- SARS-CoV-2 and COVID-19 Research
- Complex Network Analysis Techniques
- Green IT and Sustainability
- Opportunistic and Delay-Tolerant Networks
- Topic Modeling
- CRISPR and Genetic Engineering
- Advanced Graph Neural Networks
- Opinion Dynamics and Social Influence
- SARS-CoV-2 detection and testing
- Natural Language Processing Techniques
- Image and Video Quality Assessment
- Neurological Disease Mechanisms and Treatments
- Chromatin Remodeling and Cancer
- Domain Adaptation and Few-Shot Learning
- Healthcare and Venom Research
- Advanced Image and Video Retrieval Techniques
- Medicinal Plants and Bioactive Compounds
- Wireless Power Transfer Systems
- Botulinum Toxin and Related Neurological Disorders
- Congenital heart defects research
- Diabetic Foot Ulcer Assessment and Management
- Caching and Content Delivery
- Cellular Mechanics and Interactions
- Visual Attention and Saliency Detection
- Pressure Ulcer Prevention and Management
Zhengzhou University
2025
First Affiliated Hospital of Henan University
2024
Chinese Academy of Sciences
2021-2023
Beijing Institute of Genomics
2023
University of Chinese Academy of Sciences
2014-2023
Shanghai Center For Bioinformation Technology
2023
Shenzhen Institutes of Advanced Technology
2021-2022
American University of Sharjah
2020
Erasmus University Rotterdam
2020
Northeastern University
2019
Recent AI research has witnessed increasing interests in automatically generating image descriptions text, which is coined as theimage captioning problem. Significant progresses have been made domains where plenty of labeled training data (i.e. image-text pairs) are readily available or collected. However, obtaining rich annotated a time-consuming and expensive process, creating substantial barrier for applying methods to new domain. In this paper, we propose cross-domain approach that uses...
Hardware Trojans (HTs) have drawn increasing attention in both academia and industry because of their significant potential threat. In this paper, we propose HTDet, a novel HT detection method using information entropy-based clustering. To maintain high concealment, HTs are usually inserted the regions with low controllability observability, which will result that Trojan logics extremely transitions during simulation. This implies provide much more abundant important for detection. The HTDet...
The Resource for Coronavirus 2019 (RCoV19) is an open-access information resource dedicated to providing valuable data on the genomes, mutations, and variants of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). In this updated implementation RCoV19, we have made significant improvements advancements over previous version. Firstly, implemented a highly refined genome curation model. This model now features automated integration pipeline optimized rules, enabling efficient daily...
An estimated 24 million people worldwide have dementia, the majority of whom are thought to Alzheimer's disease(AD). Nowadays, disease represents a significant public health concern and has been identified as research priority. Most unfortunately, there is little chance cure for disease, difficult detect before dominant characteristics such memory loss manifested. Therefore, diagnosis become an urgent problem today. Studies shown that mild cognitive impairment(MCI) state between normal, it...
Haplotype networks are graphs used to represent evolutionary relationships between a set of taxa and characterized by intuitiveness in analyzing genealogical closely related genomes. We here propose novel algorithm termed McAN that considers mutation spectrum history (mutations ancestry haplotype should be contained descendant haplotype), node size (corresponding sample count for given node) sampling time when constructing network. show is two orders magnitude faster than state-of-the-art...
Social media has become a ubiquitous tool for spreading news, messages, and generally allowing communication between individuals. Hence, studying how our privacy information might also spread across social is important research. To date, many studies have used diffusion models to simulate then examine flows through networks. But these are theoretical, newsworthy may not behave in the same way as information, raising question: Are observed phenomena indicative of real propagation? explore...
Distantly supervised relation extraction has been widely applied in knowledge base construction due to its less requirement of human efforts. However, the automatically established training datasets distant supervision contain low-quality instances with noisy words and overlapped relations, introducing great challenges accurate relations. To address this problem, we propose a novel Regularized Attentive Capsule Network (RA-CapNet) better identify highly relations each informal sentence....
With the ubiquity of social media, privacy leakage has become a urgent problemfor media managers. Studying how information diffuses through attracted much attention. As prerequisite, modeling diffusion is important research. Current approaches for are not available since they did consider propagation features in media. Thispaper discusses problem and its challenges. We first analyse paths basic parameters complex network high-order structures. find that different size star Second, new model...
As the ubiquity and power of mobile devices continue rapid developing, smartphone vendors introduce more types portable electronics into market. Since these smart have different capabilities (performance, screen size, resolution, etc.), it is challenging to develop tailored user interfaces for multiple devices. In this paper, we propose an intelligent interface transformation (IUIT) framework, using machine-learning algorithm transform layout, appearance, content dynamically regarding device...
Computer aided detection for automatic ocular disease is an important area of research. As different diseases possess characteristics and present at locations within the eye, it difficult to find a common way effectively handle each disease. To solve this problem, we propose unified Multiple Kernel Learning framework called MKL <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">clm</sup> detect diseases, based on existence multiple informatics...
In the lung biopsy image-guided surgery systems, fiducial markers are used for point-based registration of patient space to CT image space. Fiducial marker detection and point localization in images have great influence on accuracy guidance. This study proposes a approach based features slice sequences according projection images, without depending priori-knowledge default parameters provided by manufacturers. The our method was validated dataset 24 patients. experimental results showed that...
Android applications (apps for short) frequently send users' personally identifiable data over IP networks. Previous attempts to address privacy leakage on mobiles by checking whether these sensitive is off the device. Actually, some benign apps need collect information many tasks (e.g., contacts manager, location service, or finance). Since kinds of transmissions provide an application's functionality, treating as leakages are false positives. In this paper, we present Privacy Assistant...
<title>Abstract</title> Background Dysarthria is one of the most common stroke complications. It seriously affects patient’s ability to communicate with another and their overall recovery. The priority therapeutic methods in treating dysarthria after (DAS) are speech training, physical therapy, traditional Chinese rehabilitation, but outcomes not optimal. This study combines proprioceptive neuromuscular facilitation (PNF) chinese medicine (TCM) theory design a kaiyin xuanfei manipulation...
As 5G high-speed mobile communications developing rapidly, services and contents that people get from the Internet have been enriched significantly, which necessitates user equipment (UE) to least power consumption, reduced latency, enhanced lifetime better QoS. However, tail energy of LTE interface on UE leads low efficiency is caused by applying fixed Radio Resource Control (RRC) inactivity timer. In this paper, we propose a novel approach eliminate whenever possible improve efficiency. We...
There is an urgent need to replace the DC-link electrolytic capacitors in electrical vehicle charging power supply by non-electrolytic capacitors. This paper proposes two methods solve problem. The first one improve circuit topology, other optimize system parameters. At last, both simulation SABER and experiments validate points.
Abstract The Resource for Coronavirus 2019 (RCoV19, https://ngdc.cncb.ac.cn/ncov/ ) is an open-access information resource dedicated to providing valuable data on the genomes, mutations, and variants of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). In this updated implementation RCoV19, we have made significant improvements advancements over previous version. Firstly, implemented a highly refined genome curation model. This model now features automated integration pipeline...
Nowadays, it is common that both mobile applications and websites log users' visits keep record of users browser path, even every time user click word type. Each tracking information will be respectively sent to the third-party server via HTTP request. Previous studies have shown combining multiple small requests can significantly decrease energy consumption, but not considered a typical scenario where massive records efficiently compressed transferred with delay. In this paper, we propose...
Distantly supervised relation extraction has been widely applied in knowledge base construction due to its less requirement of human efforts. However, the automatically established training datasets distant supervision contain low-quality instances with noisy words and overlapped relations, introducing great challenges accurate relations. To address this problem, we propose a novel Regularized Attentive Capsule Network (RA-CapNet) better identify highly relations each informal sentence....
Chemotherapeutic regimens that poison DNA replication are used for the treatment of homologous recombination (HR)-deficient cancers. We have discovered a novel mechanism by which SWI/SNF chromatin remodeler SMARCAD1 stabilizes forks is essential resistance towards poisons. find loss results in toxic enrichment 53BP1 at mediates untimely dissociation PCNA via PCNA-unloader, ATAD5. Faster causes frequent fork stalling, inefficient restart and accumulation single-stranded resulting genome...