Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Unified Decomposition of Ensemble Loss., , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1133-1139. Springer, (2006)Resampling Estimation Based RPC Metadata Verification in Satellite Imagery., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Deep Learning Enabled Time-Lapse 3D Cell Analysis., , , , , , and . CoRR, (2022)Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions., , , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)Holistic Image Manipulation Detection using Pixel Cooccurrence Matrices., , , , and . Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)A Unified Decomposition of Ensemble Loss for Predicting Ensemble Performance., , and . ICML, page 211-218. Morgan Kaufmann, (2002)Detection, Attribution and Localization of GAN Generated Images., , , , , and . CoRR, (2020)Generalizable Deepfake Detection with Phase-Based Motion Analysis., , and . CoRR, (2022)LECA: A Learned Approach for Efficient Cover-agnostic Watermarking., , , and . CoRR, (2022)Predicting Fluid Intelligence of Children Using T1-Weighted MR Images and a StackNet., , , , and . ABCD-NP@MICCAI, volume 11791 of Lecture Notes in Computer Science, page 9-16. Springer, (2019)