Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structure and texture filling-in of missing image blocks in wireless transmission and compression., , and . ICIP (1), page 317-320. IEEE, (2002)Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks., , and . ICIP (1), page 309-312. IEEE, (2002)Secure Biometrics: Concepts, Authentication Architectures and Challenges, , , and . CoRR, (2013)A framework for privacy preserving statistical analysis on distributed databases., , and . WIFS, page 61-66. IEEE, (2012)A Version Space Perspective on Differentially Private Pool-Based Active Learning., and . WIFS, page 1-6. IEEE, (2019)Differential Privacy in Nonlinear Dynamical Systems with Tracking Performance Guarantees., , and . CoRR, (2024)Zero-Query Transfer Attacks on Context-Aware Object Detectors., , , , , , and . CVPR, page 15004-15014. IEEE, (2022)Feature extraction for a Slepian-Wolf biometric system using LDPC codes., , , , and . ISIT, page 2297-2301. IEEE, (2008)Delay-Induced Watermarking for Detection of Replay Attacks in Linear Systems., , , and . CoRR, (2024)Model-Assisted Reinforcement Learning for Online Diagnostics in Stochastic Controlled Systems., , , , and . ICCA, page 338-345. IEEE, (2022)