Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-based Encryption Applied to Data Leakage Prevention Solutions., , , , , and . SECRYPT, page 566-571. SciTePress, (2017)3DSliceLeNet: Recognizing 3D Objects Using a Slice-Representation., , , , , and . IEEE Access, (2022)A Visually Plausible Grasping System for Object Manipulation and Interaction in Virtual Reality Environments., , , , , and . CoRR, (2019)A long short-term memory based Schaeffer gesture recognition system., , , , and . Expert Syst. J. Knowl. Eng., (2018)The RobotriX: An Extremely Photorealistic and Very-Large-Scale Indoor Dataset of Sequences with Robot Trajectories and Interactions., , , , , , and . IROS, page 6790-6797. IEEE, (2018)PointNet: A 3D Convolutional Neural Network for real-time object class recognition., , , , , and . IJCNN, page 1578-1584. IEEE, (2016)A recurrent neural network based Schaeffer gesture recognition system., , , , and . IJCNN, page 425-431. IEEE, (2017)Multi-sensor 3D object dataset for object recognition with full pose estimation., , , , , , and . Neural Comput. Appl., 28 (5): 941-952 (2017)UA at SemEval-2019 Task 5: Setting A Strong Linear Baseline for Hate Speech Detection., , , , and . SemEval@NAACL-HLT, page 508-513. Association for Computational Linguistics, (2019)H-GAN: the power of GANs in your Hands., , , , , , , , , and . IJCNN, page 1-8. IEEE, (2021)