Author of the publication

Event Anonymization: Privacy-Preserving Person Re-Identification and Pose Estimation in Event-Based Vision.

, , and . IEEE Access, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN., , , , , and . IEEE Access, (2021)Customer Analysis Using Machine Learning-Based Classification Algorithms for Effective Segmentation Using Recency, Frequency, Monetary, and Time., , , , , , , and . Sensors, 23 (6): 3180 (March 2023)An enhanced pattern detection and segmentation of brain tumors in MRI images using deep learning technique., , , , , , , , , and . Frontiers Comput. Neurosci., (2024)Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia., , and . ITNG, page 590-595. IEEE Computer Society, (2013)Process Capability for a Non-Normal Quality Characteristics Data., , and . ITNG, page 420-424. IEEE Computer Society, (2007)Process Capability Analysis for a Skewed Population Data., , and . IKE, page 327-333. CSREA Press, (2007)Non-Normal Process Capability Evaluation., , and . IKE, page 321-326. CSREA Press, (2007)Toward Dynamic Resources Management for IoT-Based Manufacturing., , , , , , and . IEEE Commun. Mag., 56 (2): 52-59 (2018)Numerical Treatment of Non-Linear System for Latently Infected CD4+T Cells: A Swarm- Optimized Neural Network Approach., , , , , and . IEEE Access, (2024)Process Performance Evaluation Using Evolutionary Algorithm., , , , and . IKE, page 731-737. CSREA Press, (2009)