Author of the publication

Large-Language-Model Empowered Dose Volume Histogram Prediction for Intensity Modulated Radiotherapy.

, , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Data Security of Unmanned Aerial Vehicles., , , , , and . NaNA, page 186-193. IEEE, (2021)Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption Technology., , , , , and . CyberC, page 1-6. IEEE, (2020)Searchable encryption scheme with limited search scope for group users., , , , and . NaNA, page 430-435. IEEE, (2020)Ciphertext storage scheme supporting data hierarchical management and control., , , , and . NaNA, page 205-212. IEEE, (2022)The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems., , , , , , and . NaNA, page 212-216. IEEE, (2021)A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain., , , , , and . MASS, page 481-486. IEEE Computer Society, (2018)An Open Identity Authentication Scheme Based on Blockchain., , , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 421-438. Springer, (2019)A new stealth address scheme for blockchain., , , , , and . ACM TUR-C, page 67:1-67:7. ACM, (2019)Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization., , , and . SANER, page 534-545. IEEE, (2023)Trust Enhancement Scheme for Cross Domain Authentication of PKI System., , , , , and . CyberC, page 103-110. IEEE, (2019)