Author of the publication

Theoretical Insights into the Use of Structural Similarity Index in Generative Models and Inferential Autoencoders.

, , and . ICIAR (2), volume 12132 of Lecture Notes in Computer Science, page 112-117. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An integrated approach for Fuzzy Multi-entity Bayesian Networks and semantic analysis for soft and hard data fusion., , and . FUZZ-IEEE, page 1-8. IEEE, (2015)Market-Based Framework for Mobile Surveillance Systems., , and . AIS, volume 7326 of Lecture Notes in Computer Science, page 69-78. Springer, (2012)Vehicular Ad-hoc Networks(VANETs): Capabilities, Challenges in Information Gathering and Data Fusion., , , , , , and . AIS, volume 7326 of Lecture Notes in Computer Science, page 34-41. Springer, (2012)Learning-based resource optimization in asynchronous transfer mode (ATM) networks., , and . IEEE Trans. Syst. Man Cybern. Part B, 33 (1): 122-132 (2003)Enhancing Driver Distraction Recognition Using Generative Adversarial Networks., and . IEEE Trans. Intell. Veh., 5 (3): 385-396 (2020)An Intelligent Decision-Making System Based on Multiple Classifiers updated Using confidence Rates and stress parameters., , , and . Control. Intell. Syst., (2011)Minimizing variance of reservoir systems operations benefits using soft computing tools., , and . Fuzzy Sets Syst., 139 (2): 451-461 (2003)Integrating visual exploration and visual search in robotic visual attention: The role of human-robot interaction., and . ICRA, page 3822-3827. IEEE, (2011)Design and FPGA Implementation of a Fuzzy-PI Controller for Omnidirectional Robot System., , , , and . RiTA, volume 447 of Advances in Intelligent Systems and Computing, page 141-152. Springer, (2015)A Survey on Securing 6G Wireless Communications based Optimization Techniques., , , , , and . IWCMC, page 216-223. IEEE, (2023)