Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Son of Zorn's lemma: Targeted style transfer using instance-aware semantic segmentation., , , , , and . ICASSP, page 1348-1352. IEEE, (2017)New methods for handling binary constraints., , , and . Allerton, page 1074-1080. IEEE, (2016)Improved Training of Deep Networks for Computer Vision.. University of Maryland, College Park, MD, USA, (2021)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/28870).Stabilizing Adversarial Nets With Prediction Methods., , , , and . CoRR, (2017)Biconvex Relaxation for Semidefinite Programming in Computer Vision., , , , and . CoRR, (2016)Biconvex Relaxation for Semidefinite Programming in Computer Vision., , , , , and . ECCV (6), volume 9910 of Lecture Notes in Computer Science, page 717-735. Springer, (2016)Maximum Entropy Model Based Classification with Feature Selection., , and . ICPR, page 565-568. IEEE Computer Society, (2010)Stabilizing Adversarial Nets with Prediction Methods., , , , and . ICLR (Poster), OpenReview.net, (2018)Making L-BFGS Work with Industrial-Strength Nets., , and . BMVC, BMVA Press, (2020)SMART CONTRACTS Based Peer to Peer Communication in Blockchain: A Decentralized Approach., , , and . COMPLEX NETWORKS (2), volume 1142 of Studies in Computational Intelligence, page 373-382. Springer, (2023)