Author of the publication

A Wide Energy Range and 4π-View Gamma Camera with Interspaced Position-Sensitive Scintillator Array and Embedded Heavy Metal Bars.

, , , , , , and . Sensors, 23 (2): 953 (January 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repulsive Attention: Rethinking Multi-head Attention as Bayesian Inference., , , , , , , , and . EMNLP (1), page 236-255. Association for Computational Linguistics, (2020)TNT: Text Normalization based Pre-training of Transformers for Content Moderation., , , , and . EMNLP (1), page 4735-4741. Association for Computational Linguistics, (2020)Research on the Accurate Identification Method of Students from Families with Economic Difficulties Based on Campus Consumption Data., , , and . DSIT, page 287-293. IEEE, (2023)Code Coverage Analysis of Combinatorial Testing., , and . QuASoQ/TDA@APSEC, volume 1771 of CEUR Workshop Proceedings, page 43-49. CEUR-WS.org, (2016)Spatial-Temporal Air Quality Inference based on Matrix Factorization., , , , and . ICC, page 5092-5097. IEEE, (2022)The Report of Standardization for Blockchain-Based Digital Right Management System., , , , , , , , and . DSC, page 450-455. IEEE, (2023)A Class of Optimal Control Problem for Stochastic Discrete-Time Systems with Average Reward Reinforcement Learning., , and . ICPS, page 829-834. IEEE, (2021)Visualizing Streaming Text Data with Dynamic Maps, , and . CoRR, (2012)Deep Directly-Trained Spiking Neural Networks for Object Detection., , , , , , and . ICCV, page 6532-6542. IEEE, (2023)Generating Look-alike Names For Security Challenges., , , , , , and . AISec@CCS, page 57-67. ACM, (2017)