Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BioSAKE: Biometrics-based secure authentication and key exchange.. ICB, page 1-8. IEEE, (2013)Blockchain: From Technology to Marketplaces., , , , and . Computer, 53 (7): 14-18 (2020)Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces., , and . CVPR, page 16469-16478. IEEE, (2023)PPDL - Privacy Preserving Deep Learning Using Homomorphic Encryption., , , , and . COMAD/CODS, page 318-319. ACM, (2022)Optimizing Homomorphic Encryption based Secure Image Analytics., , , , and . MMSP, page 1-6. IEEE, (2021)A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features., and . WACV (Workshops), page 662-671. IEEE, (2023)FeSViBS: Federated Split Learning of Vision Transformer with Block Sampling., , , and . MICCAI (2), volume 14221 of Lecture Notes in Computer Science, page 350-360. Springer, (2023)Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors., , and . CoRR, (2024)Multi-Attribute Vision Transformers are Efficient and Robust Learners., , , and . CoRR, (2024)Introducing SDICE: An Index for Assessing Diversity of Synthetic Medical Datasets., , , , and . CoRR, (2024)