Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scenario-Based Insider Threat Detection From Cyber Activities., , and . IEEE Trans. Comput. Social Systems, 5 (3): 660-675 (2018)Fully Automated Image De-fencing using Conditional Generative Adversarial Networks., , , , and . CoRR, (2019)Privacy preservation through facial de-identification with simultaneous emotion preservation., , and . Signal Image Video Process., 15 (5): 951-958 (2021)Exploiting pose dynamics for human recognition from their gait signatures., and . Multim. Tools Appl., 80 (28-29): 35903-35921 (2021)Frontal gait recognition from occluded scenes., , and . Pattern Recognit. Lett., (2015)Generating Secure Images for CAPTCHAs through Noise Addition., , , , , and . SACMAT, page 169-172. ACM, (2015)Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera., , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1843-1856 (2014)A deep learning computational approach for the classification of COVID-19 virus., , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 11 (3): 786-795 (May 2023)BGaitR-Net: Occluded Gait Sequence reconstructionwith temporally constrained model for gait recognition., , and . CoRR, (2021)Broad Neural Network for Change Detection in Aerial Images., , and . CoRR, (2019)