Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Zhao, Yizhi"'
Autor:
Shui, Zhongyi, Zhao, Yizhi, Zheng, Sunyi, Zhang, Yunlong, Li, Honglin, Zhang, Shichuan, Yu, Xiaoxuan, Zhu, Chenglu, Yang, Lin
Cell recognition is a fundamental task in digital histopathology image analysis. Point-based cell recognition (PCR) methods normally require a vast number of annotations, which is extremely costly, time-consuming and labor-intensive. Semi-supervised
Externí odkaz:
http://arxiv.org/abs/2306.08240
Autor:
Luo, Dan, Chen, Peng, Yang, Jingsong, Chen, Xin, Li, Xiunan, Zheng, Gang, Ren, Lin, Zhao, Yizhi
Publikováno v:
In Marine Pollution Bulletin October 2024 207
Autor:
Yang, Hejie, Dong, Yiming, Li, Xuewu, He, Weiping, Liu, Yuanhai, Mu, Xianlian, Zhao, Yizhi, Wang, Xueliang, Yang, Fan, Fu, Wei, Gao, Yimin, Qin, Weichao
Publikováno v:
In Colloids and Surfaces A: Physicochemical and Engineering Aspects 5 September 2024 696
Autor:
Yang, Hejie, Dong, Yiming, Li, Xuewu, Gao, Yimin, He, Weiping, Liu, Yuanhai, Mu, Xianlian, Zhao, Yizhi
Publikováno v:
In Journal of Alloys and Compounds 15 December 2024 1008
Autor:
Huang, Aoling, Zhao, Yizhi, Guan, Feng, Zhang, Hongfeng, Luo, Bin, Xie, Ting, Chen, Shuaijun, Chen, Xinyue, Ai, Shuying, Ju, Xianli, Yan, Honglin, Yang, Lin, Yuan, Jingping
Publikováno v:
In Computational and Structural Biotechnology Journal December 2024 26:40-50
Autor:
Yang, Hejie, Dong, Yiming, Li, Xuewu, Gao, Yimin, He, Weiping, Liu, Yuanhai, Mu, Xianlian, Zhao, Yizhi, Fu, Wei, Wang, Xueliang, Qin, Weichao, Yang, Fan
Publikováno v:
In Ceramics International November 2024
Autor:
Yang, Hejie, Dong, Yiming, Li, Xuewu, Gao, Yimin, He, Weiping, Liu, Yuanhai, Mu, Xianlian, Zhao, Yizhi
Publikováno v:
In Journal of Industrial and Engineering Chemistry September 2024
Autor:
Han, Mengjun, Lan, Di, Zhang, Zhiming, Zhao, Yizhi, Zou, Jiaxiao, Gao, Zhenguo, Wu, Guanglei, Jia, Zirui
Publikováno v:
In Journal of Materials Science & Technology 10 April 2025 214:302-312
Autor:
Zhao, Yizhi
The adversarial wiretap channel (AWTC) model is a secure communication model in which adversary can directly read and write the transmitted bits in legitimate communication with fixed fractions. In this paper we propose a secure polar coding scheme t
Externí odkaz:
http://arxiv.org/abs/2003.00240
Publikováno v:
In Deep-Sea Research Part I December 2023 202