All publications sorted by journal and type
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
IEEE Transactions on Information Forensics and Security
Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , in: IEEE Transactions on Information Forensics and Security, 2020 |
|
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
IEEE Transactions on Information Forensics and Security
Heterogeneous Face Recognition Using Domain Specific Units, , and , in: IEEE Transactions on Information Forensics and Security:13, 2019 |
[DOI] |
Joint Speaker Verification and Anti-Spoofing in the i-Vector Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 10(4):821-832, 2015 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
IEEE Transactions on Information Forensics and Security
A Fast Parts-based Approach to Speaker Verification using Boosted Slice Classifiers, , and , in: IEEE Transactions on Information Forensics and Security, 7(1):241-254, 2012 |
|
Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models, , , and , in: IEEE Transactions on Information Forensics and Security, 7(2):553 -- 562, 2012 |
|
IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
IEEE Transactions on Medical Imaging
Learning-Based Compressive MRI, , , , , , and , in: IEEE Transactions on Medical Imaging, 2018 |
|
IEEE Transactions on Mobile Computing
DrinkSense: Characterizing Youth Drinking Behavior using Smartphones, , , , , and , in: IEEE Transactions on Mobile Computing, 2018 |
|
The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data, and , in: IEEE Transactions on Mobile Computing, 2013 |
|
IEEE transactions on Multimedia
Check Out This Place: Inferring Ambiance from Airbnb Photos, , , and , in: IEEE transactions on Multimedia, 20(6):1499-1511, 2018 |
[DOI] [URL] |
IEEE Transactions on Multimedia
Maya Codical Glyph Segmentation: A Crowdsourcing Approach, , and , in: IEEE Transactions on Multimedia, 20(3):711-725, 2018 |
[DOI] [URL] |
Predicting the Performance in Decision-Making Tasks: From Individual Cues to Group Interaction, and , in: IEEE Transactions on Multimedia, 18(4):643--658, 2016 |
[DOI] [URL] |
Broadcasting oneself: Visual Discovery of Vlogging Styles, , and , in: IEEE Transactions on Multimedia, 16(1):201-215, 2014 |
[DOI] |
Hire Me: Computational inference of hirability in employment interviews based on nonverbal behavior, , , and , in: IEEE Transactions on Multimedia, 16(4):1018 - 1031, 2014 |
[DOI] |
Mining Crowdsourced First Impressions in Online Social Video, and , in: IEEE Transactions on Multimedia, 16(7), 2014 |
|
A Nonverbal Behavior Approach to Identify Emergent Leaders in Small Groups, , , and , in: IEEE Transactions on Multimedia, 14(3-2):816-832, 2012 |
[DOI] |
Automatic Role Recognition in Multiparty Conversations: an Approach Based on Turn Organization, Prosody and Conditional Random Fields, and , in: IEEE Transactions on Multimedia, 2012 |
The YouTube Lens: Crowdsourced Personality Impressions and Audiovisual Analysis of Vlogs, and , in: IEEE Transactions on Multimedia, 2012 |
|
Mining group nonverbal conversational patterns using probabilistic topic models, and , in: IEEE Transactions on Multimedia, 2010 |
|
Modeling and Understanding Flickr Communities through Topic-based Analysis, and , in: IEEE Transactions on Multimedia, 12(5), 2010 |
[DOI] |
Automatic Role Recognition in Multiparty Recordings: Using Social Affiliation Networks for Feature Extraction, , and , in: IEEE Transactions on Multimedia, 11(7), 2009 |
|
Role Recognition in Broadcast News Using Social Network Analysis and Duration Distribution Modeling, , in: IEEE Transactions on Multimedia, 2007 |
|
Application of Information Retrieval Technologies to Presentation Slides, and , in: IEEE Transactions on Multimedia, 8(5), 2006 |
|
Audio-Visual Speech Modelling for Continuous Speech Recognition, and , in: IEEE Transactions on Multimedia, 2000 |
IEEE Transactions on Neural Networks
Fusion of Face and Speech Data for Person Identity Verification, , and , in: IEEE Transactions on Neural Networks, 10(05), 1999 |
|
High Order and Multilayer Perceptron Initialization, and , in: IEEE Transactions on Neural Networks, 8(02), 1997 |
{IEEE} Transactions on Neural Systems {&} Rehabilitation Engineering
Characterizing the EEG Correlates of Exploratory Behavior, , , and , in: IEEE Transactions on Neural Systems & Rehabilitation Engineering, 2008 |
|
IEEE Transactions on Pattern Analysis and Machine Intelligence
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 45(12):14248-14265, 2023 |
[DOI] [URL] |
A Bayesian Approach to Recurrence in Neural Networks, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(8):2527--2537, 2021 |
[DOI] |
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
HeadFusion: 360 degree Head Pose Tracking Combining 3D Morphable Model and 3D Reconstruction, , and , in: IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 40(11), 2018 |
[DOI] |
Deep Dynamic Neural Networks for Multimodal Gesture Segmentation and Recognition, , , , , , and , in: IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2016 |
|
IEEE Transactions on Pattern Analysis and Machine Intelligence
Tracking Interacting Objects Using Intertwined Flows, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2016 |
A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7):1788-1794, 2013 |
[DOI] [URL] |
Multi-Commodity Network Flow for Tracking Multiple People, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013 |
A real-time deformable detector., , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012 |
|
Multiple Object Tracking using K-Shortest Paths Optimization, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011 |
Classification-based Probabilistic Modeling of Texture Transition for Fast Line Search Tracking and Delineation, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008 |
Multi-Camera People Tracking with a Probabilistic Occupancy Map, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(2), 2008 |
A Thousand Words in a Scene, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 |
|
Modeling semantic aspects for cross-media image indexing, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007 |
|
Noisy Text Categorization, , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(12), 2005 |
|
Offline Recognition of Unconstrained Handwritten Texts Using HMMs and Statistical Language Models, , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(6), 2004 |
|
Estimating the Intrinsic Dimension of Data with a Fractal-Based Method, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(10), 2002 |
|
IEEE Transactions on Pattern Analysis and Machine Intelligence (to appear)
Automatic Analysis of Multimodal Group Actions in Meetings, , , , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence (to appear), 2004 |
|
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)
A Discriminative Kernel-based Model to Rank Images from Text Queries, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), X, 2008 |
|
{IEEE} TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE Special Issue on Biometrics
Person Authentication using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation, and , in: IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE Special Issue on Biometrics, 2007 |
|
IEEE Transactions on Robotics
Geometric Algebra for Optimal Control with Applications in Manipulation Tasks, and , in: IEEE Transactions on Robotics, 2023 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |