Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Language-based solution to enable Metaverse Retrieval., , and . CoRR, (2023)On the Computation of the Gaussian Rate-Distortion-Perception Function., , and . CoRR, (2023)Predicting Human Eye Fixations via an LSTM-based Saliency Attentive Model., , , and . CoRR, (2016)Generalized Born radii computation using linear models and neural networks., , , and . Bioinform., 36 (6): 1757-1764 (2020)Exploiting and Evaluating a Supervised, Multilanguage Keyphrase Extraction pipeline for under-resourced languages., , , , , and . RANLP, page 78-85. INCOMA Ltd., (2017)Geometric tampering estimation by means of a SIFT-based forensic analysis, , , , and . Proc. of IEEE Int'l Conference on Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, USA, (March 2010)(Oral, Accept Rate 15%).Copy-Move Forgery Detection and Localization by Means of Robust Clustering with J-Linkage, , , , , and . Signal Processing: Image Communication, 28 (6): 659--669 (July 2013)A SIFT-based forensic method for copy-move attack detection and transformation recovery, , , , and . IEEE Trans. on Information Forensics and Security, 6 (3): 1099--1110 (September 2011)Local Pyramidal Descriptors for Image Recognition., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 36 (5): 1033-1040 (2014)On the effectiveness of local warping against SIFT-based copy-move detection., , , , , and . ISCCSP, page 1-5. IEEE, (2012)