Author of the publication

Approximations to the Fisher Information Metric of Deep Generative Models for Out-Of-Distribution Detection.

, , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realistic Generation and Real Time Animation of Images of the Human Colon., , and . Comput. Graph. Forum, 11 (3): 367-379 (1992)Pre-architectural performance estimation for ASIP design based on abstract processor models., , , , and . ICSAMOS, page 133-140. IEEE, (2014)The Challenge of Access Control Policies Quality., , , , and . ACM J. Data Inf. Qual., 10 (2): 6:1-6:6 (2018)Dual-pairing summation by parts finite difference methods for large scale elastic wave simulations in 3D complex geometries., , and . J. Comput. Phys., (2022)Reconfiguration in Source-Synchronous Receivers for Short-Reach Parallel Optical Links., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (7): 1548-1560 (2019)ProFact: A Provenance-Based Analytics Framework for Access Control Policies., , , , , , and . IEEE Trans. Serv. Comput., 14 (6): 1914-1928 (2021)Correction to: Toward online layer-wise surface morphology measurement in additive manufacturing using a deep learning-based approach., , , , , , and . J. Intell. Manuf., 34 (6): 2691 (August 2023)MIDP 2.0 changing the face of J2ME gaming., and . ACM Southeast Regional Conference, page 37-41. ACM, (2004)Linking Twitter Sentiment and Event Data to Monitor Public Opinion of Geopolitical Developments and Trends., , , , , and . SBP-BRiMS, volume 10354 of Lecture Notes in Computer Science, page 223-229. Springer, (2017)Assessing system of systems information security risk with OASoSIS., , , and . Comput. Secur., (2022)