Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatio-temporal predictive tasks for abnormal event detection in videos., , , , and . AVSS, page 1-8. IEEE, (2022)A formal approach to good practices in Pseudo-Labeling for Unsupervised Domain Adaptive Re-Identification., , , , and . Comput. Vis. Image Underst., (2022)BrightFlow: Brightness-Change-Aware Unsupervised Learning of Optical Flow., , , and . WACV, page 2060-2069. IEEE, (2023)Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks., , and . CVPR Workshops, page 3450-3459. Computer Vision Foundation / IEEE, (2020)Improving Few-Shot Learning Through Multi-task Representation Learning Theory., , , , and . ECCV (20), volume 13680 of Lecture Notes in Computer Science, page 435-452. Springer, (2022)Object-Centric and Memory-Guided Normality Reconstruction for Video Anomaly Detection., , , , , and . ICIP, page 2691-2695. IEEE, (2022)Towards Few-Annotation Learning for Object Detection: Are Transformer-based Models More Efficient?, , , and . WACV, page 75-84. IEEE, (2023)Proposal-Contrastive Pretraining for Object Detection from Fewer Data., , , and . ICLR, OpenReview.net, (2023)Optimal Transport as a Defense Against Adversarial Attacks., , and . ICPR, page 5044-5051. IEEE, (2020)PaDiM: A Patch Distribution Modeling Framework for Anomaly Detection and Localization., , , and . ICPR Workshops (4), volume 12664 of Lecture Notes in Computer Science, page 475-489. Springer, (2020)