Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HistoTrust: tracing AI behavior with secure hardware and blockchain technology., , , , , and . Ann. des Télécommunications, 78 (7-8): 413-427 (August 2023)Mining tourist information from user-supplied collections., , and . CIKM, page 1713-1716. ACM, (2009)IRIM at TRECVID 2009 : High Level Feature Extraction., , , , , , , , , and 16 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2009)MonuAnno: automatic annotation of georeferenced landmarks images., and . CIVR, ACM, (2009)Impact of Low-Bitwidth Quantization on the Adversarial Robustness for Embedded Neural Networks., , and . CW, page 308-315. IEEE, (2019)Improving Image Retrieval Using Semantic Resources., , and . Advances in Semantic Media Adaptation and Personalization, volume 93 of Studies in Computational Intelligence, Springer, (2008)Cross-Media Feedback Strategies: Merging Text and Image Information to Improve Image Retrieval., , , and . CLEF, volume 3491 of Lecture Notes in Computer Science, page 709-717. Springer, (2004)Usage-oriented multimedia information retrieval technological evaluation., , and . Multimedia Information Retrieval, page 301-306. ACM, (2006)Permanent Laser Fault Injection into the Flash Memory of a Microcontroller., , , and . NEWCAS, page 1-4. IEEE, (2021)A Review of Confidentiality Threats Against Embedded Neural Network Models., , , and . WF-IoT, page 610-615. IEEE, (2021)