Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meat adulteration detection through digital image analysis of histological cuts using LBP., , and . CoRR, (2016)The SWAX Benchmark: Attacking Biometric Systems with Wax Figures., , and . CoRR, (2019)Cycleptz: The Learning-Based Control Method For Master-Slave Camera Systems., , , and . ICIP, page 286-290. IEEE, (2020)An Adaptive Vehicle License Plate Detection at Higher Matching Degree., , , and . CIARP, volume 8827 of Lecture Notes in Computer Science, page 454-461. Springer, (2014)A mid-level video representation based on binary descriptors: A case study for pornography detection., , , , and . Neurocomputing, (2016)An Introduction to Deep Morphological Networks., , , , and . CoRR, (2019)A verify-correct approach to person re-identification based on Partial Least Squares signatures., , and . ICB, page 222-228. IEEE, (2015)CBRA: Color-based ranking aggregation for person re-identification., and . ICIP, page 1975-1979. IEEE, (2015)Novel Anomalous Event Detection based on Human-object Interactions., , , , and . VISIGRAPP (5: VISAPP), page 293-300. SciTePress, (2018)Histograms of Optical Flow Orientation and Magnitude and Entropy to Detect Anomalous Events in Videos., , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (3): 673-682 (2017)