- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Complexity and Algorithms in Graphs
- Advanced Topics in Algebra
- Rings, Modules, and Algebras
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Cryptography and Residue Arithmetic
- Phytochemical compounds biological activities
- Advanced Control Systems Optimization
- IoT and Edge/Fog Computing
- Algebraic structures and combinatorial models
- Adversarial Robustness in Machine Learning
- Plant Virus Research Studies
- Building Energy and Comfort Optimization
- Face recognition and analysis
- Face and Expression Recognition
- Plant and Fungal Interactions Research
- Phytochemistry and Bioactivity Studies
- Biometric Identification and Security
Shanghai University
2016-2025
Chinese Academy of Tropical Agricultural Sciences
2025
First Affiliated Hospital Zhejiang University
2022-2024
Yili Normal University
2022-2023
Henan Institute of Technology
2023
Hangzhou Normal University
2022-2023
Panzhihua University
2023
Dalian University of Technology
2023
Chongqing Medical University
2022
Second Affiliated Hospital of Chongqing Medical University
2022
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The embedded watermark data for content recovery are calculated from the original discrete cosine transform (DCT) coefficients of host image and do not contain any additional redundancy. When part watermarked is tampered, in area without modification still can be extracted. If amount extracted large, we reconstruct tampered according to constraints given by data. Otherwise, may employ compressive sensing...
Abstract Quantum digital signatures can be used to authenticate classical messages in an information-theoretically secure way. Previously, a novel quantum signature for has been proposed and gave experimental demonstration of distributing from one sender two receivers. Some improvement versions were subsequently presented, which made it more feasible with present technology. These proposals are basic building blocks only deal the problem sending single bit while no-forging non-repudiation...
With the rise of cryptocurrencies, blockchain, which is underlying technology them, has gained more attention and been used in Internet Things (IoT) other fields. However, there are bottlenecks that hinder its application, such as storage capacity. Due to large number IoT devices always act data generators many systems, transactions will be generated at a high rate. The problem serious IoT. In this article, expand capacity for each peer, we select old blocks created previously less likely...
Multiview clustering has received great attention and numerous subspace algorithms for multiview data have been presented. However, most of these do not effectively handle high-dimensional fail to exploit consistency the number connected components in similarity matrices different views. In this article, we propose a novel consistency-induced (CiMSC) tackle issues, which is mainly composed structural (SC) sample assignment (SAC). To be specific, SC aims learn matrix each single view wherein...
This paper proposes a novel scheme of compressing encrypted images with auxiliary information. The content owner encrypts the original uncompressed and also generates some information, which will be used for data compression image reconstruction. Then, channel provider who cannot access may compress by quantization method optimal parameters that are derived from part information ratio-distortion criteria, transmit compressed data, include an sub-image, quantized another At receiver side,...
Steganalysis is a technique for detecting the existence of secret information hidden in digital media. In this paper, we propose novel scheme JPEG steganalysis. scheme, first design diverse base filters which are able to obtain image residuals from various directions. Then, cascade filter generation strategy construct set high order filters. We further select with maximum diversity. The selected convolved decompressed capture subtle embedding traces. residuals, termed as diversity residual,...
Federated learning (FL) is a distributed machine framework, which allows multiple users to collaboratively train and obtain global model with high accuracy. Currently, FL paid more attention by researchers growing number of protocols are proposed. This article first analyzes the security vulnerabilities VerifyNet VeriFL protocols, proposes new aggregation protocol for FL. We use additive homomorphic encryption double masking simultaneously protect user's local aggregated while most existing...
RNA decay is a pervasive process in eukaryotic cells. Viruses utilize the host cell's intracellular machinery to gain access essential molecules and subcellular structures required for infection during pathogenesis process. The study demonstrates that turnip crinkle virus (TCV) enhances expression of Arabidopsis Dcp1 (AtDcp1), which negatively regulates accumulation TCV RNA, indicating its involvement antiviral defense. Nevertheless, circumvents defense based on decay, as indicated by capsid...
ABSTRACT RNA silencing and autophagy play crucial roles in maintaining cellular homeostasis defending against viral infections diverse eukaryotic hosts. In response to defenses, the majority of plant viruses have evolved suppressors (VSRs). Cassava mosaic geminiviruses (CMGs) are a group bipartite begomoviruses that cause significant losses staple food crop cassava ( Manihot esculenta Crantz). The AC4 protein, encoded by CMGs, is well‐characterized VSR; however, precise mechanism underlying...
This work proposes a novel scheme of compressing and decompressing encrypted image based on compressive sensing. An original is as set coefficients by secret orthogonal transform. Since the has sparse representation in conventional transform domain can be recovered from small quantity measurements, data are compressed into series measurement data. Using signal recovery method sensing, receiver reconstruct principal content image. way, quality reconstructed dependent compression rate...
Cipadonoid A ( 1), a novel limonoid with an unprecedented skeleton, was isolated from the leaves of Cipadessa cinerasecns. Its structure and relative configuration were determined by spectroscopic analysis computer modeling. 1 represents new type limonoid, characterized rearranged tetrahydropyranyl ring B incorporating usually exocyclic C-30. possible biosynthetic pathway also proposed.