Co Author Listing * Web scale photo hash clustering on a single machine
Co Author Listing * Integrated Cyber-Physical Immersive Virtual Reality Framework with Applications to Telerobotics, An
Co Author Listing * Homogenization of Geostationary Infrared Imager Channels for Cold Cloud Studies Using Megha-Tropiques/ScaRaB
Co Author Listing * Optimal Transport as a Defense Against Adversarial Attacks
* Vulnerability of Person Re-Identification Models to Metric Adversarial Attacks
Includes: Bouniot, Q.[Quentin] Bouniot, Q.
Co Author Listing * Large-Scale Historical Watermark Recognition: dataset and a new consistency-based approach
Co Author Listing * filter banks design using a multiobjecive genetic algorithm for an image coding scheme, A
Co Author Listing * Using Landsat, MODIS, and a Biophysical Model to Evaluate LST in Urban Centers
Co Author Listing * General solution and learning method for binary classification with performance constraints
Co Author Listing * Digital Preservation: How to Be Trustworthy
Co Author Listing * Analysis of Pulse Transit Time Derived from Imaging Photoplethysmography and Microwave Sensor-based Ballistocardiography
Index for "b"