Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RLDS: an Ecosystem to Generate, Share and Use Datasets in Reinforcement Learning., , , , , , , , , and 2 other author(s). CoRR, (2021)Scaling Vision Transformers to 22 Billion Parameters., , , , , , , , , and 32 other author(s). CoRR, (2023)UViM: A Unified Modeling Approach for Vision with Learned Guiding Codes., , , , , and . NeurIPS, (2022)TensorFlow-Serving: Flexible, High-Performance ML Serving., , , , , , , , and . CoRR, (2017)Wide & Deep Learning for Recommender Systems., , , , , , , , , and 6 other author(s). DLRS@RecSys, page 7-10. ACM, (2016)Kernel Fisher discriminant for steganalysis of JPEG hiding methods., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 13-22. SPIE, (2004)Capacity of Steganographic Channels., and . IEEE Trans. Inf. Theory, 55 (4): 1775-1792 (2009)Capacity of Steganographic Channels, and . CoRR, (2008)Capacity of steganographic channels., and . MM&Sec, page 11-24. ACM, (2005)Steganalysis of additive-noise modelable information hiding., and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 131-142. SPIE, (2003)