Author of the publication

DEICTIC: A compositional and declarative gesture description based on hidden markov models.

, , , and . Int. J. Hum. Comput. Stud., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism., , and . ERCIM News, (2015)A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 540-550. Springer, (2015)Image Recognition by Integration of Connectionist and Symbolic Approaches., , and . IJPRAI, 9 (3): 485-515 (1995)Multiple Classifier Systems.. Encyclopedia of Biometrics, Springer US, (2009)Evasion attacks against machine learning at test time, , , , , , , and . Joint European Conference on Machine Learning and Knowledge Discovery in Databases, page 387--402. Springer, (2013)Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?, , , , , , and . CoRR, (2020)Multimodal fingerprint verification by score-level fusion: An experimental investigation., , and . J. Intell. Fuzzy Syst., 24 (1): 51-60 (2013)Critical analysis of adaptive biometric systems., , and . IET Biom., 1 (4): 179-187 (2012)Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection., , , , , and . ACM Trans. Priv. Secur., 24 (4): 27:1-27:31 (2021)ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches., , , , , , and . CoRR, (2022)