Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning bottom-up text attention maps for text detection using stroke width transform., , and . ICIP, page 3312-3316. IEEE, (2013)Robust multiple object tracking by detection with interacting Markov chain Monte Carlo., , and . ICIP, page 2953-2957. IEEE, (2013)Enhanced Data Security Framework for Storage Area Networks., , and . ICECS, page 105-110. IEEE Computer Society, (2009)Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison., , and . BAIP, volume 70 of Communications in Computer and Information Science, page 96-101. Springer, (2010)Second order dynamic element matching technique for low oversampling delta sigma ADC., , , , and . ISCAS, IEEE, (2006)Eye tracking assisted extraction of attentionally important objects from videos., , , and . CVPR, page 3241-3250. IEEE Computer Society, (2015)From Where and How to What We See., , , , and . ICCV, page 625-632. IEEE Computer Society, (2013)Weakly Supervised Graph Based Semantic Segmentation by Learning Communities of Image-Parts., , and . ICCV, page 1359-1367. IEEE Computer Society, (2015)Two Dimensional Cellular Automata Encryption Method for Security., and . IC3I, page 722-727. IEEE, (2022)Classification of the Class Imbalanced Data Using Mahalanobis Distance with Feature Filtering., , and . MIKE, volume 13924 of Lecture Notes in Computer Science, page 45-53. Springer, (2023)