Author of the publication

Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machines.

, , , , , and . ICCST, page 1-7. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated detection of smuggled high-risk security threats using deep learning., , , and . ICDP, page 1-6. IET / IEEE, (2016)Automatic Estimation of Error in Voxel-Based Registration., , and . MICCAI (1), volume 3216 of Lecture Notes in Computer Science, page 821-828. Springer, (2004)The Delaunay/Voronoi Selection Graph: A Method for Extracting Shape Information from 2-D Dot-patterns with an Extension to 3-D., , and . BMVC, page 1-10. BMVA Press, (1992)How to Stay Curious while avoiding Noisy TVs using Aleatoric Uncertainty Estimation., , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 15220-15240. PMLR, (2022)Camera Model Anonymisation with Augmented cGANs., , and . CoRR, (2020)Zipf's Law in Image Coding Schemes., and . BMVC, page 1-10. British Machine Vision Association, (2007)Model-Based Recognition of Anatomical Objects from Medical Images., , and . IPMI, volume 687 of Lecture Notes in Computer Science, page 197-211. Springer, (1993)Warning: Humans Cannot Reliably Detect Speech Deepfakes., , , and . CoRR, (2023)Features in Scale Space: Progress on the 2D 2nd Order Jet., and . Scale-Space, volume 2106 of Lecture Notes in Computer Science, page 51-62. Springer, (2001)Multi-channel Mutual Information Using Scale Space., , , and . MICCAI (1), volume 3216 of Lecture Notes in Computer Science, page 797-804. Springer, (2004)