Author of the publication

Curvature-Enhanced Implicit Function Network for High-quality Tooth Model Generation from CBCT Images.

, , , , , , , , , , and . MICCAI (5), volume 13435 of Lecture Notes in Computer Science, page 225-234. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PyCT: A Python Concolic Tester., , , , and . APLAS, volume 13008 of Lecture Notes in Computer Science, page 38-46. Springer, (2021)Optimal sanitization synthesis for web application vulnerability repair., , , , , and . ISSTA, page 189-200. ACM, (2016)Chinese medical event detection based on feature extension and document consistency., , and . CACRE, page 753-758. IEEE, (2020)Detection and location of microaneurysms in fundus images based on improved YOLOv4 with IFCM., , , , and . IET Image Process., 17 (11): 3349-3357 (2023)TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering., , and . IEEE Trans. Software Eng., 32 (7): 510-526 (2006)An Effective Approach to Mining Exeption Class Association Rules., and . Web-Age Information Management, volume 1846 of Lecture Notes in Computer Science, page 145-150. Springer, (2000)Fuzzy Topological Relations Between Fuzzy Spatial Objects., , and . FSKD, volume 4223 of Lecture Notes in Computer Science, page 324-333. Springer, (2006)A balanced energy consumption clustering algorithm for heterogeneous energy wireless sensor networks., , and . WCNIS, page 382-386. IEEE, (2010)Developing The Bottom-up Attentional System of A Social Robot., , , , , , , and . ICRA, page 7402-7408. IEEE, (2022)Innocent by association: early recognition of legitimate users., , , , , , , , and . CCS, page 353-364. ACM, (2012)