Author of the publication

Functional localization in the brain of a cynomolgus monkey based on spike pattern recognition with machine learning.

, , , , , , , , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15469-15476 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of partial-charge potential for GaN, , , and . Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms, 250 (1-2): 50 - 53 (2006)Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication., , , and . IEEE Access, (2019)Selecting an Optimal Subset with Regression Metamodels*., , , and . CCTA, page 851-855. IEEE, (2019)An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings., , , and . IC-NIDC, page 526-530. IEEE, (2012)Efficient simulation budget allocation for subset selection using regression metamodels., , , and . Autom., (2019)Diffusion on a curved surface coupled to diffusion in the volume: Application to cell biology., , , , , and . J. Comput. Phys., 226 (2): 1271-1290 (2007)A feature transfer enabled multi-task deep learning model on medical imaging., , , and . Expert Syst. Appl., (2020)Pathway Commons at Virtual Cell: use of pathway data for mathematical modeling., , , , , , , , , and 1 other author(s). Bioinform., 30 (2): 292-294 (2014)Deterministic Construction of Compressed Sensing Matrices via Algebraic Curves., , , and . IEEE Trans. Inf. Theory, 58 (8): 5035-5041 (2012)A secure and efficient data aggregation scheme for wireless sensor networks., , and . Concurr. Comput. Pract. Exp., 23 (12): 1414-1430 (2011)