From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Probabilistic Models to Detect Data Poisoning Attacks., , , , и . CoRR, (2019)Modeling and analysis of traffic characteristics in IEEE 802.11 MAC based networks., и . GLOBECOM, стр. 67-71. IEEE, (2002)A Low-Complexity Approach to Rate-Distortion Optimized Variable Bit-Rate Compression for Split DNN Computing., , , и . ICPR, стр. 182-188. IEEE, (2022)LT-TCP: End-to-End Framework to Improve TCP Performance over Networks with Lossy Channels., , , и . IWQoS, том 3552 из Lecture Notes in Computer Science, стр. 81-93. Springer, (2005)Data augmentation to improve robustness of image captioning solutions., , и . CoRR, (2021)Subspace Modeling for Fast Out-Of-Distribution and Anomaly Detection., , и . ICIP, стр. 3041-3045. IEEE, (2022)Compression without Compromise: Optimizing Point Cloud Object Detection with Bottleneck Architectures For Split Computing., , и . ICME Workshops, стр. 1-6. IEEE, (2024)Uncertainty as a Form of Transparency: Measuring, Communicating, and Using Uncertainty., , , , , , , , , и 4 other автор(ы). CoRR, (2020)Second Order Bifurcating Methodology for Neural Network Training and Topology Optimization., , и . ICPR Workshops (1), том 12661 из Lecture Notes in Computer Science, стр. 725-738. Springer, (2020)Efficient path aggregation and error control for video streaming., , и . ICIP, стр. 3137-3140. IEEE, (2004)