Author of the publication

An Efficient Iterative Cerebral Perfusion CT Reconstruction via Low-Rank Tensor Decomposition With Spatial-Temporal Total Variation Regularization.

, , , , , , , , , , , , and . IEEE Trans. Med. Imaging, 38 (2): 360-370 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCM syndrome differentiation of AIDS using subspace clustering algorithm., , , , , , , , and . BIBM, page 219-224. IEEE Computer Society, (2014)A Novel Sparsity Measure for Tensor Recovery., , , , , , and . ICCV, page 271-279. IEEE Computer Society, (2015)Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks., , , , and . IJDSN, (2014)An improved and secure chaotic map based authenticated key agreement in multi-server architecture., , , , , and . Multimedia Tools Appl., 77 (1): 1167-1204 (2018)The design and implementation of inpatient medical expenses analysis system., , , , , and . BIBM, page 256-259. IEEE Computer Society, (2013)Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 40 (8): 1888-1902 (2018)QoS Prediction in Dynamic Web Services with Asymmetric Correlation., , , and . ICA3PP (1), volume 9528 of Lecture Notes in Computer Science, page 445-459. Springer, (2015)Convolutional Sparse Coding for Image Super-Resolution., , , , , and . ICCV, page 1823-1831. IEEE Computer Society, (2015)A Survey of Wireless Sensor Technique Applications for Medical Care., , , , , , , , and . CyberC, page 412-415. IEEE, (2017)Provably secure convertible multi-authenticated encryption scheme.. IET Information Security, 6 (2): 65-70 (2012)