Author of the publication

Deep labeller: automatic bounding box generation for synthetic violence detection datasets.

, , , , and . Multim. Tools Appl., 83 (4): 10717-10734 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep labeller: automatic bounding box generation for synthetic violence detection datasets., , , , and . Multim. Tools Appl., 83 (4): 10717-10734 (January 2024)On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks., , , , and . AICCSA, page 1-7. IEEE Computer Society, (2019)SVD-based universal spatial domain image steganalysis., and . IEEE Trans. Inf. Forensics Secur., 5 (2): 349-353 (2010)Map Segmentation of Color Images Using Constraint Satisfaction Neural Network., and . ICIP (3), page 236-239. IEEE, (1999)Comparison of different wavelet transforms for fusion based watermarking applications., , , and . ICECS, page 1188-1191. IEEE, (2003)Image segmentation based on multi-scan constraint satisfaction neural network., and . Pattern Recognit. Lett., 20 (14): 1553-1563 (1999)CRT-BIoV: A Cognitive Radio Technique for Blockchain-Enabled Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4005-4015 (2021)Progressive observation of Covid-19 vaccination effects on skin-cellular structures by use of Intelligent Laser Speckle Classification (ILSC)., and . CoRR, (2021)Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers' Strategies., , , , and . Sensors, 18 (11): 4040 (2018)A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices., , , , and . Complex., (2021)