- Advanced Steganography and Watermarking Techniques
- Internet Traffic Analysis and Secure E-voting
- Automated Road and Building Extraction
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- 3D Shape Modeling and Analysis
- Remote Sensing and LiDAR Applications
- Image and Object Detection Techniques
- Handwritten Text Recognition Techniques
- Infrastructure Maintenance and Monitoring
- Cancer Immunotherapy and Biomarkers
- Cancer, Hypoxia, and Metabolism
- Immune Cell Function and Interaction
- Digital Rights Management and Security
- Vehicle License Plate Recognition
- Digital and Cyber Forensics
Guilin University of Technology
2024-2025
Chinese Academy of Medical Sciences & Peking Union Medical College
2024
Central China Normal University
2010
Zhejiang University
2007
CD8 + T cell activation leads to the rapid proliferation and differentiation of effector cells (T effs ), which mediate antitumor immunity. Although aerobic glycolysis is preferentially activated in , mechanisms that regulate glucose uptake low-glucose acidic tumor microenvironment (TME) remain poorly understood. Here, we report abundance transporter GLUT10 increased during Specifically, deficiency inhibited uptake, glycolysis, efficiency tumor-infiltrating cells. Supplementation with alone...
In order to improve the accuracy of airborne LiDAR point cloud filtering algorithm in terrain complex regions, an adaptive cloth simulation based on roughness is proposed. Firstly, data preprocessed extract three features: Gaussian curvature, average and slope. Principal component analysis used linearly combine them into a comprehensive roughness. Different grid scales are divided according terrain, different stages set each subregion. fabric hardness, resolution, ground thresholds set....
Paraphrasing is another expression that does not change the meaning of original statement. Combined with Chinese sentences automatically paraphrasing techniques, text information hiding algorithm proposed in this paper, give prominence to template rules and matching process, which also act as a basis for realizing hiding. Then we analyze features.
It is hard to detect LSB matching steganography, especially in low embedding rate. However there are still some chances attack it since the data alters dependences between neighboring pixels. Based on this fact, paper proposes a novel steganalysis method by modeling dependences. The pixels divided into three groups: horizontal, vertical, and diagonal. Then, prediction errors of central pixel calculated each group respectively. Finally, empirical probability matrices among these computed...
The tamper-proof of web pages schemes mainly includes two aspects, one is the generation algorithm on pre-embedded watermarking, and other program watermarking embedded. In this paper, a novel page watermark scheme proposed for detecting locating tampered web-page. Proposed realize location target HTML tampered. PCA digital ULC (Upper-Lower Coding) embedding are separately executed each column row original source code through comparing calculation results with extracted authentication...
In this paper, a simple and effective attack on non-blind robust digital watermark method, cocktail watermarking, was proposed. After reviewing the principle of paper discovered that watermarking scheme can drive very high false positive probability although with robustness simultaneously. Furthermore, counterfeiting to generate watermarked image an original proposed, which pass through extraction authentication successfully in case none embedded. This demonstrates algorithm is flawed be...