Author of the publication

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.

, , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 320-335. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction., , , , , , and . IGARSS, page 3234-3237. IEEE, (2016)An efficient traceable data sharing scheme in cloud computing for mobile devices., , and . IJHPCN, 12 (2): 156-165 (2018)First-Person Daily Activity Recognition With Manipulated Object Proposals and Non-Linear Feature Fusion., , , , , and . IEEE Trans. Circuits Syst. Video Techn., 28 (10): 2946-2955 (2018)Revisit Multinomial Logistic Regression in Deep Learning: Data Dependent Model Initialization for Image Recognition., , , , , and . CoRR, (2018)Efficient VLR group signatures for smart cards., , and . Int. J. Embed. Syst., 10 (3): 203-216 (2018)On the Index of Necklaces., , , and . Graphs Comb., 26 (2): 163-172 (2010)Publicly verifiable database scheme with efficient keyword search., , , and . Inf. Sci., (2019)Large universe multi-authority attribute-based PHR sharing with user revocation., , , and . Int. J. Comput. Sci. Eng., 19 (3): 376-386 (2019)On the Zero Forcing Number and Spectral Radius of Graphs., , , and . Electron. J. Comb., (2022)Neural networks trained with high-dimensional functions approximation data in high-dimensional space., , , , , , and . J. Intell. Fuzzy Syst., 41 (2): 3739-3750 (2021)