Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet., , , , and . Privacy Enhancing Technologies, volume 7981 of Lecture Notes in Computer Science, page 103-122. Springer, (2013)Self-Supervised Relative Depth Learning for Urban Scene Understanding., , , , and . ECCV (11), volume 11215 of Lecture Notes in Computer Science, page 20-37. Springer, (2018)A New Confidence Interval for the Mean of a Bounded Random Variable., and . CoRR, (2019)Forensic Triage for Mobile Phones with DEC0DE., , and . USENIX Security Symposium, USENIX Association, (2011)Mod-Squad: Designing Mixtures of Experts As Modular Multi-Task Learners., , , , , , and . CVPR, page 11828-11837. IEEE, (2023)EVAL: Explainable Video Anomaly Localization., , and . CVPR, page 18717-18726. IEEE, (2023)Active Bias: Training More Accurate Neural Networks by Emphasizing High Variance Samples., , and . NIPS, page 1002-1012. (2017)Names and Faces in the News., , , , , , , and . CVPR (2), page 848-854. IEEE Computer Society, (2004)Fast Lexicon-Based Scene Text Recognition with Sparse Belief Propagation., , and . ICDAR, page 979-983. IEEE Computer Society, (2007)Unsupervised Hard Example Mining from Videos for Improved Object Detection., , , , , , and . ECCV (13), volume 11217 of Lecture Notes in Computer Science, page 316-333. Springer, (2018)