Author of the publication

Coarse Retinal Lesion Annotations Refinement via Prototypical Learning.

, , , , and . MLMI@MICCAI, volume 13583 of Lecture Notes in Computer Science, page 239-248. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CoC-GAN: Employing Context Cluster for Unveiling a New Pathway in Image Generation., , and . CoRR, (2023)STFM: Enhancing Autism Spectrum Disorder Classification Through Ensemble Learning-Based Fusion of Temporal and Spatial fMRI Patterns., , , and . PRICAI (3), volume 14327 of Lecture Notes in Computer Science, page 409-421. Springer, (2023)WADS: A Webshell Attack Defender Assisted by Software-Defined Networks., , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 209-222. Springer, (2021)Efficient light-weight private auditing scheme for cloud-based wireless body area networks., , , , and . Int. J. Electron. Secur. Digit. Forensics, 12 (2): 139-153 (2020)Machine learning attacks resistant strong PUF design utilizing response obfuscates challenge with lower hardware overhead., , , and . Microelectron. J., (December 2023)Efficient and Robust Time-Optimal Trajectory Planning and Control for Agile Quadrotor Flight., , , , and . CoRR, (2023)SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 2070-2088 (2022)The Tufts fNIRS Mental Workload Dataset & Benchmark for Brain-Computer Interfaces that Generalize., , , , , , , and . NeurIPS Datasets and Benchmarks, (2021)Motion-Aligned and Hardness-Aware Dynamic Update Network for Weakly-Supervised Vehicle Detection in Satellite Videos., , , , , and . IFIP TC12 ICIS, volume 659 of IFIP Advances in Information and Communication Technology, page 273-283. Springer, (2022)Advanced Analysis of Email Sender Spoofing Attack and Related Security Problems., , , , , and . CSCloud/EdgeCom, page 80-85. IEEE, (2022)