Author of the publication

Memorizing Structure-Texture Correspondence for Image Anomaly Detection.

, , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (6): 2335-2349 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model., , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 171-198. Springer, (2020)Correction to "Noise Adaptation Generative Adversarial Network for Medical Image Analysis"., , , , , , , , and . IEEE Trans. Medical Imaging, 39 (7): 2566-2567 (2020)Noise Adaptation Generative Adversarial Network for Medical Image Analysis., , , , , , , , and . IEEE Trans. Medical Imaging, 39 (4): 1149-1159 (2020)Memorizing Structure-Texture Correspondence for Image Anomaly Detection., , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (6): 2335-2349 (2022)Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices., , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (5): 1026-1038 (2020)Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 507-526. Springer, (2018)Bridging 3D Gaussian and Mesh for Freeview Video Rendering., , , , , , , , and . CoRR, (2024)Amodal Segmentation Based on Visible Region Segmentation and Shape Prior., , , , , and . AAAI, page 2995-3003. AAAI Press, (2021)Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications., , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 625-634 (2019)