Author of the publication

Towards privacy-preserving activity recognition using extremely low temporal and spatial resolution cameras.

, , , , and . CVPR Workshops, page 68-76. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attention-Guided Multitask Convolutional Neural Network for Power Line Parts Detection., , , , , , , and . IEEE Trans. Instrum. Meas., (2022)Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey., , , , and . IEEE Trans. Biom. Behav. Identity Sci., 1 (1): 5-31 (2019)Innovative Audio Mosaic Technique by Permutations., , , , , and . BMSB, page 1-5. IEEE, (2020)L2-Constrained RemNet for Camera Model Identification and Image Manipulation Detection., , and . ECCV Workshops (4), volume 12538 of Lecture Notes in Computer Science, page 267-282. Springer, (2020)Towards privacy-preserving recognition of human activities., , , , and . ICIP, page 4238-4242. IEEE, (2015)Semi-Coupled Two-Stream Fusion ConvNets for Action Recognition at Extremely Low Resolutions., , , and . WACV, page 139-147. IEEE Computer Society, (2017)Lung Cancer Tumor Region Segmentation Using Recurrent 3D-DenseUNet., , , , and . TIA@MICCAI, volume 12502 of Lecture Notes in Computer Science, page 36-47. Springer, (2020)Semi-Coupled Two-Stream Fusion ConvNets for Action Recognition at Extremely Low Resolutions., , , and . CoRR, (2016)Dynamic time warping for gesture-based user identification and authentication with Kinect., , and . ICASSP, page 2371-2375. IEEE, (2013)Novel Efficient Coding Scheme for Data-Rate Limited Journey-Aware Graph-Data Transmission., , , , , and . BMSB, page 1-8. IEEE, (2019)