Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Skype be used beyond video calling?, , and . MoMM, page 155-161. ACM, (2011)Direction-aggregated Attack for Transferable Adversarial Examples., , , , and . ACM J. Emerg. Technol. Comput. Syst., 18 (3): 60:1-60:22 (2022)Towards Learned Simulators for Cell Migration., , and . CoRR, (2022)Lottery Pools: Winning More by Interpolating Tickets without Increasing Training or Inference Cost., , , , , and . AAAI, page 10945-10953. AAAI Press, (2023)Quantifying and Learning Linear Symmetry-Based Disentanglement., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 21584-21608. PMLR, (2022)ProtoInfoMax: Prototypical Networks with Mutual Information Maximization for Out-of-Domain Detection., , , and . EMNLP (Findings), page 1606-1617. Association for Computational Linguistics, (2021)Unsupervised Signature Extraction from Forensic Logs., , and . ECML/PKDD (3), volume 10536 of Lecture Notes in Computer Science, page 305-316. Springer, (2017)Machine Learning Approach for Quality of Experience Aware Networks., , and . INCoS, page 461-466. IEEE Computer Society, (2010)Weakly supervised training of deep convolutional neural networks for overhead pedestrian localization in depth fields., , and . AVSS, page 1-6. IEEE Computer Society, (2017)Graph Neural Networks for Carbon Dioxide Adsorption Prediction in Aluminium-Exchanged Zeolites., , , and . CoRR, (2024)