Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Local Maps for Robust Approximate Nearest Neighbor Computation., and . ICAPR, page 129-133. IEEE Computer Society, (2009)Hybrid Binary Networks: Optimizing for Accuracy, Efficiency and Memory., , , , and . WACV, page 821-829. IEEE Computer Society, (2018)Deep Expander Networks: Efficient Deep Networks from Graph Theory., , and . ECCV (13), volume 11217 of Lecture Notes in Computer Science, page 20-36. Springer, (2018)Semi-adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images., , , and . ICB, page 82-89. IEEE, (2018)Learning deep and compact models for gesture recognition., and . ICIP, page 3998-4002. IEEE, (2017)Learning clustered sub-spaces for sketch-based image retrieval., , , and . ACPR, page 599-603. IEEE, (2015)Multiscale two-view stereo using convolutional neural networks for unrectified images., and . MVA, page 346-349. IEEE, (2017)Laplacian pyramids for deep feature inversion., and . ACPR, page 286-290. IEEE, (2015)Efficient Biometric Verification in Encrypted Domain., , , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 899-908. Springer, (2009)Repudiation Detection in Handwritten Documents., and . ICB, volume 4642 of Lecture Notes in Computer Science, page 356-365. Springer, (2007)