Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constrained Design of Deep Iris Networks., , and . CoRR, (2019)Investigating Domain Sensitivity of DNN Embeddings for Speaker Recognition Systems., , , and . ICASSP, page 5811-5815. IEEE, (2019)GD-GAN: Generative Adversarial Networks for Trajectory Prediction and Group Detection in Crowds., , , and . ACCV (1), volume 11361 of Lecture Notes in Computer Science, page 314-330. Springer, (2018)Temporarily-Aware Context Modelling using Generative Adversarial Networks for Speech Activity Detection., , , , , and . CoRR, (2020)Automatic surveillance in transportation hubs: No longer just about catching the bad guy., , , , , and . Expert Syst. Appl., 42 (24): 9449-9467 (2015)Fast & Slow Learning: Incorporating Synthetic Gradients in Neural Memory Controllers., , , and . CoRR, (2020)Jointly Trained Conversion Model With LPCNet for Any-to-One Voice Conversion Using Speaker-Independent Linguistic Features., , , and . IEEE Access, (2022)An efficient framework for zero-shot sketch-based image retrieval., , , , and . Pattern Recognit., (2022)Spatio Temporal Feature Evaluation for Action Recognition., , , , and . DICTA, page 1-8. IEEE, (2012)An Evaluation of Different Features and Learning Models for Anomalous Event Detection., , , , and . DICTA, page 1-8. IEEE, (2013)