Author of the publication

Active contour model of breast cancer DCE-MRI segmentation with an extreme learning machine and a fuzzy C-means cluster.

, , , , , , , and . IET Image Process., 16 (11): 2947-2958 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scheme of digital ticket for personal trusted device.. PIMRC, page 3065-3069. IEEE, (2004)Flexible authentication of images., , and . VCIP, volume 5150 of Proceedings of SPIE, page 1905-1911. SPIE, (2003)Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce., and . ICC, page 1503-1508. IEEE, (2007)Security Remarks on a Convertible Nominative Signature Scheme., and . SEC, volume 232 of IFIP, page 265-275. Springer, (2007)Collusion attack on a multi-key secure video proxy scheme., and . ACM Multimedia, page 380-383. ACM, (2004)Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery., , , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 40-52. Springer, (2005)An improved personal CA for personal area networks., and . GLOBECOM, page 1486-1490. IEEE, (2003)Turing assessor: a new tool for cyber security quantification., , and . WCNC, page 629-633. IEEE, (2006)Access control protocols with two-layer architecture for wireless networks., , , and . Comput. Networks, 51 (3): 655-670 (2007)Highly reliable trust establishment scheme in ad hoc networks., , , , , and . Comput. Networks, 45 (6): 687-699 (2004)