Author of the publication

Towards Intra-operative PET for Head and Neck Cancer: Lymph Node Localization Using High-Energy Probes.

, , , , , , , and . MICCAI (1), volume 7510 of Lecture Notes in Computer Science, page 430-437. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explainability and Adversarial Robustness for RNNs., , , and . BigDataService, page 148-156. IEEE, (2020)Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures., , , , , , and . ARES, page 78:1-78:11. ACM, (2021)Are Network Attacks Outliers? A Study of Space Representations and Unsupervised Algorithms., , , and . PKDD/ECML Workshops (2), volume 1168 of Communications in Computer and Information Science, page 159-175. Springer, (2019)SDOclust: Clustering with Sparse Data Observers., , , and . SISAP, volume 14289 of Lecture Notes in Computer Science, page 185-199. Springer, (2023)MDCStream: Stream Data Generator for Testing Analysis Algorithms., , , and . VALUETOOLS, page 56-63. ACM, (2020)Two new ad-hoc models of detection physics and their evaluation for navigated beta probe surface imaging., , , , , , and . Medical Imaging: Image-Guided Procedures, volume 8316 of SPIE Proceedings, page 83162G. SPIE, (2012)Evaluation of an ad hoc model of detection physics for navigated beta-probe surface imaging., , , and . Medical Imaging: Image-Guided Procedures, volume 7964 of SPIE Proceedings, page 796405. SPIE, (2011)Explainability and Adversarial Robustness for RNNs., , , and . CoRR, (2019)Freehand SPECT reconstructions using look up tables., , , , , and . Medical Imaging: Image-Guided Procedures, volume 8316 of SPIE Proceedings, page 83162H. SPIE, (2012)SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories., , , , and . ARES, page 148:1-148:11. ACM, (2021)