Author of the publication

Lesion Classification of Coronary Artery CTA Images Based on CBAM and Transfer Learning.

, , , , , , , and . IEEE Trans. Instrum. Meas., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrieval of canopy water content using a new spectral area index method., , , , , , , and . IGARSS, page 3333-3336. IEEE, (2015)Effective matrix-free preconditioning for the augmented immersed interface method., , and . J. Comput. Phys., (2015)Instrument Development: Chinese Radiometric Benchmark of Reflected Solar Band Based on Space Cryogenic Absolute Radiometer., , , , , , , , , and . Remote. Sens., 12 (17): 2856 (2020)Efficient Robotic Object Search via HIEM: Hierarchical Policy Learning with Intrinsic-Extrinsic Modeling., and . CoRR, (2020)The video face recognition method and system based on the fusion of multiple features., and . CISP-BMEI, page 1-6. IEEE, (2017)Automated road extraction from multi-resolution images using spectral information and texture., , , , , and . IGARSS, page 533-536. IEEE, (2014)Non-Linear Collision Analysis., , and . RFIDSec, volume 8651 of Lecture Notes in Computer Science, page 198-214. Springer, (2014)On the Vulnerability of Low Entropy Masking Schemes., and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 44-60. Springer, (2013)The research of land use change based on GIS and CA model: Taking the Jinzhou city as an example., , and . Geoinformatics, page 1-4. IEEE, (2010)Faster Hash-Based Signatures with Bounded Leakage., , and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 223-243. Springer, (2013)