Jizhao Liu
YOU?
Author Swipe
View article: Securing Satellite Communications: Real-Time Video Encryption Scheme on Satellite Payloads
Securing Satellite Communications: Real-Time Video Encryption Scheme on Satellite Payloads Open
The rapid development of low-Earth orbit (LEO) satellite constellations and satellite communication systems has elevated the importance of secure video transmission, which is the key to applications such as remote sensing, disaster relief,…
View article: A Deep Learning Method of Credit Card Fraud Detection Based on Continuous-Coupled Neural Networks
A Deep Learning Method of Credit Card Fraud Detection Based on Continuous-Coupled Neural Networks Open
With the widespread use of credit cards in online and offline transactions, credit card fraud has become a significant challenge in the financial sector. The rapid advancement of payment technologies has led to increasingly sophisticated f…
View article: Multi‐Channel Deep Pulse‐Coupled Net: A Novel Bearing Fault Diagnosis Framework
Multi‐Channel Deep Pulse‐Coupled Net: A Novel Bearing Fault Diagnosis Framework Open
Bearings are a critical part of various industrial equipment. Existing bearing fault detection methods face challenges such as complicated data preprocessing, difficulty in analysing time series data, and inability to learn multi‐dimension…
View article: Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System
Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System Open
Neuromorphic computing draws inspiration from the brain to design energy-efficient hardware for information processing, enabling highly complex tasks. In neuromorphic computing, chaotic phenomena describe the nonlinear interactions and dyn…
View article: Revealing the mechanisms of semantic satiation with deep learning models
Revealing the mechanisms of semantic satiation with deep learning models Open
View article: Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking
Chaos in Motion: Unveiling Robustness in Remote Heart Rate Measurement through Brain-Inspired Skin Tracking Open
Heart rate is an important physiological indicator of human health status. Existing remote heart rate measurement methods typically involve facial detection followed by signal extraction from the region of interest (ROI). These SOTA method…
View article: A novel image encryption scheme based on ccnn
A novel image encryption scheme based on ccnn Open
With the advancement of computational capacity, the key space will become one of the crucial factors influencing the security of digital cryptographic systems. Despite chaotic-based digital cryptographic systems possessing large key spaces…
View article: GestureID: Gesture-Based User Authentication on Smart Devices Using Acoustic Sensing
GestureID: Gesture-Based User Authentication on Smart Devices Using Acoustic Sensing Open
User authentication on smart devices is crucial to protecting user privacy and device security. Due to the development of emerging attacks, existing physiological feature-based authentication methods, such as fingerprint, iris, and face re…
View article: Method for Controlling Full-Frequency Band Environment Vibration by Coordinating Metro Vibration Sources and Propagation Paths
Method for Controlling Full-Frequency Band Environment Vibration by Coordinating Metro Vibration Sources and Propagation Paths Open
Floating slab tracks (FSTs) are used to reduce the impact of vibration on precision instruments and historical relics along metro lines; however, ground vibration is universally amplified at the natural frequency of the tracks. In this stu…
View article: Infrared UAV Target Detection Based on Continuous-Coupled Neural Network
Infrared UAV Target Detection Based on Continuous-Coupled Neural Network Open
The task of the detection of unmanned aerial vehicles (UAVs) is of great significance to social communication security. Infrared detection technology has the advantage of not being interfered with by environmental and other factors and can…
View article: A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption
A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption Open
With the advancement in information and communication technologies (ICTs), the widespread dissemination and sharing of digital images has raised concerns regarding privacy and security. Traditional methods of encrypting images often suffer…
View article: InvKA: Gait Recognition via Invertible Koopman Autoencoder
InvKA: Gait Recognition via Invertible Koopman Autoencoder Open
Most current gait recognition methods suffer from poor interpretability and high computational cost. To improve interpretability, we investigate gait features in the embedding space based on Koopman operator theory. The transition matrix i…
View article: FDNet: An end-to-end fusion decomposition network for infrared and visible images
FDNet: An end-to-end fusion decomposition network for infrared and visible images Open
Infrared and visible image fusion can generate a fusion image with clear texture and prominent goals under extreme conditions. This capability is important for all-day climate detection and other tasks. However, most existing fusion method…
View article: A Chest Imaging Diagnosis Report Generation Method Based on Dual-Channel Transmodal Memory Network
A Chest Imaging Diagnosis Report Generation Method Based on Dual-Channel Transmodal Memory Network Open
View article: The Butterfly Effect in Primary Visual Cortex
The Butterfly Effect in Primary Visual Cortex Open
Exploring and establishing artificial neural networks with\nelectrophysiological characteristics and high computational efficiency is a\npopular topic in the field of computer vision. Inspired by the working\nmechanism of primary visual co…
View article: Secure Communication Scheme for Brain-Computer Interface Systems Based on High-Dimensional Hyperbolic Sine Chaotic System
Secure Communication Scheme for Brain-Computer Interface Systems Based on High-Dimensional Hyperbolic Sine Chaotic System Open
Brain-Computer Interface (BCI) is a direct communication pathway between the brain and the external environment without using peripheral nerves and muscles. This emerging topic is suffering from serious issues such as malicious tampering a…
View article: The Notch1 gene may control cell chemoresistance in esophageal squamous cell cancer
The Notch1 gene may control cell chemoresistance in esophageal squamous cell cancer Open
Notch1 gene missense mutation leads to an increase in the number of water-bridge bonds, thus enhancing the Notch1-DLL4 interaction, which may lead to tighter Notch1-DLL4 binding, either making the pathway easier to activate or increasing t…
View article: A Pulse-Number-Adjustable MSPCNN and Its Image Enhancement Application
A Pulse-Number-Adjustable MSPCNN and Its Image Enhancement Application Open
Pulse-coupled neural network (PCNN) aims to control neuronal firing state automatically and complete related image processing tasks. This paper presents a pulse-number-adjustable MSPCNN model (PNA-MSPCNN) that can automatically acquire the…
View article: Application of next-generation sequencing in resistance genes of neoadjuvant chemotherapy for esophageal cancer
Application of next-generation sequencing in resistance genes of neoadjuvant chemotherapy for esophageal cancer Open
We analyzed the effect of platinum-based NAC on gene mutations in patients with EC and find that mutations in somatic genes, especially the NOTCH1 gene, may be associated with NAC resistance in EC.
View article: A Torus-Chaotic System and Its Pseudorandom Properties
A Torus-Chaotic System and Its Pseudorandom Properties Open
Exploring and investigating new chaotic systems is a popular topic in nonlinear science. Although numerous chaotic systems have been introduced in the literature, few of them focus on torus-chaotic system. The aim of our short work is to w…
View article: A novel fast image encryption algorithm for embedded systems
A novel fast image encryption algorithm for embedded systems Open
Nowadays, embedded systems can be found everywhere in daily life. In the development of embedded systems, data security is one of the critical factors. Encryption is an effective way to protect data from threats. Among encryption algorithm…
View article: A novel fourth order chaotic system and its algorithm for medical image encryption
A novel fourth order chaotic system and its algorithm for medical image encryption Open
Today, medical imaging suffers from serious issues such as malicious tampering and privacy leakage. Encryption is an effective way to protect these images from security threats. Chaos has been widely used in image encryption, the majority …
View article: An Approach for the Generation of an Nth-Order Chaotic System with Hyperbolic Sine
An Approach for the Generation of an Nth-Order Chaotic System with Hyperbolic Sine Open
Chaotic systems with hyperbolic sine nonlinearity have attracted the attention of researchers in the last two years. This paper introduces a new approach for generating a class of simple chaotic systems with hyperbolic sine. With nth-order…
View article: A new simple chaotic system and its application in medical image encryption
A new simple chaotic system and its application in medical image encryption Open
Today, medical imaging suffers from serious issues such as malicious tampering and privacy leakage. Encryption is an effective way to protect these images from security threats. Among the available encryption algorithms, chaos-based method…
View article: An Energy Efficient Sink Deployment Scheme aiming at extending the Lifespan for Wireless Sensor Networks
An Energy Efficient Sink Deployment Scheme aiming at extending the Lifespan for Wireless Sensor Networks Open
The issue "Sink's Neighbor Problem" hinders the applications of Wireless Sensor Networks (WSNs).Owing to the heavier traffic burden they bear, the nodes close to the sink tend to dissipate their energy faster than others.They die earlier w…