These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

98 related articles for article (PubMed ID: 30596570)

  • 1. Group Maximum Differentiation Competition: Model Comparison with Few Samples.
    Ma K; Duanmu Z; Wang Z; Wu Q; Liu W; Yong H; Li H; Zhang L
    IEEE Trans Pattern Anal Mach Intell; 2020 Apr; 42(4):851-864. PubMed ID: 30596570
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Active Fine-Tuning From gMAD Examples Improves Blind Image Quality Assessment.
    Wang Z; Ma K
    IEEE Trans Pattern Anal Mach Intell; 2022 Sep; 44(9):4577-4590. PubMed ID: 33830918
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Maximum differentiation (MAD) competition: a methodology for comparing computational models of perceptual quantities.
    Wang Z; Simoncelli EP
    J Vis; 2008 Sep; 8(12):8.1-13. PubMed ID: 18831621
    [TBL] [Abstract][Full Text] [Related]  

  • 4. dipIQ: Blind Image Quality Assessment by Learning-to-Rank Discriminable Image Pairs.
    Kede Ma ; Wentao Liu ; Tongliang Liu ; Zhou Wang ; Dacheng Tao
    IEEE Trans Image Process; 2017 Aug; 26(8):3951-3964. PubMed ID: 28574353
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Attacker-defender game from a network science perspective.
    Li YP; Tan SY; Deng Y; Wu J
    Chaos; 2018 May; 28(5):051102. PubMed ID: 29857681
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks.
    Lin WS; Zhao HV; Liu KJ
    IEEE Trans Image Process; 2010 Jul; 19(7):1768-84. PubMed ID: 20227979
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Study on a Sequential One-Defender-N-Attacker Game.
    Xu Z; Zhuang J
    Risk Anal; 2019 Jun; 39(6):1414-1432. PubMed ID: 30602071
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
    He X; Yang X; Yu W; Lin J; Yang Q
    Sensors (Basel); 2018 Feb; 18(2):. PubMed ID: 29495291
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Image-Based Reverse Engineering and Visual Prototyping of Woven Cloth.
    Schroder K; Zinke A; Klein R
    IEEE Trans Vis Comput Graph; 2015 Feb; 21(2):188-200. PubMed ID: 26357029
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers.
    Golalikhani M; Zhuang J
    Risk Anal; 2011 Apr; 31(4):533-47. PubMed ID: 21105882
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Randomized Prediction Games for Adversarial Machine Learning.
    Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F
    IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Recurrent and Dynamic Models for Predicting Streaming Video Quality of Experience.
    Bampis CG; Li Z; Katsavounidis I; Bovik AC
    IEEE Trans Image Process; 2018 Jul; 27(7):3316-3331. PubMed ID: 29641409
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Proximity-to-goal as a constraint on patterns of behaviour in attacker-defender dyads in team games.
    Headrick J; Davids K; Renshaw I; Araújo D; Passos P; Fernandes O
    J Sports Sci; 2012; 30(3):247-53. PubMed ID: 22176036
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
    Guan P; Zhuang J
    Risk Anal; 2016 Apr; 36(4):776-91. PubMed ID: 26713543
    [TBL] [Abstract][Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 5.