Yingjun Zhang

ORCID: 0000-0003-3910-4176
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Advanced Steganography and Watermarking Techniques
  • Image Enhancement Techniques
  • Network Security and Intrusion Detection
  • Service-Oriented Architecture and Web Services
  • Digital Media Forensic Detection
  • Security and Verification in Computing
  • Advanced Measurement and Detection Methods
  • Distributed systems and fault tolerance
  • Forest, Soil, and Plant Ecology in China
  • Spam and Phishing Detection
  • Advanced Image Processing Techniques
  • Image and Video Stabilization
  • Internet Traffic Analysis and Secure E-voting
  • Urban Heat Island Mitigation
  • Image and Signal Denoising Methods
  • Advanced Image and Video Retrieval Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Vehicle License Plate Recognition
  • Environmental and Agricultural Sciences
  • Adversarial Robustness in Machine Learning
  • Currency Recognition and Detection
  • Advanced Authentication Protocols Security
  • Autonomous Vehicle Technology and Safety
  • Remote Sensing in Agriculture

Chinese Academy of Sciences
2013-2025

Kunming Institute of Botany
2025

Renmin Hospital of Wuhan University
2024

South China Agricultural University
2024

Institute of Software
2013-2024

Institute of Information Engineering
2024

University of Chinese Academy of Sciences
2024

Wuhan University
2021-2024

Huawei Technologies (China)
2024

Dalian Maritime University
2006-2023

It is reported recently that legitimate libraries are repackaged for propagating malware. An in-depth analysis of such potentially-harmful (PhaLibs), however, has never been done before, due to the challenges in identifying those whose code can be unavailable online (e.g., removed from public repositories, spreading underground, etc.). Particularly, an iOS app, library it integrates cannot trivially recovered its binary and analyzed by any publicly available anti-virus (AV) systems. In this...

10.1109/sp.2016.29 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2016-05-01

LoRA (Low-Rank Adaptation) has achieved remarkable success in the parameter-efficient fine-tuning of large models. The trained matrix can be integrated with base model through addition or negation operation to improve performance on downstream tasks. However, unauthorized use LoRAs generate harmful content highlights need for effective mechanisms trace their usage. A natural solution is embed watermarks into detect misuse. existing methods struggle when multiple are combined applied, as...

10.48550/arxiv.2501.15478 preprint EN arXiv (Cornell University) 2025-01-26

The lichen genus Solorina exhibits significant morphological and chemical variations between species. Recent molecular studies have demonstrated that is polyphyletic, underscoring the need for a comprehensive taxonomic revision. Phylogenetic analyses employing Bayesian methods Maximum Likelihood approaches based on three loci (nrITS, nrLSU, mtSSU) revealed species of segregate into two distinct clades. first clade includes characterized by bright orange lower surfaces contain secondary...

10.3390/jof11030169 article EN cc-by Journal of Fungi 2025-02-20

As the technology for offshore wireless transmission and collaborative innovation in unmanned ships continues to mature, research has been gradually carried out various countries on methods of compressing transmitting perceptual video while driving remotely. High Efficiency Video Coding (H.265/HEVC) played an extremely important role field Unmanned Aerial Vehicle (UAV) autopilot, as one most advanced coding schemes, its performance visual sensor is excellent. According characteristics...

10.3390/jmse11010122 article EN cc-by Journal of Marine Science and Engineering 2023-01-06

Maps are indispensable foundation for autonomous driving to provide prior knowledge of road structures. Constructing maps in a crowdsourcing manner has been research hotspot order achieve lower map production cost and higher update frequency. Existing pipelines mapping construct scalar on-cloud vectorization. This leads not only more demand storage space uploading bandwidth, but also the waste computing resources because vectorization is doing similar work as on-vehicle scene perception. To...

10.1109/lra.2024.3396096 article EN IEEE Robotics and Automation Letters 2024-05-01

Smartphones have become common tools in people's daily life. Lots of popular applications (e.g., social network applications) immigrated from traditional computers to smartphones. With the growth apps, attacks on these apps are also increasing. One serious attack adds malicious payloads or advertisements legitimate apps. These modified called repackaged share similar functionalities with original which makes them easily spread. To mitigate this attack, we embed watermarks into Android...

10.1109/sere.2014.19 article EN 2014-06-01

Crops are greatly affected by the temperature of farmland surface during their growing period. It is feasible to investigate growth status crops based on information. For serving research crop status, component (e.g. vegetation and soil) in need be obtained. In this study, an unmanned aerial vehicle (UAV) measurement system with a thermal infrared (TIR) imager charge-coupled device (CCD) camera assembled applied measure brightness temperatures surface. The target areas were photographed UAV...

10.1109/agro-geoinformatics.2018.8475995 article EN 2018-08-01

The aim of this article is to present a digital shipboard video stabilization method stabilize the unstable due unwanted camera shakes and jitters caused by motion vibration ships. proposed algorithm consists estimation, filtering compensation. idea estimation detecting corner points using adaptive Harris algorithm, then are tracked optical flow determine motion. In addition, Fourier series curve fitting designed cope with randomness After filtering, image sequence moved compensate according...

10.1109/iceict.2019.8846432 article EN 2019-01-01

Deep learning has been widely used in fields such as natural language processing, computer vision, and driverless vehicles, leading a new wave of artificial intelligence. advances however have also to create technologies that pose potential threats national security, social stability, personal privacy. For example, deepfakes recently attracted widespread attention worldwide, which could generate seemingly realistic fake images, audio video content. This article introduces the background...

10.19363/j.cnki.cn10-1380/tn.2020.02.01 article EN Journal of Cyber Security 2020-03-09

The High Efficiency Video Coding Standard (HEVC) is one of the most advanced coding schemes at present, and its excellent performance highly suitable for application in navigation field with limited bandwidth. In recent years, development emerging technologies such as screen sharing remote control has promoted process realizing virtual driving unmanned ships. order to improve transmission efficiency during sharing, HEVC proposes a new extension scheme content (HEVC-SCC), which based on...

10.3390/jmse9111279 article EN cc-by Journal of Marine Science and Engineering 2021-11-17

Attackers like to install trojans in a target system control it. However, it becomes more and difficult deceive user into installing such trojans. One reason is that antivirus software uses strict policies on the first run of unknown software. The other users also become cautious. Some attackers try find vulnerabilities evade users. But not easy suitable because they are usually patched short time. In this paper, we present new type threat called vulnerability-based backdoor (VBB). It...

10.1109/sere.2013.19 article EN 2013-06-01

Recently, numerous highly-valuable Deep Neural Networks (DNNs) have been trained using deep learning algorithms. To protect the Intellectual Property (IP) of original owners over such DNN models, backdoor-based watermarks extensively studied. However, most fail upon model extraction attack, which utilizes input samples to query target and obtains corresponding outputs, thus training a substitute input-output pairs. In this paper, we propose novel watermark IP models against extraction, named...

10.48550/arxiv.2401.15239 preprint EN arXiv (Cornell University) 2024-01-26

Recent years have witnessed tremendous success in Self-Supervised Learning (SSL), which has been widely utilized to facilitate various downstream tasks Computer Vision (CV) and Natural Language Processing (NLP) domains.However, attackers may steal such SSL models commercialize them for profit, making it crucial verify the ownership of models.Most existing protection solutions (e.g., backdoorbased watermarks) are designed supervised learning cannot be used directly since they require that...

10.14722/ndss.2024.24374 article EN 2024-01-01

This publication has been retracted by the Editor due to identification of non-original figure images and manuscript content that raise concerns regarding credibility originality study manuscript.Reference:Ying-Jun Zhang, He Huang, Yu Liu, Bin Kong, Guangji Wang. MD-1 Deficiency Accelerates Myocardial Inflammation Apoptosis in Doxorubicin-Induced Cardiotoxicity Activating TLR4/MAPKs/Nuclear Factor kappa B (NF-kappaB) Signaling Pathway. Med Sci Monit, 2019; 25: 7898-7907. DOI: 10.12659/MSM.919861

10.12659/msm.945188 article EN Medical Science Monitor 2024-05-22

Crop monitoring can promptly reflect the growth status of crops. However, conventional methods monitoring, although simple and direct, have limitations such as destructive sampling, reliance on human experience, slow detection speed. This study estimated fresh weight lettuce (Lactuca sativa L.) in a plant factory with artificial light based three-dimensional (3D) reconstruction technology. Data from different stages were collected training dataset, while data forms used validation dataset....

10.3390/agronomy15010029 article EN cc-by Agronomy 2024-12-26

10.7544/issn1000-1239.2021.20200978 article EN Journal of Computer Research and Development 2021-05-01

This paper introduces a cooperative computation model of services called CCM which supports data flow and channel based service computation. The meta-model is described with MOF (meta-object facility). comes from Kahn process network (KPN) model. KPN on dataflow commonly used for describing set processes that communicate each other by means dataflow. In this paper, we use to input output flows interactions among services. uses description language CCML describe including operations,...

10.1109/imsccs.2006.42 article EN 2006-06-01

Electric cars, as an alternative to fuel are growing rapidly in number and help reduce carbon dioxide emissions build green cities. However, due the appearance similarities between electric it is still a challenge count proportion of cars on road. Considering that thermal infrared (TIR) imaging technology can obtain temperature characteristics well work at night, this paper proposes new solution identify Unmanned aerial vehicle (UAV)-based TIR images. First, semiautomated labelling method...

10.1080/01431161.2021.1978586 article EN International Journal of Remote Sensing 2021-10-12
Coming Soon ...