Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subspace Modeling for Fast Out-Of-Distribution and Anomaly Detection., , and . ICIP, page 3041-3045. IEEE, (2022)A Low-Complexity Approach to Rate-Distortion Optimized Variable Bit-Rate Compression for Split DNN Computing., , , and . ICPR, page 182-188. IEEE, (2022)Deep Probabilistic Models to Detect Data Poisoning Attacks., , , , and . CoRR, (2019)Modeling and analysis of traffic characteristics in IEEE 802.11 MAC based networks., and . GLOBECOM, page 67-71. IEEE, (2002)LT-TCP: End-to-End Framework to Improve TCP Performance over Networks with Lossy Channels., , , and . IWQoS, volume 3552 of Lecture Notes in Computer Science, page 81-93. Springer, (2005)Data augmentation to improve robustness of image captioning solutions., , and . CoRR, (2021)Compression without Compromise: Optimizing Point Cloud Object Detection with Bottleneck Architectures For Split Computing., , and . ICME Workshops, page 1-6. IEEE, (2024)Towards intuitive rigid-body physics through parameter search., , and . Humanoids, page 803-810. IEEE, (2017)A Greedy Part Assignment Algorithm for Real-time Multi-person 2D Pose Estimation., , and . CoRR, (2017)Efficient path aggregation and error control for video streaming., , and . ICIP, page 3137-3140. IEEE, (2004)