Author of the publication

A hierarchical attention-based multimodal fusion framework for predicting the progression of Alzheimer's disease.

, , , , , and . Biomed. Signal Process. Control., 88 (Part B): 105669 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation., and . ACM Conference on Computer and Communications Security, page 2149-2150. ACM, (2020)BLADE: an attack-agnostic approach for preventing drive-by malware infections., , , and . ACM Conference on Computer and Communications Security, page 440-450. ACM, (2010)Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data., and . Libr. Hi Tech, 38 (4): 799-817 (2020)AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis., , , , and . CoRR, (2023)On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 419-433 (January 2024)Breaking Embedded Software Homogeneity with Protocol Mutations., , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 770-790. Springer, (2022)Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps., , , and . USENIX Security Symposium, page 1955-1972. USENIX Association, (2021)A Study of Multi-Factor and Risk-Based Authentication Availability., , , , , , and . USENIX Security Symposium, page 2043-2060. USENIX Association, (2023)Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy., , , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 161-176. Springer, (2021)(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application., , , , and . UCC, page 269-275. ACM, (2016)