Jinpeng Zhang

ORCID: 0000-0003-0524-9190
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Natural Language Processing Techniques
  • Multicomponent Synthesis of Heterocycles
  • Synthesis and biological activity
  • Network Security and Intrusion Detection
  • Data Mining Algorithms and Applications
  • X-ray Diffraction in Crystallography
  • Crystallization and Solubility Studies
  • Advanced Computational Techniques and Applications
  • Bioactive Compounds and Antitumor Agents
  • Internet Traffic Analysis and Secure E-voting
  • Speech Recognition and Synthesis
  • Radiomics and Machine Learning in Medical Imaging
  • Synthesis and Biological Evaluation
  • Advanced Steganography and Watermarking Techniques
  • Multimodal Machine Learning Applications
  • Synthesis of Organic Compounds
  • Guidance and Control Systems
  • Target Tracking and Data Fusion in Sensor Networks
  • Advanced Text Analysis Techniques
  • AI in cancer detection
  • Cancer therapeutics and mechanisms
  • Herbal Medicine Research Studies
  • Neonatal and fetal brain pathology
  • Non-Invasive Vital Sign Monitoring

Tianjin Agricultural University
2025

AVIC Optronics (China)
2022-2024

Xiangtan University
2024

Tsinghua University
2024

University of Science and Technology of China
2024

Soochow University
2021-2023

Yunnan University of Finance And Economics
2017-2023

Yunnan University
2023

Zhejiang University of Technology
2022

Northeast Agricultural University
2022

Decentralized Applications (DApps) are increasingly developed and deployed on blockchain platforms such as Ethereum. DApp fingerprinting can identify users' visits to specific DApps by analyzing the resulting network traffic, revealing much sensitive information about users, their real identities, financial conditions religious or political preferences. same platform usually adopt communication interface similar traffic encryption settings, making less discriminative. Existing encrypted...

10.1109/tifs.2021.3050608 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

In recent years, researches are concentrating on the effectiveness of Transfer Learning (TL) and Ensemble (EL) techniques in cervical histopathology image analysis. However, there have been very few investigations that described stages differentiation histopathological images. Therefore, this article, we propose an Ensembled (ETL) framework to classify well, moderate poorly differentiated First all, developed Inception-V3, Xception, VGG-16, Resnet-50 based TL structures. Then, enhance...

10.1109/access.2020.2999816 article EN cc-by IEEE Access 2020-01-01

Abstract The early afterglow of a gamma-ray burst (GRB) can provide critical information on the jet and progenitor GRB. extreme brightness GRB 221009A allows us to probe its in unprecedented detail. In this Letter, we report comprehensive observation results (from T 0 +660 s +1860 s, where is Insight-HXMT/HE trigger time) X-ray/gamma-ray energy band 20 keV MeV) by Insight-HXMT High Energy X-ray Telescope, GECAM-C, Fermi/Gamma-ray Burst Monitor. We find that spectrum keV–20 MeV be well...

10.3847/2041-8213/ad2073 article EN cc-by The Astrophysical Journal Letters 2024-02-01

With the prevalence of blockchain, more and Decentralized Applications (DApps) are deployed on Ethereum to achieve goal communicating without supervision. Users habits may be leaked while these applications adopt SSL/TLS encrypt their transmission data. Encrypted protocol same blockchain platform bring challenges traffic classification DApps. Existing encrypted methods suffer from low accuracy in situation

10.1145/3326285.3329053 article EN 2019-06-14

Cypermethrin, one kind of pyrethroid pesticides, has been shown to act as endocrine-disrupting chemicals (EDCs). The purpose this study was explore the roles Sertoli cell apoptosis through mitochondrial pathway associated with calcium (Ca2+) in cypermethrin-induced male reproductive toxicology. mouse cells TM4 were cultured 0 μM, 10 20 40 μM and 80 cypermethrin. We used flow cytometry, Fluo-4 AM, western blot JC-1 Assay Kit examine apoptosis, intracellular Ca2+, expressions apoptotic...

10.1093/toxres/tfab056 article EN Toxicology Research 2021-06-03

<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Objective:</i> Preterm birth is the leading cause of neonatal morbidity and mortality. Early identification high-risk patients followed by medical interventions essential to prevention preterm birth. Based on relationship between uterine contraction fundamental electrical activities muscles, we extracted effective features from EHG signals recorded pregnant women, use them train classifiers with...

10.1109/jbhi.2022.3140427 article EN IEEE Journal of Biomedical and Health Informatics 2022-01-05

Muscle larvae of Trichinella spiralis parasitize the host intestinal epithelium. The mechanisms exosomes participating in invasion T. muscle are unclear. Hence, purpose this study was to explore effect derived from infective (TsExos) on barrier function porcine small epithelial cells (IPEC-J2). First, TsExos were successfully obtained, and their ingestion by validated. Furthermore, optimal induction condition determined CCK8 kit, we found that exposure 150 μg/mL for 12/24 h decreased...

10.1186/s13567-022-01108-y article EN cc-by Veterinary Research 2022-10-22

<title>Abstract</title> Probiotics play a crucial role in modulating the immune system and maintaining integrity of intestinal epithelial barrier. The study investigates effects high-activity probiotic yogurt on immunosuppressed mice induced by cyclophosphamide. On days 7, 8, 9 experiment, ICR male (eight-week-old) were injected intraperitoneally with cyclophosphamide (80 mg/kg body weight/day) to establish an immunosuppressive model (n = 10). Mice fed normal diet or for consecutive 14 days....

10.21203/rs.3.rs-6252467/v1 preprint EN Research Square (Research Square) 2025-04-29

Bilingual Lexicon Induction (BLI) aims to map words in one language their translations another, and is typically through learning linear projections align monolingual word representation spaces. Two classes of representations have been explored for BLI: static embeddings contextual representations, but there no studies combine both. In this paper, we propose a simple yet effective mechanism the utilize advantages both paradigms. We test combination on various pairs under supervised...

10.18653/v1/2021.findings-acl.260 article EN cc-by 2021-01-01

Kernel method is a non-parametric linearization for system modeling, which uses nonlinear projection from input data space to high-dimensional Hilbert feature and employs kernel function hiding the operator in linear learner replace inner product calculation avoid curse of dimensionality. data-driven learnable model. For independency priori model, it provides novel way state estimation dynamic systems with model uncertainties. In this paper, an adaptive learning Kalman filtering proposed...

10.1109/access.2022.3193101 article EN cc-by-nc-nd IEEE Access 2022-01-01

A series of new, N-substituted azapodophyllotoxin derivatives were synthesized via a three-component reaction an aldehyde, enaminone and tetronic acid in glacial acetic acid, under microwave irradiation, without catalyst. This new protocol has the advantages shorter time, higher yields, lower cost broader substrate scope, as well easier operation.

10.1055/s-2006-950297 article EN Synthesis 2006-11-01

As the most basic means of network attack, port scanning is commonly used attack tool in penetration testing. Full-port system can identify potential threats to advance, however, existing full-port methods need scan full amount ports, which relatively time-consuming. In this paper, we propose a sampling-based method that minimize cost while maintaining accuracy. We use three tools perform controlled environment validate our method, and quantitatively analyze accuracy speed different scanners...

10.1109/itnec56291.2023.10082257 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2023-02-24

Abstract magnified image Small libraries of 3,5‐unsubstituted 4‐substituted‐6‐aryl‐3,4‐dihydropyridin‐2(1 H )‐ones derivatives were synthesized from the condensation‐products aldehydes with Meldrum's acid, aromatic ketones and ammonium acetate using acetic acid as energy transferring‐agent under microwave irradiation without catalyst. This method has advantages excellent yields (65‐90%), short reaction time (5‐10 min) being environmentally friendly. It aimed to provide new series potential...

10.1002/jhet.5570440414 article EN Journal of Heterocyclic Chemistry 2007-07-01

Regioselective three-component reactions of aromatic aldehydes with indazol-5-amine and 2-hydroxy-1,4-naphthoquinone in HOAc under microwave irradiation have been developed. In this one-pot reaction, a series new pyrazole-fused benzo[

10.3987/com-13-s(s)65 article EN Heterocycles 2013-08-01

Abstract magnified image A series of N ‐carboxymethylacridine‐1,8‐dione derivatives were synthesized by one‐pot reaction aldehyde, dimedone and glycine in glycol under microwave irradiation without catalyst with excellent yields (78‐92%) short time (4‐8min). And the was not only suitable for aromatic monoaldehyde, but also dialdehyde.

10.1002/jhet.5570430633 article EN Journal of Heterocyclic Chemistry 2006-11-01

Encrypted traffic classification plays an important role in network management. In this paper, we take as example of the web browsing application, and propose a machine learning scheme, Bali, that can identify encrypted from various websites. We employ packet length statistics discriminative features traffic. order to further investigate differences among websites, develop clustering method based on observation first outgoing incoming packets with specific flags same website have similar...

10.1109/globecom38437.2019.9013272 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

Grid is one of the most important information technologies in recently years, and its theory has been applied a variety industries. Based on grid management, synergic mode established three levels (management, operation support) maritime administration combined with periods (before, progress after) marine accidents China's coastal waters. Accordingly, some practicable measures management have put forward, basis case study Maritime Safety Administration (MSA) Fujian, concluding that it...

10.1109/ieem.2010.5674148 article EN IEEE International Conference on Industrial Engineering and Engineering Management 2010-12-01

Bilingual topic detection is a vital application of natural language processing in the Internet plus Era and trend economic globalization. At present, method bilingual can't solve problem inconsistent distribution. Aiming at shortcoming, this paper introduces based on maximal clique to find Chinese Thai feature words. First all, extract information news with keywords each documents through TextRank algorithm. Next, disambiguate by means similarity combined dictionary. Then, use credible...

10.1051/matecconf/201710002055 article EN cc-by MATEC Web of Conferences 2017-01-01

Lexically constrained neural machine translation (LCNMT), which controls the generation with pre-specified constraints, is important in many practical applications. Current approaches to LCNMT typically assume that lexicon constraints are contextually appropriate. This assumption limits their application real-world scenarios where a source may have multiple target and disambiguation needed select most suitable one. In this paper, we propose disambiguated (D-LCNMT) solve problem. D-LCNMT...

10.18653/v1/2023.findings-acl.673 article EN cc-by Findings of the Association for Computational Linguistics: ACL 2022 2023-01-01

With the quickly development of Internet Things technology, Bluetooth (BLE) protocol has been increasingly adopted in consumer communication applications, industry utilization, and even positioning requirement, due to its advantages such as low power consumption, cost, complexity. Especially outstanding capability compared with other short-range protocol, many limited AIoT (Artificial Intelligence IoT) devices select BLE basic component. So, power, high performance, small area module become...

10.1051/e3sconf/202452201044 article EN cc-by E3S Web of Conferences 2024-01-01

For intercepting active defense target, an impact angle constraint guidance law is proposed based on partial differential games. First, the relative motion models of three‐player games between interceptor, and missile are established. The problem target separated into two Then, coupled game laws obtained, respectively. Impact taken account in attacker defender (D). Finally, a combined calculated by performance strategy can be adjusted weight coefficient related to miss distance D....

10.1155/2024/9991666 article EN cc-by International Journal of Aerospace Engineering 2024-01-01
Coming Soon ...