Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training convolutional neural networks for semantic classification of remote sensing imagery., , , and . JURSE, page 1-4. IEEE, (2017)Reconstruction of Car Crash Scenes Using a 3D Building and Query Algebra., , , and . SITIS, page 891-897. IEEE Computer Society, (2012)ECG databases for biometric systems: A systematic review., , , and . Expert Syst. Appl., (2017)A Multi-expert System for Movie Segmentation., , , , and . Multiple Classifier Systems, volume 2364 of Lecture Notes in Computer Science, page 304-313. Springer, (2002)Combining Syntactic and Semantic Vector Space Models in the Health Domain by using a Clustering Ensemble., , , , and . HEALTHINF, page 382-385. SciTePress, (2013)A Comparison of Unsupervised Shot Classification Algorithms for News Video Segmentation., , , and . SSPR/SPR, volume 3138 of Lecture Notes in Computer Science, page 233-241. Springer, (2004)A Multi-stage Approach for Anchor Shot Detection., , , , and . SSPR/SPR, volume 4109 of Lecture Notes in Computer Science, page 773-782. Springer, (2006)An Investigation of Local Descriptors for Biometric Spoofing Detection., , , and . IEEE Trans. Inf. Forensics Secur., 10 (4): 849-863 (2015)Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Information fusion for computer security: State of the art and open issues., , , , and . Inf. Fusion, 10 (4): 274-284 (2009)