Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Supervised Learning of Whole and Component-Based Semantic Representations for Person Re-Identification., , , , and . CoRR, (2023)TV Broadcast Efficiency in 5G Networks from Subscriber Prospective., and . GLOBECOM, page 1-6. IEEE, (2015)Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp Adversarial Attacks., , , , and . NeurIPS, (2020)Multi-Modal Human Authentication Using Silhouettes, Gait and RGB., , , and . FG, page 1-7. IEEE, (2023)Diffuse and Restore: A Region-Adaptive Diffusion Model for Identity-Preserving Blind Face Restoration., , , , and . WACV, page 6331-6340. IEEE, (2024)Mutual Adversarial Training: Learning Together is Better Than Going Alone., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)ATDetect: Face Detection and Keypoint Extraction at Range and Altitude., , and . IJCB, page 1-10. IEEE, (2023)Semi-Supervised Landmark-Guided Restoration of Atmospheric Turbulent Images., , and . IEEE J. Sel. Top. Signal Process., 15 (2): 204-215 (2021)Video Quality Prediction over Wireless 4G., , and . PAKDD (2), volume 7819 of Lecture Notes in Computer Science, page 414-425. Springer, (2013)An In-Depth Survey on Virtualization Technologies in 6G Integrated Terrestrial and Non-Terrestrial Networks., , and . IEEE Open J. Commun. Soc., (2024)