Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine pose estimation of known objects in cluttered scene images., , and . ACPR, page 630-634. IEEE, (2015)A Sketch-Based Approach To Video Retrieval Using Qualitative Features., and . ICVGIP, page 54:1-54:8. ACM, (2014)IDD: A Dataset for Exploring Problems of Autonomous Navigation in Unconstrained Environments., , , , and . CoRR, (2018)IDD: A Dataset for Exploring Problems of Autonomous Navigation in Unconstrained Environments., , , , and . WACV, page 1743-1751. IEEE, (2019)Blind authentication: a secure crypto-biometric verification protocol., , , and . IEEE Trans. Inf. Forensics Secur., 5 (2): 255-268 (2010)Universal Material Translator: Towards Spoof Fingerprint Generalization., , , , and . ICB, page 1-8. IEEE, (2019)Pose Invariant Palmprint Recognition., and . ICB, volume 5558 of Lecture Notes in Computer Science, page 577-586. Springer, (2009)Leveraging multiple tasks to regularize fine-grained classification., and . ICPR, page 3476-3481. IEEE, (2016)STQ-Nets: Unifying Network Binarization and Structured Pruning., , and . BMVC, BMVA Press, (2020)One-Shot Sensor and Material Translator : A Bilinear Decomposer for Fingerprint Presentation Attack Generalization., and . IJCB, page 1-10. IEEE, (2022)