DeFraudNet: End2End fingerprint spoof detection using patch level attention S Banerjee, S Chaudhuri Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2020 | 20 | 2020 |
Compute to tell the tale: Goal-driven narrative generation Y Wong, S Fan, Y Guo, Z Xu, K Stephen, R Sheoran, A Bhamidipati, ... Proceedings of the 30th ACM International Conference on Multimedia, 6875-6882, 2022 | 8 | 2022 |
NarSUM'22: 1st Workshop on User-centric Narrative Summarization of Long Videos M Kankanhalli, J Liu, Y Wong, K Stephen, R Sheoran, A Bhamidipati Proceedings of the 30th ACM International Conference on Multimedia, 7400-7401, 2022 | | 2022 |
A Study on Reconstruction Vulnerability of Daugman's Iriscode SJ Youn, BVS Anusha, GY Kim Journal of The Korea Society of Computer and Information 24 (2), 35-40, 2019 | | 2019 |
A Study of Security Vulnerability of Iriscode SJ Youn, BVS Anusha, GY Kim Proceedings of the Korea Information Processing Society Conference, 193-195, 2018 | | 2018 |