Author of the publication

Sample self-selection using dual teacher networks for pathological image classification with noisy labels.

, , , , , and . Comput. Biol. Medicine, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HCEM: A new class of bit-level hybrid channel error model., , , , and . IC-NIDC, page 8-12. IEEE, (2012)Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 307-316. Springer, (2020)Security-Aware Mapping and Scheduling with Hardware Co-Processors for FlexRay-Based Distributed Embedded Systems., , , and . IEEE Trans. Parallel Distributed Syst., 27 (10): 3044-3057 (2016)pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme., , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 12491-12505 (November 2023)MDEmoNet: A Multimodal Driver Emotion Recognition Network for Smart Cockpit., , , , , , , and . ICCE, page 1-6. IEEE, (2024)Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens., , , , and . Comput. Stand. Interfaces, (2017)Optimizing the implementation of real-time Simulink models onto distributed automotive architectures., , , , and . J. Syst. Archit., 59 (10-D): 1115-1127 (2013)DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection., , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 293-304. Springer, (2023)Verifiable and privacy preserving federated learning without fully trusted centers., , , , , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1431-1441 (2022)ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments., , , , , and . Ad Hoc Networks, (June 2023)