Author of the publication

Design and Evaluation of a Virtual Reality Simulation Module for Training Advanced Temporal Bone Surgery.

, , , , , , , and . CBMS, page 7-12. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensionality-Driven Learning with Noisy Labels., , , , , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 3361-3370. PMLR, (2018)Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles., , , , , and . CVPR, page 997-1005. Computer Vision Foundation / IEEE, (2020)Improving Adversarial Robustness via Channel-wise Activation Suppressing., , , , , and . ICLR, OpenReview.net, (2021)Normalized Loss Functions for Deep Learning with Noisy Labels., , , , , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 6543-6553. PMLR, (2020)Neural Architecture Search via Combinatorial Multi-Armed Bandit., , , and . IJCNN, page 1-8. IEEE, (2021)Anti-Backdoor Learning: Training Clean Models on Poisoned Data., , , , , and . NeurIPS, page 14900-14912. (2021)DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning Models., , , , and . ICSE Companion, page 64-67. IEEE, (2023)Symmetric Cross Entropy for Robust Learning With Noisy Labels., , , , , and . ICCV, page 322-330. IEEE, (2019)Simulation for Training Cochlear Implant Electrode Insertion., , , , , , and . CBMS, page 1-6. IEEE Computer Society, (2017)Backdoor Attacks on Crowd Counting., , , , , , , , and . ACM Multimedia, page 5351-5360. ACM, (2022)