Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fully Automated 3D In-Vivo Delineation and Shape Parameterization of the Human Lamina Cribrosa in Optical Coherence Tomography., , , and . IEEE Trans. Biomed. Eng., 66 (5): 1422-1428 (2019)Defense Against Adversarial Attacks on Audio DeepFake Detection., , and . CoRR, (2022)Emerging Security Challenges for Ubiquitous Devices., , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)Obfuscated Counting in Single-Hop Radio Network., , , and . ICPADS, page 692-693. IEEE Computer Society, (2012)How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction., , and . BTAS, page 1-10. IEEE, (2019)Lightweight Protocol for Trusted Spontaneous Communication., , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 228-242. Springer, (2014)Practical privacy preserving size approximation in distributed systems., and . CSNDSP, page 1-6. IEEE, (2016)User authorization based on hand geometry without special equipment., , and . Pattern Recognit., (2018)MLAAD: The Multi-Language Audio Anti-Spoofing Dataset., , , , , , , , and . CoRR, (2024)Fully automated detection of lamina cribrosa in optical coherence tomography: Framework and illustrative examples., , , and . EMBC, page 608-611. IEEE, (2017)