Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of a secure TLS coprocessor on an FPGA., and . Microprocess. Microsystems, (2016)Exploring perceptual straightness in learned visual representations., , , , , , and . ICLR, OpenReview.net, (2023)Unsupervised Semantic Segmentation by Distilling Feature Correspondences., , , , and . ICLR, OpenReview.net, (2022)Remote Tiny Weeds Detection., , , , , , and . PSIVT, volume 13763 of Lecture Notes in Computer Science, page 159-171. Springer, (2022)Semi-Supervised Translation with MMD Networks.. CoRR, (2018)A Hardware Wrapper for the SHA-3 Hash Algorithms., , , , , , and . IACR Cryptology ePrint Archive, (2010)MultiEarth 2022 - Multimodal Learning for Earth and Environment Workshop and Challenge., , , , , , , , , and 3 other author(s). CoRR, (2022)Exploring Gender and Race Biases in the NFT Market., and . CoRR, (2023)MosAIc: Finding Artistic Connections across Culture with Conditional Image Retrieval., , , , , , , , , and 2 other author(s). NeurIPS (Competition and Demos), volume 133 of Proceedings of Machine Learning Research, page 133-155. PMLR, (2020)FPGA Implementation of an Elliptic Curve Processor Using the GLV Method., and . ReConFig, page 249-254. IEEE Computer Society, (2009)