Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Provenance Analysis at Scale., , , , , , , and . IEEE Trans. Image Process., 27 (12): 6109-6123 (2018)To Frontalize or Not to Frontalize: Do We Really Need Elaborate Pre-processing to Improve Face Recognition?, , , , , , , and . WACV, page 20-29. IEEE Computer Society, (2018)U-Phylogeny: Undirected provenance graph construction in the wild., , , , , , , and . ICIP, page 1517-1521. IEEE, (2017)Learn "No" to Say "Yes" Better: Improving Vision-Language Models via Negations., , , , and . CoRR, (2024)To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-Processing to Improve Face Recognition Performance?, , , , , , , and . CoRR, (2016)A Computer Vision Method for Estimating Velocity from Jumps., , , and . CoRR, (2022)Getting the subtext without the text: Scalable multimodal sentiment classification from visual and acoustic modalities., , , and . CoRR, (2018)IdProv: Identity-Based Provenance for Synthetic Image Generation (Student Abstract)., , , , , and . AAAI, page 16164-16165. AAAI Press, (2023)Beyond Pixels: Image Provenance Analysis Leveraging Metadata., , , , , , , and . WACV, page 1692-1702. IEEE, (2019)Transformation-Aware Embeddings for Image Provenance., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)