Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Document Image Binarization from Data., , , and . CoRR, (2015)Robust Appearance Modeling for Pedestrian and Vehicle Tracking., and . CLEAR, volume 4122 of Lecture Notes in Computer Science, page 209-215. Springer, (2006)Explaining Face Presentation Attack Detection Using Natural Language., , , , and . FG, page 1-8. IEEE, (2021)CAT: Controllable Attribute Translation for Fair Facial Attribute Classification., and . ECCV Workshops (8), volume 13808 of Lecture Notes in Computer Science, page 363-381. Springer, (2022)Emergent Asymmetry of Precision and Recall for Measuring Fidelity and Diversity of Generative Models in High Dimensions., and . ICML, volume 202 of Proceedings of Machine Learning Research, page 16326-16343. PMLR, (2023)Partner-Assisted Learning for Few-Shot Image Classification., , , , , and . ICCV, page 10553-10562. IEEE, (2021)Kernel snakes: non-parametric active contour models., , and . SMC, page 240-244. IEEE, (2003)Eye Tracking Using Active Deformable Models., , and . ICVGIP, Allied Publishers Private Limited, (2002)Image-to-GPS Verification Through a Bottom-Up Pattern Matching Network., , , and . ACCV (5), volume 11365 of Lecture Notes in Computer Science, page 546-561. Springer, (2018)BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization., , and . ECCV (6), volume 11210 of Lecture Notes in Computer Science, page 170-186. Springer, (2018)