Author of the publication

Extracting Sequential Features from Dynamic Connectivity Network with rs-fMRI Data for AD Classification.

, , , , , and . MLMI@MICCAI, volume 12966 of Lecture Notes in Computer Science, page 664-673. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighborhood relevant outlier detection approach based on information entropy., , , and . Intell. Data Anal., 20 (6): 1247-1265 (2016)Integration of Handcrafted and Embedded Features from Functional Connectivity Network with rs-fMRI forBrain Disease Classification., , , , , and . MLMI@MICCAI, volume 12966 of Lecture Notes in Computer Science, page 674-681. Springer, (2021)Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables., , , and . Pattern Recognition, 47 (10): 3304-3313 (2014)Fingerprint enhancement rooted in the spectra diffusion by the aid of the 2D adaptive Chebyshev band-pass filter with orientation-selective., , , and . Inf. Sci., (2017)Fingerprint image super resolution using sparse representation with ridge pattern prior by classification coupled dictionaries., , and . IET Biom., 6 (5): 342-350 (2017)Extracting Sequential Features from Dynamic Connectivity Network with rs-fMRI Data for AD Classification., , , , , and . MLMI@MICCAI, volume 12966 of Lecture Notes in Computer Science, page 664-673. Springer, (2021)A Survey of the Methods on Fingerprint Orientation Field Estimation., , , , , and . IEEE Access, (2019)Combining weighted linear project analysis with orientation diffusion for fingerprint orientation field reconstruction., , and . Inf. Sci., (2017)An improved fingerprint orientation field extraction method based on quality grading scheme., , and . Int. J. Machine Learning & Cybernetics, 9 (8): 1249-1260 (2018)A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUF., , , and . CSS, volume 13172 of Lecture Notes in Computer Science, page 97-106. Springer, (2021)