Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The cost of JPEG compression anti-forensics., , and . ICASSP, page 1884-1887. IEEE, (2011)Optical Flow Estimation Using Genetic Algorithms.. WILF, volume 2955 of Lecture Notes in Computer Science, page 309-316. Springer, (2003)SnowWatch: Snow Monitoring through Acquisition and Analysis of User-Generated Content., , , and . CoRR, (2015)Attacking image classification based on bag-of-visual-words., , , , , and . WIFS, page 103-108. IEEE, (2013)Joint Compressive Video Coding and Analysis., , , and . IEEE Trans. Multim., 12 (3): 168-183 (2010)SPICE: Self-supervised Pitch Estimation, , , , , and . (2019)Genomic Annotation Prediction Based on Integrated Information., , and . CIBB, volume 7548 of Lecture Notes in Computer Science, page 238-252. Springer, (2011)Video Coding with Wavelet-Domain Conditional Replenishment and Unequal Error Protection., , and . ICIP, page 1869-1872. IEEE, (2006)Localization of sparse image tampering via random projections., , and . ICIP, page 2092-2095. IEEE, (2008)Multi-Clue Image Tampering Localization., , , , and . WIFS, page 125-130. IEEE, (2014)