Author of the publication

An Automated Method with Attention Network for Cervical Cancer Scanning.

, , , , , and . PRCV (2), volume 11858 of Lecture Notes in Computer Science, page 267-278. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于深度学习的胃癌病理图像分类方法 (Pathological Image Classification of Gastric Cancer Based on Depth Learning)., , , and . 计算机科学, 45 (11A): 263-268 (2018)基于深度学习与自适应对比度增强的臂丛神经超声图像优化 (Brachial Plexus Ultrasound Image Optimization Based on Deep Learning and Adaptive Contrast Enhancement)., , , , , and . 计算机科学, 46 (11A): 236-240 (2019)Combined Control Strategy for Proportional Current Sharing in DC Microgrid Clusters., , , , and . IEEE Trans. Ind. Electron., 70 (11): 11251-11261 (November 2023)Hyper-Embedder: Learning a Deep Embedder for Self-Supervised Hyperspectral Dimensionality Reduction., , and . IEEE Geosci. Remote. Sens. Lett., (2022)A Novel Multiinstance Learning Approach for Liver Cancer Recognition on Abdominal CT Images Based on CPSO-SVM and IO., , , and . Comput. Math. Methods Medicine, (2013)Fast filter bank convolution for three-dimensional wavelet transform by shared memory on mobile GPU computing.. J. Supercomput., 71 (9): 3440-3455 (2015)A Haptic Interface for Virtual Reality Based Teleoperation System., , , and . ISIA, volume 86 of Communications in Computer and Information Science, page 377-383. Springer, (2010)A Scalable Embedding Based Neural Network Method for Discovering Knowledge From Biomedical Literature., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (3): 1294-1301 (2022)Improved block preconditioners for linear systems arising from half-quadratic image restoration., , and . Appl. Math. Comput., (2019)A dynamic event-triggered approach to observer-based PID security control subject to deception attacks., , , and . Autom., (2020)