All publications sorted by journal and type
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |
IEEE Transactions on Biometrics, Behavior, and Identity Science
Improving Generalization of Deepfake Detection with Data Farming and Few-Shot Learning, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
|
Towards Protecting and Enhancing Vascular Biometric Recognition methods via Biohashing and Deep Neural Networks, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] [URL] |
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020 |
|
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science:11, 2019 |
|
Multispectral Deep Embeddings As a Countermeasure To Custom Silicone Mask Presentation Attacks, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019 |
|
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
Efficient Convolutional Neural Networks for Depth-Based Multi-Person Pose Estimation, , , and , in: IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 30(11):4207-4221, 2020 |
[DOI] [URL] |
IEEE Transactions on Circuits and Systems for Video Technology
Finding Structure in Home Videos by Probabilistic Hierarchical Clustering, , and , in: IEEE Transactions on Circuits and Systems for Video Technology, 13(6), 2003 |
|
IEEE Transactions on Cognitive and Developmental Systems
Combining Social and Intrinsically-Motivated Learning for Multi-Task Robot Skill Acquisition, and , in: IEEE Transactions on Cognitive and Developmental Systems, 15(2):385-394, 2023 |
[DOI] |
IEEE Transactions on Computational Imaging
Reconstruction of image sequences from ungated and scanning-aberrated laser scanning microscopy images of the beating heart, , , and , in: IEEE Transactions on Computational Imaging, 6:385--395, 2020 |
[DOI] [URL] |
Simultaneous temporal superresolution and denoising for cardiac fluorescence microscopy, , , and , in: IEEE Transactions on Computational Imaging, 2016 |
[DOI] [URL] |
IEEE Transactions on Image Processing
Spatially-Variant CNN-Based Point Spread Function Estimation for Blind Deconvolution and Depth Estimation in Optical Microscopy, and , in: IEEE Transactions on Image Processing, 29:5848 - 5861, 2020 |
[DOI] |
A Track Creation and Deletion Framework for Long-Term Online Multi-Face Tracking, and , in: IEEE Transactions on Image Processing, 2013 |
|
IEEE Transactions on Information Forensics and Security
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack, , and , in: IEEE Transactions on Information Forensics and Security, 2024 |
[DOI] [URL] |
Measuring Linkability of Protected Biometric Templates Using Maximal Leakage, , and , in: IEEE Transactions on Information Forensics and Security, 18:2262 - 2275, 2023 |
[DOI] [URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
On Joint Optimization of Automatic Speaker Verification and Anti-spoofing in the Embedding Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 16:1579--1593, 2021 |
[DOI] |
Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , in: IEEE Transactions on Information Forensics and Security, 2020 |
|
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
IEEE Transactions on Information Forensics and Security
Heterogeneous Face Recognition Using Domain Specific Units, , and , in: IEEE Transactions on Information Forensics and Security:13, 2019 |
[DOI] |
Joint Speaker Verification and Anti-Spoofing in the i-Vector Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 10(4):821-832, 2015 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
IEEE Transactions on Information Forensics and Security
A Fast Parts-based Approach to Speaker Verification using Boosted Slice Classifiers, , and , in: IEEE Transactions on Information Forensics and Security, 7(1):241-254, 2012 |
|
Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models, , , and , in: IEEE Transactions on Information Forensics and Security, 7(2):553 -- 562, 2012 |
|
IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
IEEE Transactions on Medical Imaging
Learning-Based Compressive MRI, , , , , , and , in: IEEE Transactions on Medical Imaging, 2018 |
|
IEEE Transactions on Mobile Computing
DrinkSense: Characterizing Youth Drinking Behavior using Smartphones, , , , , and , in: IEEE Transactions on Mobile Computing, 2018 |
|
The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data, and , in: IEEE Transactions on Mobile Computing, 2013 |
|
IEEE transactions on Multimedia
Check Out This Place: Inferring Ambiance from Airbnb Photos, , , and , in: IEEE transactions on Multimedia, 20(6):1499-1511, 2018 |
[DOI] [URL] |
IEEE Transactions on Multimedia
Maya Codical Glyph Segmentation: A Crowdsourcing Approach, , and , in: IEEE Transactions on Multimedia, 20(3):711-725, 2018 |
[DOI] [URL] |
Predicting the Performance in Decision-Making Tasks: From Individual Cues to Group Interaction, and , in: IEEE Transactions on Multimedia, 18(4):643--658, 2016 |
[DOI] [URL] |
Broadcasting oneself: Visual Discovery of Vlogging Styles, , and , in: IEEE Transactions on Multimedia, 16(1):201-215, 2014 |
[DOI] |
Hire Me: Computational inference of hirability in employment interviews based on nonverbal behavior, , , and , in: IEEE Transactions on Multimedia, 16(4):1018 - 1031, 2014 |
[DOI] |
Mining Crowdsourced First Impressions in Online Social Video, and , in: IEEE Transactions on Multimedia, 16(7), 2014 |
|
A Nonverbal Behavior Approach to Identify Emergent Leaders in Small Groups, , , and , in: IEEE Transactions on Multimedia, 14(3-2):816-832, 2012 |
[DOI] |
Automatic Role Recognition in Multiparty Conversations: an Approach Based on Turn Organization, Prosody and Conditional Random Fields, and , in: IEEE Transactions on Multimedia, 2012 |
The YouTube Lens: Crowdsourced Personality Impressions and Audiovisual Analysis of Vlogs, and , in: IEEE Transactions on Multimedia, 2012 |
|
Mining group nonverbal conversational patterns using probabilistic topic models, and , in: IEEE Transactions on Multimedia, 2010 |
|
Modeling and Understanding Flickr Communities through Topic-based Analysis, and , in: IEEE Transactions on Multimedia, 12(5), 2010 |
[DOI] |
Automatic Role Recognition in Multiparty Recordings: Using Social Affiliation Networks for Feature Extraction, , and , in: IEEE Transactions on Multimedia, 11(7), 2009 |
|
Role Recognition in Broadcast News Using Social Network Analysis and Duration Distribution Modeling, , in: IEEE Transactions on Multimedia, 2007 |
|
Application of Information Retrieval Technologies to Presentation Slides, and , in: IEEE Transactions on Multimedia, 8(5), 2006 |
|
Audio-Visual Speech Modelling for Continuous Speech Recognition, and , in: IEEE Transactions on Multimedia, 2000 |
IEEE Transactions on Neural Networks
Fusion of Face and Speech Data for Person Identity Verification, , and , in: IEEE Transactions on Neural Networks, 10(05), 1999 |
|
High Order and Multilayer Perceptron Initialization, and , in: IEEE Transactions on Neural Networks, 8(02), 1997 |
{IEEE} Transactions on Neural Systems {&} Rehabilitation Engineering
Characterizing the EEG Correlates of Exploratory Behavior, , , and , in: IEEE Transactions on Neural Systems & Rehabilitation Engineering, 2008 |
|
IEEE Transactions on Pattern Analysis and Machine Intelligence
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(12):14248-14265, 2023 |
[DOI] [URL] |
A Bayesian Approach to Recurrence in Neural Networks, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(8):2527--2537, 2021 |
[DOI] |
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
HeadFusion: 360 degree Head Pose Tracking Combining 3D Morphable Model and 3D Reconstruction, , and , in: IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 40(11), 2018 |
[DOI] |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |