From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blazingly fast image copyright enforcement., , , и . ACM Multimedia, стр. 489-490. ACM, (2006)Scalability of local image descriptors: a comparative study., , , и . ACM Multimedia, стр. 589-598. ACM, (2006)Exquisitor: Interactive Learning at Large., , , , , , , , и . CoRR, (2019)Parallelization of a Hierarchical Data Clustering Algorithm Using OpenMP., и . IWOMP, том 4315 из Lecture Notes in Computer Science, стр. 289-299. Springer, (2006)Videntifier: identifying pirated videos in real-time., , , , и . ACM Multimedia, стр. 471-472. ACM, (2007)Pixel Privacy: Quality Camouflage for Social Images., , , и . MediaEval, том 2882 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)The Eff2 Image Retrieval System Prototype., , , и . Databases and Applications, стр. 228-233. IASTED/ACTA Press, (2005)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , и . CoRR, (2023)NV-Tree: An Efficient Disk-Based Index for Approximate Search in Very Large High-Dimensional Collections., , , и . IEEE Trans. Pattern Anal. Mach. Intell., 31 (5): 869-883 (2009)Walking on the Edge: Fast, Low-Distortion Adversarial Examples., , , и . IEEE Trans. Inf. Forensics Secur., (2021)