Author of the publication

EMLI-ICC: an ensemble machine learning-based integration algorithm for metastasis prediction and risk stratification in intrahepatic cholangiocarcinoma.

, , , , , , , , , , , , , , , , , , and . Briefings Bioinform., (November 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and analyze of transient-induced latch-up in RS485 transceiver with on-chip TVS., , , and . Microelectron. Reliab., 55 (3-4): 637-644 (2015)Fair (t, n) threshold secret sharing scheme., , , and . IET Inf. Secur., (2013)Monitoring Hybrid Rice Phenology at Initial Heading Stage Based on Low-Altitude Remote Sensing Data., , , , , , , and . Remote. Sens., 13 (1): 86 (2021)Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing., , and . Int. J. Netw. Secur., 14 (3): 156-163 (2012)A delegation based cross trusted domain direct anonymous attestation scheme., , , and . Comput. Networks, (2015)Ultra-bright and highly efficient inorganic based perovskite light-emitting diodes, , , , , , , , , and 2 other author(s). Nature Communications, (June 2017)Joint Power Allocation and Subchannel-Pairing for Two-Way MIMO-OFDM Relay System., , , and . IEICE Trans. Commun., 96-B (5): 1168-1175 (2013)A hybrid time-to-digital converter based on residual time extraction and amplification., , , , , and . Microelectron. J., (2017)User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs., , and . Secur. Commun. Networks, (2018)Network Slicing in 6G: An Authentication Framework for Unattended Terminals., , , , , and . IEEE Netw., 37 (1): 78-86 (January 2023)