Author of the publication

Proxy Embeddings for Face Identification among Multi-Pose Templates.

, and . VISIGRAPP (5: VISAPP), page 513-520. SCITEPRESS, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Forgery Features Idea: A Solution for User-Adjusted Threshold in Signature Verification., and . Trans. Comput. Collect. Intell., (2013)An Ear Anti-Spoofing Database with Various Attacks., and . ICCST, page 1-5. IEEE, (2018)Dynamic Programming with ARMA, Markov, and NARMA Models vs. Q-Learning: Case Study., , and . IJCNN (3), page 265-272. IEEE Computer Society, (2000)0-7695-0619-4.Detecting sexually explicit content in the context of the child sexual abuse materials (CSAM): end-to-end classifiers and region-based networks., , and . CoRR, (2024)Face and silhouette based age estimation for child detection system., , and . FedCSIS (Communication Papers), volume 32 of Annals of Computer Science and Information Systems, page 39-43. (2022)Proxy Embeddings for Face Identification among Multi-Pose Templates., and . VISIGRAPP (5: VISAPP), page 513-520. SCITEPRESS, (2020)Unconstrained biometrie recognition based on thermal hand images., , , and . IWBF, page 1-8. IEEE, (2018)Neighbourhood approach to bisimulation in state abstraction for quantized domains., and . MMAR, page 566-571. IEEE, (2014)Iris recognition with match-on-card., , , and . EUSIPCO, page 189-192. IEEE, (2007)TCP Modification Robust to Packet Reordering in Ant Routing Networks., and . EvoApplications (2), volume 6025 of Lecture Notes in Computer Science, page 71-80. Springer, (2010)