Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition of Non-Cooperative Individuals at a Distance with 3D Face Modeling., , , , , and . AutoID, page 112-117. IEEE, (2007)Comparing strategies for 3D face recognition from a 3D sensor., , and . RO-MAN, page 19-24. IEEE, (2013)Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models., , , and . IEEE Trans. Syst. Man Cybern. Part A, 39 (1): 12-24 (2009)Design Pseudo Ground Truth with Motion Cue for Unsupervised Video Object Segmentation., , , , , , and . ACCV (4), volume 11364 of Lecture Notes in Computer Science, page 518-533. Springer, (2018)Android malware detection using convolutional neural networks and data section images., , , , , and . RACS, page 149-153. ACM, (2018)Software similarity analysis based on dynamic stack usage patterns., , , , and . RACS, page 285-290. ACM, (2015)ICA Based Face Recognition Robust to Partial Occlusions and Local Distortions., , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 147-154. Springer, (2004)An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks., , , , and . J. Internet Serv. Inf. Secur., 2 (3/4): 29-42 (2012)Face Recognition Based on Locally Salient ICA Information., , and . ECCV Workshop BioAW, volume 3087 of Lecture Notes in Computer Science, page 1-9. Springer, (2004)Age-invariant face recognition using gender specific 3D aging modeling., , , , , and . Multimedia Tools Appl., 78 (17): 25163-25183 (2019)