Author of the publication

Deformable Image Registration Based on Similarity-Steered CNN Regression.

, , , , , , and . MICCAI (1), volume 10433 of Lecture Notes in Computer Science, page 300-308. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 164-172. Springer, (2004)Modeling, Implementation and simulation of virtual factory based on colored timed Petri net., and . ETFA (1), page 574-579. IEEE, (2003)An investigation into iPod Touch generation 2., , and . InfoSecCD, page 94-98. ACM, (2011)Enhance learning through developing network security hands-on lab for online students., and . InfoSecCD, page 11:1. ACM, (2014)Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs., and . Web Intelligence, volume 2198 of Lecture Notes in Computer Science, page 498-507. Springer, (2001)A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 3-15. (2016)Iterative class diagram construction in consideration of modeling granularity., and . RCIS, page 101-108. IEEE, (2010)The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies., and . IJEIS, 13 (4): 76-89 (2017)Resistance Analysis to Intruders' Evasion of Detecting Intrusion., , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 383-397. Springer, (2006)Dolphin Swarm Extreme Learning Machine., , and . Cogn. Comput., 9 (2): 275-284 (2017)