Author of the publication

Comparison of individualized behavioral predictions across anatomical, diffusion and functional connectivity MRI.

, , , , , , , , , and . NeuroImage, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 592-609. Springer, (2013)SMART: Design and Evaluation of a Collaborative Museum Visiting Application., , , , , , , and . CDVE, volume 9320 of Lecture Notes in Computer Science, page 57-64. Springer, (2015)A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud., , , and . INCoS, page 1-7. IEEE, (2012)Filters navigation and positioning based on mining vehicle motion model., , , , , and . CACRE, page 31-36. IEEE, (2020)BigDataBench: A Dwarf-based Big Data and AI Benchmark Suite., , , , , , , , , and 2 other author(s). CoRR, (2018)Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses., , , , and . ACM Trans. Storage, 16 (1): 4:1-4:30 (2020)Operator splitting based structure-preserving numerical schemes for the mass-conserving convective Allen-Cahn equation., , , and . J. Comput. Phys., (2023)Efficient Network Path Verification for Policy-routedQueries., , and . CODASPY, page 319-328. ACM, (2016)Spatial Non-Maximum Suppression for Object Detection using Correlation and Dynamic Thresholds., , , , and . ISOCC, page 264-265. IEEE, (2021)Information Leakage in Encrypted Deduplication via Frequency Analysis., , , and . DSN, page 1-12. IEEE Computer Society, (2017)