Author of the publication

Are dropout imputation methods for scRNA-seq effective for scHi-C data?

, , and . Briefings Bioinform., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud., and . DSC, page 424-429. IEEE Computer Society, (2016)Flexibly and Securely Shape Your Data Disclosed to Others., , , , , and . AsiaCCS, page 160-167. ACM, (2019)Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data., , and . CBD, page 200-206. IEEE Computer Society, (2016)Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks., , , and . Int. J. Netw. Secur., 18 (5): 816-831 (2016)A Novel User Model Based on Searchable Encryption Scheme., , and . CBD, page 247-253. IEEE Computer Society, (2015)ShortHC: Self-Regenerated Short Hash Chain for Resource-Constrained System., , , and . J. Inf. Hiding Multim. Signal Process., 8 (4): 847-860 (2017)Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data., and . Sensors, 16 (12): 1993 (2016)A Personalized Extended (a, k)-Anonymity Model., , and . CBD, page 234-240. IEEE Computer Society, (2015)Translation Language Model Enhancement for Community Question Retrieval Using User Adoption Answer., , and . APWeb/WAIM (1), volume 10366 of Lecture Notes in Computer Science, page 251-265. Springer, (2017)An Empirical Investigation Into a Large-Scale Java Open Source Code Repository, , , , , , , , and . Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, page 11:1--11:10. (September 2010)