Author of the publication

CoProLITE: Constrained Proxy Learning for lIver and hepaTic lesion sEgmentation.

, , , , , and . Neurocomputing, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application Prospect of Blockchain in Renewable Energy Certificates., , , and . CSAE, page 38:1-38:5. ACM, (2020)Deep Deterministic Policy Gradient with Clustered Prioritized Sampling., , , and . ICONIP (2), volume 11302 of Lecture Notes in Computer Science, page 645-654. Springer, (2018)Learn to human-level control in dynamic environment using incremental batch interrupting temporal abstraction., , , , and . Comput. Sci. Inf. Syst., 13 (2): 561-577 (2016)基于视觉注意力机制的异步优势行动者-评论家算法 (Asynchronous Advantage Actor-Critic Algorithm with Visual Attention Mechanism)., , , and . 计算机科学, 46 (5): 169-174 (2019)A kernel based true online Sarsa(λ) for continuous space control problems., , , , and . Comput. Sci. Inf. Syst., 14 (3): 789-804 (2017)Study of Logistics Vehicle Routing Problem Based on GIS., , , , and . IITA, page 129-132. IEEE Computer Society, (2007)Detecting Wikipedia Vandalism with a Contributing Efficiency-Based Approach., , , , , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 645-651. Springer, (2012)Sparse Kernel-Based Least Squares Temporal Difference with Prioritized Sweeping., , , , , , and . ICONIP (3), volume 9949 of Lecture Notes in Computer Science, page 221-230. (2016)CoProLITE: Constrained Proxy Learning for lIver and hepaTic lesion sEgmentation., , , , , and . Neurocomputing, (2024)A Method to Automatically Discover and Classify Deep Web Data Source Using Multi-Classifier., , , and . CSIE (3), page 736-740. IEEE Computer Society, (2009)