Author of the publication

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.

, , , , , , and . NeurIPS, page 2085-2096. (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Temporal Coherence for Self-Supervised One-Shot Video Re-identification., and . ECCV (27), volume 12372 of Lecture Notes in Computer Science, page 258-274. Springer, (2020)CMU-UCR-BOSCH @ TRECVID 2017: VIDEO TO TEXT RETRIEVAL., , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2017)Task-agnostic representation learning of multimodal twitter data for downstream applications., , , , and . J. Big Data, 9 (1): 18 (2022)Blackbox Attacks via Surrogate Ensemble Search., , , , and . CoRR, (2022)Decentralized camera network control using game theory., , , and . ICDSC, page 1-8. IEEE, (2008)Human Identification using Gait and Face., , and . CVPR, IEEE Computer Society, (2007)The Function Space of an Activity., and . CVPR (1), page 959-968. IEEE Computer Society, (2006)3D face reconstruction from video using a generic model., , , and . ICME (1), page 449-452. IEEE Computer Society, (2002)Pose and Illumination Invariant Face Recognition in Video., , and . CVPR, IEEE Computer Society, (2007)Generating Diverse Image Datasets with Limited Labeling., , and . ACM Multimedia, page 566-570. ACM, (2016)