Dan Zhang

ORCID: 0009-0005-7656-3226
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Automated Road and Building Extraction
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • 3D Shape Modeling and Analysis
  • Remote Sensing and LiDAR Applications
  • Image and Object Detection Techniques
  • Handwritten Text Recognition Techniques
  • Infrastructure Maintenance and Monitoring
  • Cancer Immunotherapy and Biomarkers
  • Cancer, Hypoxia, and Metabolism
  • Immune Cell Function and Interaction
  • Digital Rights Management and Security
  • Vehicle License Plate Recognition
  • Digital and Cyber Forensics

Guilin University of Technology
2024-2025

Chinese Academy of Medical Sciences & Peking Union Medical College
2024

Central China Normal University
2010

Zhejiang University
2007

CD8 + T cell activation leads to the rapid proliferation and differentiation of effector cells (T effs ), which mediate antitumor immunity. Although aerobic glycolysis is preferentially activated in , mechanisms that regulate glucose uptake low-glucose acidic tumor microenvironment (TME) remain poorly understood. Here, we report abundance transporter GLUT10 increased during Specifically, deficiency inhibited uptake, glycolysis, efficiency tumor-infiltrating cells. Supplementation with alone...

10.1126/scitranslmed.adk7399 article EN Science Translational Medicine 2024-08-28

In order to improve the accuracy of airborne LiDAR point cloud filtering algorithm in terrain complex regions, an adaptive cloth simulation based on roughness is proposed. Firstly, data preprocessed extract three features: Gaussian curvature, average and slope. Principal component analysis used linearly combine them into a comprehensive roughness. Different grid scales are divided according terrain, different stages set each subregion. fabric hardness, resolution, ground thresholds set....

10.1117/12.3059016 article EN 2025-01-02

Paraphrasing is another expression that does not change the meaning of original statement. Combined with Chinese sentences automatically paraphrasing techniques, text information hiding algorithm proposed in this paper, give prominence to template rules and matching process, which also act as a basis for realizing hiding. Then we analyze features.

10.1109/isme.2010.61 article EN International Conference of Information Science and Management Engineering 2010-08-01

It is hard to detect LSB matching steganography, especially in low embedding rate. However there are still some chances attack it since the data alters dependences between neighboring pixels.  Based on this fact, paper proposes a novel steganalysis method by modeling dependences. The pixels divided into three groups: horizontal, vertical, and diagonal.  Then, prediction errors of central pixel calculated each group respectively. Finally, empirical probability matrices among these computed...

10.4304/jmm.7.5.380-385 article EN Journal of Multimedia 2012-10-01

The tamper-proof of web pages schemes mainly includes two aspects, one is the generation algorithm on pre-embedded watermarking, and other program watermarking embedded. In this paper, a novel page watermark scheme proposed for detecting locating tampered web-page. Proposed realize location target HTML tampered. PCA digital ULC (Upper-Lower Coding) embedding are separately executed each column row original source code through comparing calculation results with extracted authentication...

10.1109/isme.2010.60 article EN International Conference of Information Science and Management Engineering 2010-08-01

In this paper, a simple and effective attack on non-blind robust digital watermark method, cocktail watermarking, was proposed. After reviewing the principle of paper discovered that watermarking scheme can drive very high false positive probability although with robustness simultaneously. Furthermore, counterfeiting to generate watermarked image an original proposed, which pass through extraction authentication successfully in case none embedded. This demonstrates algorithm is flawed be...

10.1109/dmamh.2007.4414518 article EN 2007-12-01
Coming Soon ...