Author of the publication

Not with My Name! Inferring Artists' Names of Input Strings Employed by Diffusion Models.

, , , and . ICIAP (1), volume 14233 of Lecture Notes in Computer Science, page 364-375. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting visual and text features for direct marketing learning in time and space constrained domains., , , , and . Pattern Anal. Appl., 13 (2): 143-157 (2010)An Improved Image Re-indexing Technique by Self Organizing Motor Maps., , and . CCIW, volume 5646 of Lecture Notes in Computer Science, page 62-70. Springer, (2009)Scene categorization using bag of Textons on spatial hierarchy., , , and . ICIP, page 2536-2539. IEEE, (2008)Visual Sentiment Analysis Based on on Objective Text Description of Images., , , and . CBMI, page 1-6. IEEE, (2018)First JPEG quantization matrix estimation based on histogram analysis., , , and . ICIP, page 4502-4506. IEEE, (2013)Random-temporal block selection for video stabilization., , and . Digital Photography, volume 7876 of SPIE Proceedings, page 78760K. SPIE/IS&T, (2011)Exploiting time-multiplexing structured light with picoprojectors., , , and . Three-Dimensional Image Processing, Measurement (3DIPM), and Applications, volume 9393 of SPIE Proceedings, page 939304. SPIE, (2015)Semantic segmentation of images exploiting DCT based features and random forest., , , , and . Pattern Recognit., (2016)Organizing egocentric videos of daily living activities., , , , , and . Pattern Recognit., (2017)Should We Prove Security Policies Correct?, , and . EGCDMAS, page 56-65. INSTICC Press, (2004)