Author of the publication

Novel Imaging Biomarkers to Evaluate Heart Dysfunction Post-chemotherapy: A Preclinical MRI Feasibility Study.

, , , , , , , and . STACOM@MICCAI, volume 13131 of Lecture Notes in Computer Science, page 29-37. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

F-norm distance metric based robust 2DPCA and face recognition., , , and . Neural Networks, (2017)TLB Poisoning Attacks on AMD Secure Encrypted Virtualization., , , , and . ACSAC, page 609-619. ACM, (2021)Research on the Key Application of Computer Biometric Technology in Power Self-Service Terminal., , , , and . CAIBDA, volume 373 of Frontiers in Artificial Intelligence and Applications, page 943-948. IOS Press, (2023)Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA., , , , and . IPCCC, page 1-8. IEEE Computer Society, (2014)Performance Analysis of the Unary Coding Aided SWIPT in a Single-User Z-Channel., , , and . GLOBECOM, page 1-6. IEEE, (2019)Remote Sensing Object Detection Based on Strong Feature Extraction and Prescreening Network., , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Deep Multi-Scale U-Net Architecture and Label-Noise Robust Training Strategies for Histopathological Image Segmentation., , , , , , , , , and 1 other author(s). BIBE, page 91-96. IEEE, (2022)A Quantization Framework for Neural Network Adaption at the Edge., and . DATE, page 402-407. IEEE, (2021)CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations., , , , , and . USENIX Security Symposium, page 6843-6860. USENIX Association, (2023)Pipeline to Build and Test Robust 3D T1 Mapping-Based Heart Models for EP Interventions: Preliminary Results., , , , , , , , , and . FIMH, volume 11504 of Lecture Notes in Computer Science, page 64-72. Springer, (2019)