Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combating Insider Threats by User Profiling from Activity Logging Data., and . ICDIS, page 194-199. IEEE, (2018)Exploiting Semantic Segmentation for Robust Camera Motion Classification., , , and . ICIAR, volume 10317 of Lecture Notes in Computer Science, page 173-181. Springer, (2017)Multisource classification using ICM and Dempster-Shafer theory., , , and . IEEE Trans. Instrumentation and Measurement, 51 (2): 277-281 (2002)Application of bootstrap techniques for the estimation of Target Decomposition parameters in RADAR polarimetry., , and . IGARSS, page 2224-2228. IEEE, (2007)Application of evidential reasoning to improve the mapping of regenerating forest stands., , and . Int. J. Appl. Earth Obs. Geoinformation, 13 (3): 458-467 (2011)Deep speckle noise filtering., , , and . IGARSS, page 5311-5314. IEEE, (2017)Deep Image- To-Image Transfer Applied to Resolution Enhancement of Sentinel-2 Images., , , and . IGARSS, page 2611-2614. IEEE, (2018)A New Interferometric Phase Unwrapping Method Based on Energy Minimization from Contextual Modeling., , and . IGARSS, page 1701-1704. IEEE, (2019)CRIM Notebook Paper - TRECVID 2010 Surveillance Event Detection., , and . TRECVID, National Institute of Standards and Technology (NIST), (2010)Optimum Graph Cuts for Pruning Binary Partition Trees of Polarimetric SAR Images., and . IEEE Trans. Geosci. Remote. Sens., 54 (9): 5493-5502 (2016)