Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transformer-Based Speech Synthesizer Attribution in an Open Set Scenario., and . ICMLA, page 329-336. IEEE, (2022)Label-Free Mammalian Cell Tracking Enhanced by Precomputed Velocity Fields., , , , , , and . ICMLA, page 353-360. IEEE, (2022)Generative Autoregressive Ensembles for Satellite Imagery Manipulation Detection., , , , and . WIFS, page 1-6. IEEE, (2020)Deepfakes Detection with Automatic Face Weighting., , , , , , , , , and 1 other author(s). CoRR, (2020)A watermark for digital images., and . ICIP (3), page 219-222. IEEE Computer Society, (1996)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)Secret Sharing in the Encrypted Domain with Secure Comparison., and . GLOBECOM, page 1-5. IEEE, (2011)A system for large-scale analysis of distributed cameras., , , , , , , and . GlobalSIP, page 340-344. IEEE, (2014)Complexity-Rate-Distortion Analysis of Backward Channel Aware Wyner-Ziv Video Coding., , and . ICIP (2), page 25-28. IEEE, (2007)Detection of unique people in news programs using multimodal shot clustering., , , and . ICIP, page 697-700. IEEE, (2004)