Author of the publication

Deep and Efficient Impact Models for Edge Characterization and Control of Energy Events.

, , , and . ICPADS, page 639-646. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mafia and distance fraud high-resistance RFID distance bounding protocol., , and . ISCISC, page 67-72. IEEE, (2014)The Role of Permutation Invariance in Linear Mode Connectivity of Neural Networks., , , and . ICLR, OpenReview.net, (2022)The Role of Pre-training Data in Transfer Learning., , , , , and . CoRR, (2023)Deep Neural Network Pruning for Nuclei Instance Segmentation in Hematoxylin and Eosin-Stained Histological Images., , , and . AMAI@MICCAI, volume 13540 of Lecture Notes in Computer Science, page 108-117. Springer, (2022)Scaling Rectified Flow Transformers for High-Resolution Image Synthesis., , , , , , , , , and 4 other author(s). ICML, OpenReview.net, (2024)Studying the impact of magnitude pruning on contrastive learning methods., , , , and . CoRR, (2022)PhD Forum Abstract: Understanding Deep Model Compression for IoT Devices.. IPSN, page 385-386. IEEE, (2020)AVID: Adversarial Visual Irregularity Detection., , , , , , and . ACCV (6), volume 11366 of Lecture Notes in Computer Science, page 488-505. Springer, (2018)Unlocking Intrinsic Fairness in Stable Diffusion., , , and . CoRR, (2024)RFID unilateral distance bounding protocols: A trade-off between mafia and distance fraud., , and . Comput. Commun., (2017)