Author of the publication

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes.

, , , , , , and . ICCV, page 7838-7847. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Camera Networks., , , , and . IEEE Signal Process. Mag., 28 (3): 20-31 (2011)Pose and Illumination Invariant Face Recognition in Video., , and . CVPR, IEEE Computer Society, (2007)Human Identification using Gait and Face., , and . CVPR, IEEE Computer Society, (2007)The Function Space of an Activity., and . CVPR (1), page 959-968. IEEE Computer Society, (2006)3D face reconstruction from video using a generic model., , , and . ICME (1), page 449-452. IEEE Computer Society, (2002)Exploiting Temporal Coherence for Self-Supervised One-Shot Video Re-identification., and . ECCV (27), volume 12372 of Lecture Notes in Computer Science, page 258-274. Springer, (2020)CMU-UCR-BOSCH @ TRECVID 2017: VIDEO TO TEXT RETRIEVAL., , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2017)Heterogeneous Acceleration of HAR Applications., , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (3): 888-902 (2020)Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks., , , , , and . CoRR, (2022)MeTA: Multi-source Test Time Adaptation., , , , and . CoRR, (2024)