Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Confidence Interval for the Mean of a Bounded Random Variable., and . CoRR, (2019)Self-Supervised Relative Depth Learning for Urban Scene Understanding., , , , and . ECCV (11), volume 11215 of Lecture Notes in Computer Science, page 20-37. Springer, (2018)Forensic Triage for Mobile Phones with DEC0DE., , and . USENIX Security Symposium, USENIX Association, (2011)Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet., , , , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 103-122. Springer, (2013)EVAL: Explainable Video Anomaly Localization., , and . CVPR, page 18717-18726. IEEE, (2023)Mod-Squad: Designing Mixtures of Experts As Modular Multi-Task Learners., , , , , , and . CVPR, page 11828-11837. IEEE, (2023)Active Bias: Training More Accurate Neural Networks by Emphasizing High Variance Samples., , and . NIPS, page 1002-1012. (2017)Machine Learning for Automated Mitral Regurgitation Detection from Cardiac Imaging., , , , and . MICCAI (7), volume 14226 of Lecture Notes in Computer Science, page 236-246. Springer, (2023)The Aspect Transition Graph: An Affordance-Based Model., , , and . ECCV Workshops (2), volume 8926 of Lecture Notes in Computer Science, page 459-465. Springer, (2014)Fast Lexicon-Based Scene Text Recognition with Sparse Belief Propagation., , and . ICDAR, page 979-983. IEEE Computer Society, (2007)