Author of the publication

Medical image security authentication method based on wavelet reconstruction and fractal dimension.

, , , , , , and . Int. J. Distributed Sens. Networks, 17 (4): 155014772110141 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of state-owned listed company in Anhui province based on different subjects., , and . ICNC-FSKD, page 2142-2149. IEEE, (2017)The effect on (2, N, 2) Bell tests with distributed measurement dependence., , , , , and . Quantum Inf. Process., 19 (9): 339 (2020)Perfect quantum multiple-unicast network coding protocol., , , and . Quantum Inf. Process., 17 (1): 13 (2018)Acute Isolation of Neurons Suitable for Patch-Clamping Study from Frontal Cortex of Mice., , , , and . LSMS/ICSEE, volume 6330 of Lecture Notes in Computer Science, page 611-617. Springer, (2010)VIKOR Method with Enhanced Accuracy for Multiple Criteria Decision Making in Healthcare Management., , and . J. Medical Systems, 37 (2): 9908 (2013)Illumination consistency based on single low dynamic range images., , , , and . Multimedia Tools Appl., 79 (5-6): 3189-3215 (2020)Application of U-Net with Variable Fractional Order Gradient Descent Method in Rectal Tumor Segmentation., , , , , and . ICSAI, page 522-526. IEEE, (2019)二重keeloq算法在智能门禁系统中的应用研究 (Application of Dual Keeloq Algorithm in Intelligent Access Control System)., , and . 计算机科学, 45 (6A): 573-575 (2018)Interpolation Techniques for Geo-spatial Association Rule Mining., , and . RSFDGrC, volume 2639 of Lecture Notes in Computer Science, page 573-580. Springer, (2003)Impact of receiver cheating on the stability of ALM tree., , , and . GLOBECOM, page 5. IEEE, (2005)