Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security architectures and analysis for content adaptation., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 84-95. SPIE, (2005)Real Time Multimedia., and . Encyclopedia of Multimedia, Springer, (2008)Quality-Gated Convolutional Lstm for Enhancing Compressed Video., , , and . ICME, page 532-537. IEEE, (2019)GLSNet: Global and Local Streams Network for 3D Point Cloud Classification., , , , and . AIPR, page 1-9. IEEE, (2019)Content-Aware Personalised Rate Adaptation for Adaptive Streaming via Deep Video Analysis., , , , and . ICC, page 1-8. IEEE, (2019)STC-Flow: Spatio-temporal Context-aware Optical Flow Estimation., , , , , and . CoRR, (2020)Compressive hyperspectral imaging with complementary RGB measurements., , , , and . VCIP, page 1-4. IEEE, (2016)A Multi-band Wavelet Watermarking Scheme., , and . Int. J. Netw. Secur., 6 (2): 121-126 (2008)An efficient print-scanning resilient data hiding scheme based on a novel LPM., , , and . ICIP, page 2080-2083. IEEE, (2008)Multi-Modality Multi-Task Recurrent Neural Network for Online Action Detection., , , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (9): 2667-2682 (2019)