Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bitstream Organization for Parallel Entropy Coding on Neural Network-based Video Codecs., , and . ISM, page 1-9. IEEE, (2023)Identification Rate, Search and Memory Complexity Tradeoff: Fundamental Limits., and . IEEE Trans. Inf. Theory, 62 (11): 6173-6188 (2016)Statistical analysis of digital image fingerprinting based on random projections., , , , and . ISPA, page 200-205. IEEE, (2011)Privacy amplification of content identification systems based on fingerprint bit reliability., , , , and . WIFS, page 1-6. IEEE, (2010)On accuracy, robustness, and security of bag-of-word search systems., , , , and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 902807. SPIE, (2014)Fundamental limits of identification: Identification rate, search and memory complexity trade-off., , and . ISIT, page 1252-1256. IEEE, (2013)Low-Latency Neural Stereo Streaming., , , , and . CoRR, (2024)Information-theoretic analysis of identification systems in large-scale databases.. University of Geneva, Switzerland, (2014)base-search.net (ftunivgeneve:oai:unige.ch:aou:unige:34300).Active content fingerprinting: A marriage of digital watermarking and content fingerprinting., , , and . WIFS, page 175-180. IEEE, (2012)Information-theoretical limits of active content fingerprinting in content-based identification systems., , and . WIFS, page 1-6. IEEE, (2015)