These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

120 related articles for article (PubMed ID: 37855475)

  • 1. Optical authentication method based on correspondence ghost imaging.
    Zhang J; Zhao D; Li Y; Liu Y; Sun M; Li X; Yu Z; Zhou X
    Appl Opt; 2023 Oct; 62(29):7678-7688. PubMed ID: 37855475
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Optical cryptosystem based on computational ghost imaging and nonlinear authentication.
    Zhang L; Wang X; Zhou Q; Xue J; Xu B
    Opt Express; 2024 Jan; 32(3):4242-4253. PubMed ID: 38297629
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Object authentication based on compressive ghost imaging.
    Chen Z; Shi J; Zeng G
    Appl Opt; 2016 Oct; 55(30):8644-8650. PubMed ID: 27828147
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.
    Zhou Y; Sun Y; Yang M; Hou J; Xiao Z; Anand A; Sui L
    Heliyon; 2023 Jul; 9(7):e17682. PubMed ID: 37449136
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Experimental demonstration of ghost-imaging-based authentication in scattering media.
    Xiao Y; Zhou L; Chen W
    Opt Express; 2019 Jul; 27(15):20558-20566. PubMed ID: 31510147
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit.
    Chen W; Chen X
    Opt Lett; 2013 Feb; 38(4):546-8. PubMed ID: 23455131
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.
    Zhou Y; Sun Y; Yang M; Zhou B; Hou J; Zeng T; Xiao Z; Sui L
    Opt Express; 2023 Jun; 31(13):20887-20904. PubMed ID: 37381202
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Optical multiple-image authentication method based on Fourier single-pixel imaging and multiple logistic maps.
    Tianyu Z; Liansheng S; Zhaolin X; Yaoling Z
    Opt Express; 2023 Jul; 31(16):26535-26551. PubMed ID: 37710512
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Optical information authentication using phase-only patterns with single-pixel optical detection.
    Xiao Y; Zhou L; Chen W
    Appl Opt; 2021 Apr; 60(10):B1-B7. PubMed ID: 33798130
    [TBL] [Abstract][Full Text] [Related]  

  • 10. High-resolution far-field ghost imaging via sparsity constraint.
    Gong W; Han S
    Sci Rep; 2015 Mar; 5():9280. PubMed ID: 25787897
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.
    Moon I; Yi F; Han M; Lee J
    Appl Opt; 2016 Jun; 55(16):4328-35. PubMed ID: 27411183
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Single-pixel neural network object classification of sub-Nyquist ghost imaging.
    Cao JN; Zuo YH; Wang HH; Feng WD; Yang ZX; Ma J; Du HR; Gao L; Zhang Z
    Appl Opt; 2021 Oct; 60(29):9180-9187. PubMed ID: 34624000
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging.
    Yi F; Jeoung Y; Moon I
    Appl Opt; 2017 May; 56(15):4381-4387. PubMed ID: 29047866
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Sub-Nyquist computational ghost imaging with deep learning.
    Wu H; Wang R; Zhao G; Xiao H; Wang D; Liang J; Tian X; Cheng L; Zhang X
    Opt Express; 2020 Feb; 28(3):3846-3853. PubMed ID: 32122046
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.
    Ye Z; Liu HC; Xiong J
    Opt Express; 2020 Oct; 28(21):31163-31179. PubMed ID: 33115096
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.
    Mishra D
    J Med Syst; 2015 Mar; 39(3):19. PubMed ID: 25651950
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Gradient-Descent-like Ghost Imaging.
    Yu WK; Zhu CX; Li YX; Wang SF; Cao C
    Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833635
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Inverse computational ghost imaging for image encryption.
    Zheng P; Tan Q; Liu HC
    Opt Express; 2021 Jul; 29(14):21290-21299. PubMed ID: 34265919
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Fast high quality computational ghost imaging based on saliency variable sampling detection.
    Liu X; Hu J; Ju M; Wang Y; Han T; Huang J; Zhou C; Zhang Y; Song L
    Sci Rep; 2024 Apr; 14(1):7769. PubMed ID: 38565578
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.
    Wang X; Chen W; Chen X
    Opt Express; 2015 Mar; 23(5):6239-53. PubMed ID: 25836845
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.