Author of the publication

An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.

, , , , , , , , , , , , and . IEEE Trans. Medical Imaging, 38 (2): 360-370 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standardized Research of Clinical Diagnosis and Treatment Data of Epilepsy., , , , , , , , , and . IHSED, volume 1026 of Advances in Intelligent Systems and Computing, page 760-766. Springer, (2019)Push the Student to Learn Right: Progressive Gradient Correcting by Meta-learner on Corrupted Labels., , , , , , and . CoRR, (2019)Construction of national clinical research data center of Traditional Chinese medicine., , , , and . Healthcom, page 47-51. IEEE, (2012)Practical research of conceptual system framework based on TCM basic theory., , , and . Healthcom, page 357-360. IEEE, (2012)A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme., , , and . Wireless Personal Communications, 95 (3): 3391-3406 (2017)Tools and Benchmarks for Automated Log Parsing., , , , , , and . CoRR, (2018)Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city., and . Neurocomputing, (2019)Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules., , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 604-609. Springer, (2006)Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol., , , and . Int. J. Commun. Syst., 29 (3): 478-487 (2016)Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card., and . J. Networks, 5 (12): 1434-1441 (2010)