Author of the publication

A Hybrid Convolutional and Recurrent Deep Neural Network for Breast Cancer Pathological Image Classification.

, , , , , , , , and . BIBM, page 957-962. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Adaptive Remote Sensing Extraction Algorithm for Complex Muddy Coast Waterline., , , , , , , and . Remote. Sens., 14 (4): 861 (2022)eFL-Boost: Efficient Federated Learning for Gradient Boosting Decision Trees., , and . IEEE Access, (2022)POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity., , , , , and . ACM Conference on Computer and Communications Security, page 1684-1686. ACM, (2015)A Secure Automobile Information Sharing System., , and . IoTPTS@AsiaCCS, page 19-26. ACM, (2015)Detailed Processes of Tidal Flat Geomorphology Evolution Based on Time-Series Satellite Images., , , , , and . Remote. Sens., 14 (17): 4341 (2022)Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks., , , , , , , , , and 2 other author(s). J. Inf. Process., (2022)Understanding the Interplay Between Government Microblogs and Citizen Engagement: Evidence from China., and . Electron. Commer. Res., 21 (2): 487-520 (2021)Impact of capital enrichment on resource allocation efficiency in China's manufacturing industry., , , and . J. Intell. Fuzzy Syst., 41 (2): 4079-4095 (2021)An Improved H-Algorand Consensus Mechanism With Credibility Assessment Applying in EMR Storage System., , , , , and . IEEE Access, (2022)An improved identity-based key agreement protocol and its security proof., , , and . Inf. Sci., 179 (3): 307-318 (2009)