Author of the publication

Active Contour Driven by Weighted Hybrid Signed Pressure Force for Image Segmentation.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single Key Variant of PMAC_Plus., , , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 268-305 (2017)UTLNet: Uncertainty-Aware Transformer Localization Network for RGB-Depth Mirror Segmentation., , , , and . IEEE Trans. Multim., (2024)Diagnosis of atrial fibrillation using self-complementary attentional convolutional neural network., , , , , , and . Comput. Methods Programs Biomed., (August 2023)Combining Dynamic Constrained Many-Objective Optimization with DE to Solve Constrained Optimization Problems., , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 64-73. Springer, (2015)DHFNet: dual-decoding hierarchical fusion network for RGB-thermal semantic segmentation., , , , and . Vis. Comput., 40 (1): 169-179 (January 2024)Effective Velocity Calculation Method in Passive Synthetic Aperture for Emitter Localization., , , , , and . GLOBECOM, page 4191-4195. IEEE, (2022)Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)Extended Models for Message Authentication., , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 286-301. Springer, (2008)On the Correctness of An Approach Against Side-channel attacks., , , and . IACR Cryptology ePrint Archive, (2008)BCBC: A More Efficient MAC Algorithm., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 233-246. Springer, (2011)