Author of the publication

Supervised Learning of Descriptions for Image Recognition Purposes.

, , , and . IEEE Trans. Pattern Anal. Mach. Intell., 16 (1): 92-98 (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Effective Multiple Classifier Systems by Clustering of Classifiers, , , and . IEEE, (2000)Evasion attacks against machine learning at test time, , , , , , , and . Joint European Conference on Machine Learning and Knowledge Discovery in Databases, page 387--402. Springer, (2013)Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)On Security and Sparsity of Linear Classifiers for Adversarial Settings., , , , and . CoRR, (2017)An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification., , and . ICIAP, volume 5716 of Lecture Notes in Computer Science, page 434-442. Springer, (2009)Image Recognition by Integration of Connectionist and Symbolic Approaches., , and . IJPRAI, 9 (3): 485-515 (1995)A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 540-550. Springer, (2015)Slope: A First-order Approach for Measuring Gradient Obfuscation., , , , and . ESANN, (2021)Semi-supervised Co-update of Multiple Matchers., , and . MCS, volume 5519 of Lecture Notes in Computer Science, page 152-160. Springer, (2009)Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks., , , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2019)