Author of the publication

Tattoo-ID: Automatic Tattoo Image Retrieval for Suspect and Victim Identification.

, , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 256-265. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEAR: Delay-Guaranteed Energy Profile-Aware Routing Toward the Green Internet., , and . IEEE Communications Letters, 18 (11): 1943-1946 (2014)Attention-Aided Generative Learning for Multi-Scale Multi-Modal Fundus Image Translation., , , , , and . IEEE Access, (2023)Caricature video., , and . Comput. Animat. Virtual Worlds, 18 (4-5): 279-288 (2007)Cross Sample Similarity for Stable Training of GAN., and . SIGGRAPH Posters, page 23:1-23:2. ACM, (2021)Local Detection of Exclusive Global Predicates.. ICPP, page 336-343. IEEE Computer Society, (1999)Rank-based distance metric learning: An application to image retrieval., , and . CVPR, IEEE Computer Society, (2008)Tattoo-ID: Automatic Tattoo Image Retrieval for Suspect and Victim Identification., , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 256-265. Springer, (2007)Unsupervised Ensemble Ranking: Application to Large-Scale Image Retrieval., , and . ICPR, page 3902-3906. IEEE Computer Society, (2010)Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards., , and . ITNG, page 575-580. IEEE Computer Society, (2008)An efficient key point quantization algorithm for large scale image retrieval., , , , and . LS-MMRM@ACM Multimedia, page 89-96. ACM, (2009)