Author of the publication

Smart Nanosystem for Tumour Detection and Targeted Drug Delivery: A Hybrid Framework towards Theranostic Approach.

, , , , , , , and . UCET, page 275-281. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating sentimental bias via a polar attention mechanism., , , , and . Int. J. Data Sci. Anal., 11 (1): 27-36 (2021)Improving Deep Embedded Clustering via Learning Cluster-level Representations., , , , , , , and . COLING, page 2226-2236. International Committee on Computational Linguistics, (2022)RTANet: Recommendation Target-Aware Network Embedding., , , , , , and . ICWSM, page 84-94. AAAI Press, (2023)A Process Model for Forensic Analysis of Symbian Smart Phones., , , , and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 86-93. Springer, (2009)Deep Human Answer Understanding for Natural Reverse QA., , , , , and . CoRR, (2019)Function Layout of Adaptive Aging Population Kitchen Design Based on Trace Observation., , , , and . AHFE (3), volume 261 of Lecture Notes in Networks and Systems, page 564-570. Springer, (2021)A Simple Yet Effective Approach for Diversified Session-Based Recommendation., , , and . CoRR, (2024)Research on abnormal data identification of Internal inspection data in natural gas pipelines., , , and . ICCIC, volume 3734 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Label Dependent Attention Model for Disease Risk Prediction Using Multimodal Electronic Health Records., , , , and . ICDM, page 449-458. IEEE, (2021)An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment., , , , and . ICCNS, page 6-10. ACM, (2016)