Author of the publication

Teeth category classification via seven-layer deep convolutional neural network with max pooling and global average pooling.

, , , , , and . Int. J. Imaging Systems and Technology, 29 (4): 577-583 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handoff management scheme based on frame loss rate and RSSI prediction for IEEE 802.11 networks., , , , , and . ISWCS, page 555-559. IEEE, (2016)Daxing Smartphone Identification Dataset., , , , , and . IEEE Access, (2019)Forensic detection of noise addition in digital images., , , , and . J. Electronic Imaging, 23 (2): 023004 (2014)Reprogramming Mycobacterium tuberculosis CRISPR System for Gene Editing and Genome-wide RNA Interference Screening., , , , , , , , , and 7 other author(s). Genom. Proteom. Bioinform., 20 (6): 1180-1196 (December 2022)Morphine Re-arranges Chromatin Spatial Architecture of Primate Cortical Neurons., , , , , , , , , and 12 other author(s). Genom. Proteom. Bioinform., 21 (3): 551-572 (June 2023)Accelerate Histogram-Based Contrast Enhancement by Selective Downsampling., , , , and . CoRR, (2017)Recognition of printed small texture modules based on dictionary learning., , , , , and . EURASIP J. Image Video Process., 2021 (1): 31 (2021)CoolBox: a flexible toolkit for visual analysis of genomics data., , , , , , and . BMC Bioinform., 22 (1): 489 (2021)Transferable Adversarial Attack on Image Tampering Localization., , , and . CoRR, (2023)The reservoir parameter calculation method using the nuclear magnetic resonance log data., , , , , , , and . ICNC, page 588-593. IEEE, (2015)