Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Method to Protect Text Classification Models against Adversarial Attacks., , and . FLAIRS, (2022)Few Shot Speaker Recognition using Deep Neural Networks., , , and . CoRR, (2019)Everything Is in the Name - A URL Based Approach for Phishing Detection., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 231-248. Springer, (2019)Towards a Robust OCR System for Indic Scripts., , , and . Document Analysis Systems, page 141-145. IEEE Computer Society, (2014)From Strings to Things: Knowledge-Enabled VQA Model That Can Read and Reason., , , and . ICCV, page 4601-4611. IEEE, (2019)A Simple and Effective Solution for Script Identification in the Wild., , , and . DAS, page 428-433. IEEE Computer Society, (2016)A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE., , , , and . CSCML, volume 12161 of Lecture Notes in Computer Science, page 193-218. Springer, (2020)Interpretable and Robust Face Verification., , , and . CIKM Workshops, volume 3052 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Can RNNs reliably separate script and language at word and line level?, and . ICDAR, page 976-980. IEEE Computer Society, (2015)relocated from Tunis, Tunisia.No Size Fits All: The Perils and Pitfalls of Leveraging LLMs Vary with Company Size., , , , and . CoRR, (2024)