Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Characterization of Arbitrary Filters with an Integrated Spiral Si3N4/SiO2 Waveguide., , , , , and . OFC, page 1-3. IEEE, (2020)Lower bound on the ergodic capacity of distributed MIMO systems over K fading channels., , , and . ICCC, page 1-6. IEEE, (2016)Building Extraction Using Mask Scoring R-CNN Network., and . CSAE, page 113:1-113:5. ACM, (2019)ECC-PolypDet: Enhanced CenterNet with Contrastive Learning for Automatic Polyp Detection., , , , , , , , and . CoRR, (2024)WeakPolyp: You only Look Bounding Box for Polyp Segmentation., , , , and . MICCAI (3), volume 14222 of Lecture Notes in Computer Science, page 757-766. Springer, (2023)Toward Clinically Assisted Colorectal Polyp Recognition via Structured Cross-Modal Representation Consistency., , , , , , and . MICCAI (3), volume 13433 of Lecture Notes in Computer Science, page 141-150. Springer, (2022)Shallow Attention Network for Polyp Segmentation., , , , , and . MICCAI (1), volume 12901 of Lecture Notes in Computer Science, page 699-708. Springer, (2021)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , and . IJCNN, page 1-10. IEEE, (2023)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , and . MobiCom, page 513-527. ACM, (2024)Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures., , , , , , and . CODASPY, page 89-100. ACM, (2021)