Author of the publication

Design of Online Annotation and Incision System for IVUS Images.

, , , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 74-90. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature data processing: Making medical data fit deep neural networks., , , , , , , and . Future Gener. Comput. Syst., (2020)An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM., , , and . BigDataSecurity/HPSC/IDS, page 125-130. IEEE, (2022)Chinese Morphological Analysis Using Morpheme and Character Features., , , , and . PRICAI, volume 7458 of Lecture Notes in Computer Science, page 866-869. Springer, (2012)The Design of Immersion Acrophobia Adjuvant Therapy System (IAATS)., , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 447-455. Springer, (2018)Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform., , , , , , , , and . IEEE Access, (2018)Hierarchical Long Short-Term Memory Network for Cyberattack Detection., , , , , , , and . IEEE Access, (2020)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , and . IEEE Access, (2018)Auditing Between Event Logs and Process Trees., , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 227-237. Springer, (2018)A Densely Stacked Attention Method for Cyberattack Detection., , , and . J. Inf. Sci. Eng., 39 (4): 935-950 (2023)Design of Online Annotation and Incision System for IVUS Images., , , , and . IFTC, volume 1009 of Communications in Computer and Information Science, page 74-90. Springer, (2018)