Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Simple and Effective Solution for Script Identification in the Wild., , , and . DAS, page 428-433. IEEE Computer Society, (2016)From Strings to Things: Knowledge-Enabled VQA Model That Can Read and Reason., , , and . ICCV, page 4601-4611. IEEE, (2019)Few Shot Speaker Recognition using Deep Neural Networks., , , and . CoRR, (2019)Everything Is in the Name - A URL Based Approach for Phishing Detection., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 231-248. Springer, (2019)A Robust Method to Protect Text Classification Models against Adversarial Attacks., , and . FLAIRS, (2022)Towards a Robust OCR System for Indic Scripts., , , and . Document Analysis Systems, page 141-145. IEEE Computer Society, (2014)A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE., , , , and . CSCML, volume 12161 of Lecture Notes in Computer Science, page 193-218. Springer, (2020)Interpretable and Robust Face Verification., , , and . CIKM Workshops, volume 3052 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Can RNNs reliably separate script and language at word and line level?, and . ICDAR, page 976-980. IEEE Computer Society, (2015)relocated from Tunis, Tunisia.Power and QoS optimization for BLE-based Accessory-Smartphone communications., , and . CCNC, page 394-399. IEEE, (2015)