Author of the publication

Impacts of Synthetically Generated Data on Trackformer-based Multi-Object Tracking.

, , , , and . AIPR, page 1-7. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Business Analytics Strategy on Social, Mobile, and Cloud Computing Adoption., , , and . ICIS, Association for Information Systems, (2014)WATTR: a method for self-powered wireless sensing of water activity in the home., , , , and . UbiComp, page 169-172. ACM, (2010)Keyboard Snooping from Mobile Phone Arrays with Mixed Convolutional and Recurrent Neural Networks., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (2): 45:1-45:22 (2019)Most apparent distortion: full-reference image quality assessment and the role of strategy., and . J. Electronic Imaging, 19 (1): 011006 (2010)Implicit-descriptor ligand-based virtual screening by means of collaborative filtering., , and . J. Cheminformatics, 10 (1): 56:1-56:20 (2018)LAST: Latent Space-Assisted Adaptive Sampling for Protein Trajectories., , , , , and . J. Chem. Inf. Model., 63 (1): 67-75 (2023)Objective Measures of Cognitive Load Using Deep Multi-Modal Learning: A Use-Case in Aviation., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (1): 40:1-40:35 (2021)CNN-Assisted Steganography - Integrating Machine Learning with Established Steganographic Techniques., , , and . CoRR, (2023)A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks., , , , , , , and . CoRR, (2024)On the Interpretability of Deep Learning Based Models for Knowledge Tracing., and . CoRR, (2021)