Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved segmentation by adversarial U-Net., , , and . Medical Imaging: Computer-Aided Diagnosis, volume 11597 of SPIE Proceedings, SPIE, (2021)Improving retinal images segmentation using styleGAN image augmentation., and . Medical Imaging: Computer-Aided Diagnosis, volume 11597 of SPIE Proceedings, SPIE, (2021)Learning Rotation Invariant Features For Cryogenic Electron Microscopy Image Reconstruction., , , , and . ISBI, page 563-566. IEEE, (2021)Improved CycleGAN with application to COVID-19 classification., , , and . Medical Imaging: Image Processing, volume 11596 of SPIE Proceedings, SPIE, (2021)Tone Stimulus Detection For Rats Using RRAM-Based Local Field Potential Monitoring., , , , , , , and . BioCAS, page 1-5. IEEE, (2023)A Model of Target Selectivity and Hypersensitivity in the Electrosensory System of Sharks Using Rapidly Varying Effective Synaptic Strengths., , , and . ICONIP (1), page 137-140. Springer, (1997)ExcUseMe: Asking Users to Help in Item Cold-Start Recommendations., , , , , and . RecSys, page 83-90. ACM, (2015)Securify: Practical Security Analysis of Smart Contracts., , , , , and . ACM Conference on Computer and Communications Security, page 67-82. ACM, (2018)VerX: Safety Verification of Smart Contracts., , , , and . SP, page 1661-1677. IEEE, (2020)Boosting Robustness Verification of Semantic Feature Neighborhoods., and . SAS, volume 13790 of Lecture Notes in Computer Science, page 299-324. Springer, (2022)