Author of the publication

Reconstruction of Isotropic High-Resolution MR Image from Multiple Anisotropic Scans Using Sparse Fidelity Loss and Adversarial Regularization.

, , , , , , and . MICCAI (3), volume 11766 of Lecture Notes in Computer Science, page 65-73. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R Type of Strong Connectivity in LL-fuzzy Topological Spaces.. ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1433-1439. (2009)Robust Nonlinear Control of a Hypersonic Aircraft, and . Journal of Guidance, Control, and Dynamics, 23 (4): 577--585 (July 2000)CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network., , , , , and . IEEE Access, (2018)Robust control for spacecraft rendezvous system with actuator unsymmetrical saturation: a gain scheduling approach., and . Int. J. Control, 91 (6): 1241-1250 (2018)Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage., , , and . Secur. Commun. Networks, (2021)Informativeness-guided active learning for deep learning-based façade defects detection., , , and . Comput. Aided Civ. Infrastructure Eng., 38 (17): 2408-2425 (November 2023)Secure Prediction of Neural Network in the Cloud., , , , , and . IEEE Netw., 35 (1): 251-257 (2021)Low-rate DDoS attacks detection method using data compression and behavior divergence measurement., , , , and . Comput. Secur., (2021)Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Source Class Selection With Label Propagation For Partial Domain Adaptation., and . ICIP, page 769-773. IEEE, (2021)