Author of the publication

Towards Inference of Original Graph Data Information from Graph Embeddings.

, , , , and . IJCNN, page 1-10. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Extraction Using Mask Scoring R-CNN Network., and . CSAE, page 113:1-113:5. ACM, (2019)Design and Characterization of Arbitrary Filters with an Integrated Spiral Si3N4/SiO2 Waveguide., , , , , and . OFC, page 1-3. IEEE, (2020)Lower bound on the ergodic capacity of distributed MIMO systems over K fading channels., , , and . ICCC, page 1-6. IEEE, (2016)Toward Clinically Assisted Colorectal Polyp Recognition via Structured Cross-Modal Representation Consistency., , , , , , and . MICCAI (3), volume 13433 of Lecture Notes in Computer Science, page 141-150. Springer, (2022)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , and . IJCNN, page 1-10. IEEE, (2023)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , and . MobiCom, page 513-527. ACM, (2024)ECC-PolypDet: Enhanced CenterNet With Contrastive Learning for Automatic Polyp Detection., , , , , , , , and . IEEE J. Biomed. Health Informatics, 28 (8): 4785-4796 (August 2024)Shallow Attention Network for Polyp Segmentation., , , , , and . MICCAI (1), volume 12901 of Lecture Notes in Computer Science, page 699-708. Springer, (2021)WeakPolyp: You only Look Bounding Box for Polyp Segmentation., , , , and . MICCAI (3), volume 14222 of Lecture Notes in Computer Science, page 757-766. Springer, (2023)Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures., , , , , , and . CODASPY, page 89-100. ACM, (2021)