Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consistent Learning-Based Breast Tumor Segmentation and Its Application in Sentinel Lymph Node Metastasis Prediction., , , , , , and . EMBC, page 1-4. IEEE, (2023)Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively., , and . SecDev, page 67-74. IEEE, (2023)An Observation of Precipitation during Cooling with Ka-Band Cloud Radar in Wuhan, China., , , , , and . Remote. Sens., 15 (22): 5397 (November 2023)Design and test of adaptive torsional vibration suppression method for helicopter power system with variable rotor speed., , , , and . J. Syst. Control. Eng., 236 (7): 1324-1334 (2022)Semi-BGSegNet: A Semi-Supervised Boundary-Guided Breast Tumor Segmentation Network., , , , , and . ISBI, page 1-5. IEEE, (2023)RA2DC-Net:A residual augment-convolutions and adaptive deformable convolution for points-based anchor-free orientation detection network in remote sensing images., , , , and . Expert Syst. Appl., 238 (Part E): 122299 (March 2024)Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card., and . RAID, volume 3858 of Lecture Notes in Computer Science, page 102-123. Springer, (2005)Learning Segment Similarity and Alignment in Large-Scale Content Based Video Retrieval., , , , , , , , , and 2 other author(s). CoRR, (2023)A Large-scale Comprehensive Dataset and Copy-overlap Aware Evaluation Protocol for Segment-level Video Copy Detection., , , , , , , , , and 6 other author(s). CVPR, page 21054-21063. IEEE, (2022)Employing attack graphs for intrusion detection., , , , , , , and . NSPW, page 16-30. ACM, (2019)