  • Advanced Optimization Algorithms Research
  • Advanced Neural Network Applications
  • Image and Signal Denoising Methods
  • Sparse and Compressive Sensing Techniques
  • Robotic Path Planning Algorithms
  • Viral Infections and Vectors
  • Geophysical Methods and Applications
  • Advanced Steganography and Watermarking Techniques
  • Civil and Geotechnical Engineering Research
  • Domain Adaptation and Few-Shot Learning
  • Image and Video Stabilization
  • Advanced Image Processing Techniques
  • Video Surveillance and Tracking Methods
  • Advanced Image and Video Retrieval Techniques
  • Genomics and Chromatin Dynamics
  • Neural Networks and Applications
  • Mosquito-borne diseases and control
  • Visual Attention and Saliency Detection

Huizhou University
2022-2024

Weifang University of Science and Technology
2021-2024

Chinese Academy of Sciences
2020-2023

McMaster University
2023

Wuhan Institute of Virology
2020-2023

Lanzhou University of Technology
2023

Sun Yat-sen University
2023

Shenzhen Institutes of Advanced Technology
2020-2022

Yale University
2022

University of Chinese Academy of Sciences
2014-2021

Abstract SARS-CoV-2 induced marked lymphopenia in severe patients with COVID-19. However, whether lymphocytes are targets of viral infection is yet to be determined, although RNA or antigen has been identified T cells from patients. Here, we confirmed that could detected patient peripheral blood (PBCs) postmortem lung cells, and the infectious virus also antigen-positive PBCs. We next prove infects lymphocytes, preferably activated CD4 + vitro. Upon infection, RNA, subgenomic protein...

10.1038/s41392-022-00919-x article EN cc-by Signal Transduction and Targeted Therapy 2022-03-11

Advancements in digital technologies, such as the Internet of Things (IoT), fog/edge/cloud computing, and cyber-physical systems have revolutionized a broad spectrum smart city applications. The significant contributions rapid developments advanced artificial intelligence-based technologies approaches, like, machine learning deep learning, which are applied for extracting accurate information from extensive data, perform potential role IoT Moreover, blockchain technology's fast adoption also...

10.1002/int.22852 article EN International Journal of Intelligent Systems 2022-02-16

Lithological facies classification is a pivotal task in petroleum geology, underpinning reservoir characterization and influencing decision-making exploration production operations. Traditional methods, such as support vector machines Gaussian process classifiers, often struggle with the complexity nonlinearity of geological data, leading to suboptimal performance. Moreover, numerous prevalent approaches fail adequately consider inherent dependencies sequence measurements from adjacent...

10.26599/tst.2023.9010077 article EN Tsinghua Science & Technology 2024-02-09

Image splicing can be easily used for illegal activities such as falsifying propaganda political purposes and reporting false news, which may result in negative impacts on society. Hence, it is highly required to detect spliced images localize the regions. In this work, we propose a multi-task squeeze excitation network (SE-Network) localization. The proposed consists of two streams, namely label mask stream edge-guided stream, both adopt convolutional encoder-decoder architecture....

10.1109/tcsvt.2021.3123829 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-10-27

Abstract CRISPR-Cas systems are considered as barriers to horizontal gene transfer (HGT). However, the influence of such on HGT within species is unclear. Also, little known about impact bacterial evolution at population level. Here, using Bacillus cereus sensu lato model, we investigate interplay between and scale. We found that only a small fraction strains have (13.9% 1871), most defective based their content analysis. Comparative genomic analysis revealed this group, since harboring...

10.1038/s41396-020-0623-5 article EN cc-by The ISME Journal 2020-03-04

Copy-move forgery can be used for hiding certain objects or duplicating meaningful in images. Although copy-move detection has been studied extensively recent years, it is still a challenging task to distinguish between the source and target regions In this paper, convolutional neural network-transformer based generative adversarial network (CNN-T GAN) proposed forged image. A generator first utilized generate mask that similar groundtruth mask. Then, discriminator trained discriminate true...

10.1109/tcsvt.2022.3220630 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-11-07

Nonsmooth functions have been used to model discrete-continuous phenomena such as contact mechanics, and are also prevalent in neural network formulations via activation ReLU. At previous AD conferences, Griewank et al. showed that nonsmooth may be approximated well by piecewise-affine constructed using an AD-like procedure. Moreover, a function always represented "abs-normal form", encoding it collection of four matrices two vectors. We present new general complementarity for root-finding...

10.48550/arxiv.2501.18503 preprint EN arXiv (Cornell University) 2025-01-30

We showed that RVFV infection induced the complete autophagy process. Depletion of core genes ATG5 , ATG7 or SQSTM1 pharmacologic inhibition in macrophages strongly suppressed replication.

10.1128/jvi.01814-22 article EN Journal of Virology 2023-03-20

Quantization plays a pivotal role in JPEG compression with respect to the tradeoff between image fidelity and storage size, blind estimation of quantization parameters has attracted considerable interest fields steganalysis forensics. Existing methods have made great progress, but they usually suffer sharp decline accuracy when addressing small-size decompressed bitmaps due insufficiency coefficients. Aiming alleviate this issue, paper proposes generic clustering-based framework improve...

10.1109/tcsvt.2020.3003653 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-06-19

To securely transmit secret data between Internet of Things (IoT) nodes, it is required to the implement information hiding technique for secure communication in IoT environment. The traditional approaches generally select a multimedia file, such as texts, images, and video clips cover, then embed into cover by slight modification. However, not feasible directly apply these environment following reasons. First, hard some nodes effectively efficiently process complex data. Second,...

10.1109/jiot.2021.3103779 article EN IEEE Internet of Things Journal 2021-08-10

Evaluation of the zoonotic risk animal SARSr-CoVs is important for future disease preparedness. However, there are misconceptions regarding viruses.

10.1128/mbio.03285-22 article EN cc-by mBio 2023-02-14

Due to the outstanding penetrating detection performance of low-frequency electromagnetic waves, through-wall radar (TWR) has gained widespread applications in various fields, including public safety, counterterrorism operations, and disaster rescue. TWR is required accomplish tasks, such as people detection, counting, positioning practical applications. However, most current research primarily focuses on one or two tasks. In this paper, we propose a multitask network that can simultaneously...

10.3390/s23198147 article EN cc-by Sensors 2023-09-28

As silicon integration complexity increases with 3D stacking and Through-Silicon-Via (TSV), so does the occurrence of memory IO defects associated test validation time. This ultimately leads to an overall cost increase. On a 14nm Intel SOC, reusable BIST engine called Converged-Pattern-Generator-Checker (CPGC) are architected detect defects, combined software assisted repair technology automatically cell on stacked Wide-IO DRAM. Additionally, we also present CPGC gate count, power,...

10.1109/test.2014.7035340 article EN International Test Conference 2014-10-01

10.1007/s40687-022-00340-4 article EN Research in the Mathematical Sciences 2022-07-08

During meiosis, the stepwise release of sister chromatid cohesion is crucial for equal distribution genetic material to daughter cells, enabling generation fertile gametophytes. However, molecular mechanism that protects centromeric from at meiosis I unclear in Arabidopsis (Arabidopsis thaliana). Here, we report protein phosphatase 2A regulatory subunits B'α and B'β participate control separation. The double mutant b'αβ exhibited severe male female sterility, caused by lack a nucleus or...

10.1104/pp.18.01320 article EN PLANT PHYSIOLOGY 2019-01-31

A miniaturized square resonator bandpass filter with circular stubs is designed, fabricated, and characterized. Analytical calculations were carried out to determine the critical parameters design was optimized using a 3D electromagnetic finite-element solver. The measured results in good agreement designed results. proposed exhibits significant improvement bandwidth compared conventional filters.

10.4236/jemaa.2013.53018 article EN Journal of Electromagnetic Analysis and Application 2013-01-01

10.1109/iceict61637.2024.10671056 article EN 2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT) 2024-07-31
Coming Soon ...