Author of the publication

Sub-features orthogonal decoupling: Detecting bone wall absence via a small number of abnormal examples for temporal CT images.

, , , , , , , , and . Comput. Medical Imaging Graph., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Layered-based exposure fusion algorithm., , , and . IET Image Processing, 7 (7): 701-711 (2013)Performance evaluation of distributing real-time video over concurrent multipath., , , , , and . WCNC, page 3001-3006. IEEE, (2009)BUPTTeam Participation at TAC 2016 Knowledge Base Population., , and . TAC, NIST, (2016)MMPClust: A Skew Prevention Algorithm for Model-Based Document Clustering., , and . DASFAA, volume 3453 of Lecture Notes in Computer Science, page 536-547. Springer, (2005)The Graph Limit of The Minimizer of The Onsager-Machlup Functional and Its Computation., , , and . CoRR, (2020)Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation., , , , and . USENIX Security Symposium, page 1739-1756. USENIX Association, (2023)Pseudo Period Detection on Time Series Stream with Scale Smoothing., , , , and . APWeb/WAIM, volume 5446 of Lecture Notes in Computer Science, page 611-616. Springer, (2009)A Novel Speckle Noise Reduction Algorithm for Old Movies Recovery., , , , and . CISP-BMEI, page 1-6. IEEE, (2018)Deeply supervised vestibule segmentation network for CT images with global context-aware pyramid feature extraction., , , , , and . IET Image Process., 17 (4): 1267-1279 (March 2023)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)