Wenting Huang

According to our database1, Wenting Huang authored at least 13 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Registration-enhanced multiple instance learning for cervical cancer whole slide image classification.
Int. J. Imaging Syst. Technol., January, 2024

2023
CrMP-Sol database: classification, bioinformatic analyses and comparison of cancer-related membrane proteins and their water-soluble variant designs.
BMC Bioinform., December, 2023

End-to-end affine registration framework for histopathological images with weak annotations.
Comput. Methods Programs Biomed., November, 2023

Unsupervised domain adaptive tumor region recognition for Ki67 automated assisted quantification.
Int. J. Comput. Assist. Radiol. Surg., April, 2023

Expression site agnostic histopathology image segmentation framework by self supervised domain adaption.
Comput. Biol. Medicine, 2023

Fitness-based mobility enhances the maintenance of biodiversity in the spatial system of cyclic competition.
Appl. Math. Comput., 2023

2021
Reconfigurable Intelligent Surface-Enhanced Broadband OFDM Communication Based on Deep Reinforcement Learning.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

2020
Prediction model of the response to neoadjuvant chemotherapy in breast cancers by a Naive Bayes algorithm.
Comput. Methods Programs Biomed., 2020

2016
Have we underestimated the power of image undistortion?
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Learning Similarity with Probabilistic Latent Semantic Analysis for Image Retrieval.
KSII Trans. Internet Inf. Syst., 2015

Effective deployment of monitoring points on social networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
DNFStore: A Distributed Netflow Storage System Supports Fast Retrieval.
Proceedings of the Web Technologies and Applications, 2014

2012
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012


  Loading...