Author of the publication

Vae/Wgan-Based Image Representation Learning For Pose-Preserving Seamless Identity Replacement In Facial Images.

, , , and . MLSP, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Distributed Topic Modeling with Provable Guarantees., , , and . AISTATS, volume 33 of JMLR Workshop and Conference Proceedings, page 167-175. JMLR.org, (2014)Delayed Sequential Coding of Correlated Sources, , and . CoRR, (2007)Privacy-Preserving Adversarial Networks., , and . CoRR, (2017)Information-Theoretically Secure Three-Party Computation with One Active Adversary, , and . CoRR, (2012)Secure Two-Party Sampling Primitives are either Useless or Complete., , and . CoRR, (2014)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , and . GlobalSIP, page 241-244. IEEE, (2013)Bootstrapped oblivious transfer and secure two-party function computation., and . ISIT, page 1303-1307. IEEE, (2009)Towards a theory for video coding using distributed compression principles., , and . ICIP (2), page 687-690. IEEE, (2003)An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 327-341. Springer, (2005)Necessary and Sufficient Conditions and a Provably Efficient Algorithm for Separable Topic Discovery., , and . CoRR, (2015)