Author of the publication

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

, , , , , , , , , , and . BICS, volume 11691 of Lecture Notes in Computer Science, page 76-85. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Omnidirectional Approach to Touch-based Continuous Authentication., , , and . CoRR, (2023)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS., , , , , , , , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 40-57. Springer, (2021)CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption., , , , , and . VTC Fall, page 1-6. IEEE, (2023)Launching Adversarial Label Contamination Attacks Against Malicious URL Detection., , , and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 69-82. Springer, (2021)Enhancing Network Management using Mobile Agents., , and . ECBS, page 218-. IEEE Computer Society, (2000)Requirements for 5G based telemetric cardiac monitoring., , , , and . WiMob, page 1-4. IEEE, (2018)Scalable Multi-domain Trust Infrastructures for Segmented Networks., , , , , and . CAMAD, page 182-187. IEEE, (2023)Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations., , , and . CAMAD, page 194-199. IEEE, (2023)TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies., , , and . COMPSAC, page 1235-1240. IEEE, (2020)