Author of the publication

Automated Lung Nodule Detection and Classification Using Deep Learning Combined with Multiple Strategies.

, , , , , and . Sensors, 19 (17): 3722 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection., , , and . DASFAA (1), volume 7238 of Lecture Notes in Computer Science, page 351-366. Springer, (2012)Corrupted and occluded face recognition via cooperative sparse representation., , , and . Pattern Recognit., (2016)The process of resource bricolage and organizational improvisation in information technology innovation: a case study of BDZX in China., , , , , and . Inf. Technol. Dev., 28 (2): 275-296 (2022)Authenticating Top-k Queries in Location-based Services with Confidentiality., , and . Proc. VLDB Endow., 7 (1): 49-60 (2013)CVAS: An Interactive Visual Analytics System for Exploring COVID-19 Information on the Web., , , and . ICCDA, page 116-121. ACM, (2022)OHEA: Secure Data Aggregation in Wireless Sensor Networks against Untrusted Sensors., and . CIKM, page 1425-1434. ACM, (2020)Unified abstract syntax tree representation learning for cross-language program classification., , , and . ICPC, page 390-400. ACM, (2022)Revisiting the Correlation Between Alerts and Software Defects: A Case Study on MyFaces, Camel, and CXF., , , , , and . COMPSAC (1), page 103-108. IEEE Computer Society, (2017)Regional urban extent extraction using multi-sensor data and decision rules., , and . IGARSS, page 1778-1781. IEEE, (2016)Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains., , , , and . CIS, page 579-582. IEEE Computer Society, (2013)