Author of the publication

Verification-based pairwise gait identification.

, , and . ICME Workshops, page 669-673. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel method for example-based face super-resolution., , and . ICMCS, page 117-121. IEEE, (2014)Learning Diverse Local Patterns for Deepfake Detection with Image-level Supervision., , , , , and . IJCNN, page 1-7. IEEE, (2021)A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA., , , , , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 507-519. Springer, (2012)Multi-Object Tracking Via Multi-Attention., , , and . IJCNN, page 1-8. IEEE, (2020)Saliency detection using suitable variant of local and global consistency., , , , , , and . IET Comput. Vis., 11 (6): 479-487 (2017)DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment., , , , , , , , , and 15 other author(s). IJCB, page 1-9. IEEE, (2023)Unsupervised Deep Hashing With Deep Semantic Distillation., , , , , , and . ICIP, page 2280-2284. IEEE, (2023)Spermatogonium image recognition using Zernike moments., , , , and . Comput. Methods Programs Biomed., 95 (1): 10-22 (2009)Optimal collusion attack for digital fingerprinting., , , , and . ACM Multimedia, page 767-770. ACM, (2010)Self Residual Attention Network for Deep Face Recognition., , , , , and . IEEE Access, (2019)