Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lighting Alignment for Image Sequences., , , and . ICIG (2), volume 9218 of Lecture Notes in Computer Science, page 462-474. Springer, (2015)Shadow Detection based on Colour Segmentation and Estimated Illumination., , and . BMVC, page 1-11. BMVA Press, (2011)Backward-Forward Combined Convolutive Blind Source Separation., , , and . ISDA (3), page 222-227. IEEE Computer Society, (2008)A New Database for Evaluating Underwater Image Processing Methods., , , , , and . IPTA, page 1-6. IEEE, (2018)Vulnerable point detection and repair against adversarial attacks for convolutional neural networks., , , , , and . Int. J. Mach. Learn. Cybern., 14 (12): 4163-4192 (December 2023)Non-Local Color Compensation Network for Intrinsic Image Decomposition., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (1): 132-145 (2023)Shadow Detection and Removal Based on Multi-task Generative Adversarial Networks., , , , and . ICIG (3), volume 12890 of Lecture Notes in Computer Science, page 366-376. Springer, (2021)Correlation-Based Intrinsic Image Extraction from a Single Image., , and . ECCV (4), volume 6314 of Lecture Notes in Computer Science, page 58-71. Springer, (2010)A Novel Immune Quantum-Inspired Genetic Algorithm., , , , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 215-218. Springer, (2005)3D face mask presentation attack detection based on intrinsic image analysis., , , , , and . IET Biom., 9 (3): 100-108 (2020)