Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dempster-Shafer theory based witness trustworthiness model to cope with unfair ratings in e-marketplace., , , and . ICEC, page 99-106. ACM, (2012)CRRN: Multi-Scale Guided Concurrent Reflection Removal Network., , , , and . CVPR, page 4777-4785. Computer Vision Foundation / IEEE Computer Society, (2018)Domain Generalization With Adversarial Feature Learning., , , and . CVPR, page 5400-5409. Computer Vision Foundation / IEEE Computer Society, (2018)Image splicing localization based on blur type inconsistency., and . ISCAS, page 1042-1045. IEEE, (2015)iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems., , , , and . AAMAS, page 1151-1152. IFAAMAS, (2011)Secure data hiding in binary document images for authentication., , and . ISCAS (3), page 806-809. IEEE, (2003)Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity., and . IEEE Trans. Image Processing, 16 (6): 1691-1695 (2007)Street-to-shop shoe retrieval with multi-scale viewpoint invariant triplet network., , and . ICIP, page 1102-1106. IEEE, (2017)Interaction Recognition Through Body Parts Relation Reasoning., , and . ACPR (1), volume 12046 of Lecture Notes in Computer Science, page 268-280. Springer, (2019)Learning to Jointly Generate and Separate Reflections., , , , and . ICCV, page 2444-2452. IEEE, (2019)