TH
Publications
38
Views
17,950
Downloads
10,912
Supervised works
3
Items per page
1 - 38 of 38
Title Published in Access level OA Policy Year Views Downloads
Examining vision foundation models for classification and detection in optical and radio astronomyAstronomy & astrophysics
accessLevelPublic
2025 1 0
Self-supervised learning on MeerKAT wide-field continuum imagesAstronomy & astrophysics
accessLevelPublic
2024 24 23
Variational Information Bottleneck for Semi-Supervised ClassificationEntropy
accessLevelPublic
2020 282 157
Adversarial Detection of Counterfeited Printable Graphical Codes: Towards "Adversarial Games" In Physical World2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 280 347
Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups2020 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2020
accessLevelPublic
2020 259 295
Sparse ternary codes for similarity search have higher coding gain than dense binary codes
accessLevelPublic
2017 533 273
PharmaPack: mobile fine-grained recognition of pharma packages25th European Signal Processing Conference (EUSIPCO)
accessLevelPublic
2017 496 720
Physical object authentication: detection-theoretic comparison of natural and artificial randomnessIEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016
accessLevelRestricted
2016 225 1
Local active content fingerprint: solutions for general linear feature mapsInternational Conference on Pattern recognition, ICPR 2016
accessLevelPublic
2016 210 211
Local active content fingerprinting: Optimal solution under linear modulationIEEE International Conference on Image Processing, ICIP 2016
accessLevelPublic
2016 218 237
Forensic authentication of banknotes on mobile phonesIS&T International Simposium, Electronic Imaging 2016, Media Watermarking, Security, and Forensics 2016
accessLevelPublic
2016 411 343
Fast content identification in high-dimensional feature spaces using Sparse Ternary CodesIEEE International Workshop on Information Forensics and Security, WIFS 2016
accessLevelRestricted
2016 214 0
Mobile visual object identification: from SIFT-BoF-RANSAC to SketchPrint
accessLevelPublic
2015 561 348
Active content fingerprinting: Shrinkage and lattice based modulations2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
accessLevelRestricted
2013 499 1
Information-theoretic analysis of privacy-preserving identification
accessLevelPublic
2012 728 797
Private content identification based on soft fingerprintingProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 606 323
Information–Theoretic Multiclass Classification Based on Binary ClassifiersJournal of Signal Processing Systems
accessLevelPublic
2011 508 304
Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft FingerprintingEighth International Conference on Computer Science and Information Technologies, CSIT 2011
accessLevelPublic
2011 437 111
Sign-Magnitude Decomposition of Mutual Information with Polarization Effect in Digital IdentificationIEEE Information Theory Workshop (ITW)
accessLevelPublic
2011 583 323
Trading-off privacy-complexity of identification problemProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 546 128
Information-theoretic analysis of desynchronization invariant object identificationInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 538 313
Fast physical object identification based on unclonable features and soft fingerprintingInternational Conference on Acoustics, Speech and Signal Processing, ICASSP2011
accessLevelPublic
2011 585 316
Geometrically robust perceptual fingerprinting : an asymmetric caseProceedings of SPIE Photonics West, Electronic Imaging, Media Forensics and Security XIII
accessLevelPublic
2011 500 275
Privacy amplification of content identification based on fingerprint bit reliability2010 IEEE International Workshop on Information Forensics and Security (WIFS)
accessLevelPublic
2010 569 261
On Accuracy, Privacy and Complexity in the Identification ProblemProceedings of SPIE / Imaging and Printing in a Web 2.0 World; and Multimedia Content Access: Algorithms and Systems IV
accessLevelPublic
2010 515 262
Fast identification of highly distorted imagesProceedings of SPIE / Media Forensics and Security II
accessLevelPublic
2010 612 984
Information-Theoretical Analysis of Private Content Identification2010 IEEE Information Theory Workshop (ITW)
accessLevelPublic
2010 619 408
Fast identification algorithms for forensic applicationsFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 548 348
On privacy preserving search in large scale distributed systems : a signal processing view on searchable encryptionProceedings of the International Workshop on Signal Processing in the EncryptEd Domain
accessLevelPublic
2009 613 406
Privacy enhancement of common randomness based authentication: key rate maximized caseFirst IEEE International Workshop on Information Forensics and Security, WIFS 2009
accessLevelPublic
2009 581 275
Multi-class Classifiers based on Binary Classifiers : Performance, Efficiency, and Minimum Coding Matrix DistancesIEEE International Workshop on Machine Learning for Signal Processing, MLSP 2009
accessLevelPublic
2009 566 300
Binary Robust Hashing based on Probabilistic Bit ReliabilityIEEE/SP 15th Workshop on Statistical Signal Processing, 2009. SSP '09
accessLevelPublic
2009 531 236
Multi-class Classification based on Binary Classifiers : On Coding Matrix Design, Reliability and Maximum Number of ClassesIEEE International Workshop on Machine Learning for Signal Processing, 2009, MLSP 2009
accessLevelPublic
2009 600 248
Information-theoretic analysis of steganalysis in real imagesACM Multimedia and Security Workshop 2006
2006 548 0
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005)
accessLevelPublic
2005 820 573
Generalized radar/radiometry imaging problemsJournal of Telecommunications and Information Technology
accessLevelPublic
2001 573 253
Surface image formation based on sparse arrays with nonlinear signal processingIEEE Second International Conference "The detection of abandoned land mines"
accessLevelPublic
1998 545 264
Adaptive aperture formation matched with radiometry image spatial spectrumIEEE International Microwave and Radar Conference
accessLevelPublic
1998 466 248
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack