Author of the publication

Automated detection of smuggled high-risk security threats using deep learning.

, , , and . ICDP, page 1-6. IET / IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Estimation of Error in Voxel-Based Registration., , and . MICCAI (1), volume 3216 of Lecture Notes in Computer Science, page 821-828. Springer, (2004)Automated detection of smuggled high-risk security threats using deep learning., , , and . ICDP, page 1-6. IET / IEEE, (2016)How to Stay Curious while avoiding Noisy TVs using Aleatoric Uncertainty Estimation., , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 15220-15240. PMLR, (2022)The Delaunay/Voronoi Selection Graph: A Method for Extracting Shape Information from 2-D Dot-patterns with an Extension to 3-D., , and . BMVC, page 1-10. BMVA Press, (1992)Zipf's Law in Image Coding Schemes., and . BMVC, page 1-10. British Machine Vision Association, (2007)Warning: Humans Cannot Reliably Detect Speech Deepfakes., , , and . CoRR, (2023)Frequency-Guided Word Substitutions for Detecting Textual Adversarial Examples., , , and . EACL, page 171-186. Association for Computational Linguistics, (2021)Contrasting Human- and Machine-Generated Word-Level Adversarial Examples for Text Classification., , , , and . EMNLP (1), page 8258-8270. Association for Computational Linguistics, (2021)Trainable Segmentation of Phase Contrast Microscopy Images Based on Local Basic Image Features Histograms., , and . MIUA, page 47-52. BMVA, (2014)Camera Model Anonymisation with Augmented cGANs., , and . CoRR, (2020)