Author of the publication

Viewpoint Disentangling and Generation for Unsupervised Object Re-ID.

, , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 20 (5): 141:1-141:23 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self Residual Attention Network for Deep Face Recognition., , , , , and . IEEE Access, (2019)Optimal collusion attack for digital fingerprinting., , , , and . ACM Multimedia, page 767-770. ACM, (2010)A collusion attack optimization framework toward spread-spectrum fingerprinting., , , , , and . Appl. Soft Comput., 13 (8): 3482-3493 (2013)Spermatogonium image recognition using Zernike moments., , , , and . Comput. Methods Programs Biomed., 95 (1): 10-22 (2009)Saliency prediction by Mahalanobis distance of topological feature on deep color components., , , , , , and . J. Vis. Commun. Image Represent., (2019)Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions., , , and . IEEE Multim., 19 (1): 70-79 (2012)Improving the JPEG-resistance of Adversarial Attacks on Face Recognition by Interpolation Smoothing., , , , and . CoRR, (2024)Saliency detection using suitable variant of local and global consistency., , , , , , and . IET Comput. Vis., 11 (6): 479-487 (2017)Hierarchical deep semantic hashing for fast image retrieval., , , and . Multim. Tools Appl., 76 (20): 21281-21302 (2017)A Novel Gray Image Watermarking Scheme., , , and . J. Softw., 6 (5): 849-856 (2011)