Author of the publication

Multi-IMU with Online Self-consistency for Freehand 3D Ultrasound Reconstruction.

, , , , , , , , , and . MICCAI (1), volume 14220 of Lecture Notes in Computer Science, page 342-351. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)A 2.5-GHz band low-voltage high efficiency class-E power amplifier IC with body effect., , , , and . ISIC, page 160-163. IEEE, (2014)WIM: A Wage-Based Incentive Mechanism for Reinforcing Truthful Feedbacks in Reputation Systems., , and . GLOBECOM, page 1-5. IEEE, (2010)Automatic detection of retinal vascular bifurcations and crossovers based on isotropy and anisotropy., , , , , and . Medical Imaging: Image Processing, volume 8669 of SPIE Proceedings, page 86691T. SPIE, (2013)High-Performance random data lookup for network processing., , , and . SoCC, page 272-277. IEEE, (2010)Dual-Input Transformer: An End-to-End Model for Preoperative Assessment of Pathological Complete Response to Neoadjuvant Chemotherapy in Breast Cancer Ultrasonography., , , , , , , , and . IEEE J. Biomed. Health Informatics, 27 (1): 251-262 (2023)Towards Better Understanding of Algorithms and Complexity of Some Learning Problems.. University of Washington, USA, (2020)A new algorithm for distorted fingerprints matching based on normalized fuzzy similarity measure., , and . IEEE Trans. Image Process., 15 (3): 767-776 (2006)Research on Digital Camouflage Pattern Generation Algorithm Based on Adversarial Autoencoder Network., , , and . Int. J. Pattern Recognit. Artif. Intell., 34 (6): 2050017:1-2050017:15 (2020)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , and . IEEE Access, (2018)