User profiles for Haodong Li
Haodong LiShenzhen University Verified email at szu.edu.cn Cited by 1547 |
Identification of deep network generated images using disparities in color components
With the powerful deep network architectures, such as generative adversarial networks, one
can easily generate photorealistic images. Although the generated images are not …
can easily generate photorealistic images. Although the generated images are not …
Self-powered sensors for monitoring of highway bridges
The task of structural health monitoring (SHM) of aging highway bridges and overpasses is
important not only from the point of preventing economic losses from traffic delays and …
important not only from the point of preventing economic losses from traffic delays and …
Revisiting the preparation progress of nano‐structured Si anodes toward industrial application from the perspective of cost and scalability
H Li, H Li, Y Lai, Z Yang, Q Yang, Y Liu… - Advanced Energy …, 2022 - Wiley Online Library
The urgent demand for lithium ion batteries with high energy density is driving the increasing
research interest in Si, which possesses an ultrahigh theoretical capacity. Though various …
research interest in Si, which possesses an ultrahigh theoretical capacity. Though various …
Adaptive steganalysis against WOW embedding algorithm
WOW (Wavelet Obtained Weights) [5] is one of the advanced steganographic methods in
spatial domain, which can adaptively embed secret message into cover image according to …
spatial domain, which can adaptively embed secret message into cover image according to …
Molecular and functional characterization of two novel human CC chemokines as inhibitors of two distinct classes of myeloid progenitors
VP Patel, BL Kreider, Y Li, H Li, K Leung… - The Journal of …, 1997 - rupress.org
Two novel human β-chemokines, Ckβ-8 or myeloid progenitor inhibitory factor 1 (MPIF-1),
and Ckβ-6 or MPIF-2, were discovered as part of a large scale cDNA sequencing effort. The …
and Ckβ-6 or MPIF-2, were discovered as part of a large scale cDNA sequencing effort. The …
SiOx Anode: From Fundamental Mechanism toward Industrial Application
H Li, H Li, Z Yang, L Yang, J Gong, Y Liu, G Wang… - Small, 2021 - Wiley Online Library
… phase of Li 2 O and lithium silicates (Li 2 Si 2 O 5 , Li 2 SiO 3 , Li 6 Si 2 O 7 , and Li 4 SiO 4
), … Haodong Li is currently a postgraduate student in the school of Chemical Engineering at …
), … Haodong Li is currently a postgraduate student in the school of Chemical Engineering at …
Depletion of U14 Small Nuclear RNA (snR128) Disrupts Production of 18S rRNA in Saccharomyces cerevisiae
HV Li, J Zagorski, MJ Fournier - Molecular and cellular biology, 1990 - Taylor & Francis
Repression of an essential nucleolar small nuclear RNA (snRNA) gene of Saccharomyces
cerevisiae was shown to result in impaired production of 18S rRNA. The effect, observed for …
cerevisiae was shown to result in impaired production of 18S rRNA. The effect, observed for …
Identification of various image operations using residual-based features
Image forensics has attracted wide attention during the past decade. However, most existing
works aim at detecting a certain operation, which means that their proposed features …
works aim at detecting a certain operation, which means that their proposed features …
How to Promote the Industrial Application of SiOx Anode Prelithiation: Capability, Accuracy, Stability, Uniformity, Cost, and Safety
R Wang, H Li, Y Wu, H Li, B Zhong… - Advanced Energy …, 2022 - Wiley Online Library
… During the first cycle, SiO x reacts with Li + to irreversibly generate Li 2 O and Li x SiO y , …
Correspondingly, Li 2 O and Li x SiO y acts as a buffer matrix for the reversible Li x Si, relieving …
Correspondingly, Li 2 O and Li x SiO y acts as a buffer matrix for the reversible Li x Si, relieving …
Image tampering localization using a dense fully convolutional network
The emergence of powerful image editing software has substantially facilitated digital image
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …
tampering, leading to many security issues. Hence, it is urgent to identify tampered images …