Author of the publication

Generating Handwritten Character Clones from an Incomplete Seed Character Set using Collaborative Filtering.

, , , and . ICFHR, page 68-73. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering of Video Packets Using Interactive Refinement by Relevance Feedback., , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 626-633. Springer, (2004)Generating Handwritten Character Clones from an Incomplete Seed Character Set using Collaborative Filtering., , , and . ICFHR, page 68-73. IEEE Computer Society, (2018)Video Scene and Event Detection., and . Encyclopedia of Database Systems, Springer US, (2009)Intermodal collaboration: a strategy for semantic content analysis for broadcasted sports video., and . ICIP (1), page 13-16. IEEE, (2003)Privacy protecting visual processing for secure video surveillance., , , , , and . ICIP, page 1672-1675. IEEE, (2008)Real-World Event Detection Using Flickr Images., , , and . MMM (2), volume 8326 of Lecture Notes in Computer Science, page 307-314. Springer, (2014)MMArt-ACM 2022: 5th Joint Workshop on Multimedia Artworks Analysis and Attractiveness Computing in Multimedia., , and . ICMR, page 692-693. ACM, (2022)Generating Semantic Descriptions of Broadcasted Sports Videos Based on Structures of Sports Games and TV Programs., , and . Multimedia Tools Appl., 25 (1): 59-83 (2005)Extracting Real-World Observations from Microblog., , , and . BigMM, page 232-237. IEEE Computer Society, (2017)When AI Facilitates Trust Violation: An Ethical Report on Deep Model Inversion Privacy Attack., , , , , and . CSCI, page 929-935. IEEE, (2022)