|
Daniel Vos
|
Decision Tree Learning - Algorithms for Robust Prediction and Policy Optimization
|
January 6, 2025
|
|
Tianyu Li
|
Data Privacy in Supply Chains and
Machine Learning through Differential Privacy and Cryptography
|
December 20, 2024
|
|
Marina Krcek
|
Implementation Attacks Powered by
Artificial Intelligence
|
October 21, 2024
|
|
Rui Wang
|
Secure and Resilient Federated Learning
|
May 29, 2024
|
|
Jing Xu
|
Connecting the Dots:
Exploring Backdoor Attacks on Graph Neural Networkss
|
May 13, 2024
|
|
Huimin Li
|
Hw/Sw Co-Design for Security Systems and
the Investigation of Deep Learning-Based Side-Channel Analysis
|
April 17, 2024
|
|
Azqa Nadeem
|
Understanding Adversary Behavior via XAI:
Leveraging Sequence Clustering To Extract Threat Intelligence
|
April 2, 2024
|
|
Lichao Wu
|
The Circle of DL-SCA: Improving Deep Learning-based Side-channel Analysis
|
March 24, 2023
|
|
Kris Oosthoek
|
Quantifying Cybercriminal Bitcoin Abuse
|
February 6, 2023
|
|
Harm Griffioen
|
Cyber Threat Intelligence: Analysis of adversaries and their methods
|
September 30, 2022
|
|
Oguzhan Ersoy
|
Incentives and Cryptographic Protocols for Bitcoin-like Blockchains
|
September 7, 2021
|
|
Mark Roeling
|
Statistical Analysis in Cyberspace. Data Veracity, Completeness, and Clustering
|
June 7, 2021
|
|
Chibuike Ugwuoke
|
Privacy Threats and Cryptographic Solutions to Genome Data Processing
|
May 21, 2021
|
|
Gamze Tillem
|
Preserving Confidentiality in Data Analytics-as-a-Service
|
May 5, 2020
|
|
Majid Nateghizad
|
Efficient Cryptographic Building Blocks for Processing Private
Measures in e-Healthcare
|
November 28, 2019
|
|
Yuan Zeng
|
Distributed Speech Enhancement in Wireless Acoustic Sensor Networks
|
June 18, 2015
|
|
Jorge Martinez Castaneda
|
Low-complexity computer simulation of multichannel room impulse responses
|
November 22, 2013
|
|
Linjun Yang
|
Advanced Retrieval Models
for Web Image Search
|
July 9, 2013
|
|
Yue Shi
|
Ranking and Context-awareness in Recommender Systems
|
June 20, 2013
|
|
Stevan Rudinac
|
Advancing the Relevance Criteria for
Video Search and Visual Summarization
|
May 6, 2013
|
|
Cees Taal
|
Prediction and Optimization of Speech
Intelligibility in Adverse Conditions
|
January 25, 2013
|
|
Bartek Gedrojc
|
Private Computing
with Untrustworthy Proxies
|
October 4, 2011
|
|
Peter Jan Doets
|
Modeling Audio Fingerprints:
Structure, Distortion, Capacity
|
October 20, 2010
|
|
Stefan Borchert
|
Distributed Video Coding (DVC):
Motion estimation and DCT quantization in low complexity video compression Coding
|
June 30, 2010
|
|
Zeki Erkin
|
Secure Signal Processing:
Privacy Preserving Cryptographic Protocols for Multimedia
|
June 24, 2010
|
|
Lie Lu
|
Content Discovery from Composite Audio: An Unsupervised Approach
|
December 2, 2009
|
|
Jacco Taal
|
Resilient Video Coding for Wireless and Peer-to-peer Networks
|
October 2, 2007
|
|
Jan Ostergaard
|
Multiple-Description
Lattice Vector Quantization
|
June 18, 2007
|
|
Richard den Hollander
|
Random Sampling Methods for
Two-View Geometry Estimation
|
May 10, 2007
|
|
Ivo Shterev
|
Quantization-Based Watermarking:
Methods for Amplitude Scale Estimation, Security, and Linear Filtering Invariance
|
March 12, 2007
|
|
Omar Niemut
|
Rate-Distortion Optimal
Time-Frequency Decompositions for MDCT-based Audio Coding
|
November 14, 2006
|
|
Stelian Persa
|
Sensor Fusion in Head Pose Tracking
for Augmented Reality
|
June 6, 2006
|
|
Ivaylo Haratcherev
|
Application-oriented
Link Adaptation for IEEE 802.11
|
March 14, 2006
|
|
Kathy Cartrysse
|
Private Computing
and Mobile Code Systems
|
November 21, 2005
|
|
Hylke van Dijk
|
Democratic Processing:
Mastering the complexity of communicating systems
|
November 22, 2004
|
|
Iwan Setyawan
|
Geometric Distortion
In Image and Video watermarking:
Robustness and Perceptual Quality Impact
|
June 14, 2004
|
|
Stephan Mietens
|
Complexity Scalable
MPEG Encoding
|
February 18, 2004
|
|
Ioannis Patras
|
Object-based Video Segmentation
with Region Labeling
|
November 26, 2001
|
|
Frank Spaan
|
Error Resilient Compression
of Digital Video Data
|
April 3, 2000
|
|
Gerhard Langelaar
|
Real-time Watermarking Techniques
for Compressed Video Data
|
February 1, 2000
|
|
Alan Hanjalic
|
Vidual-Content Analysis
for Multimedia Retrieval Systems
|
December 7, 1999
|
|
Peter van Roosmalen
|
Restoration of Archived Film and Video
|
October 1, 1999
|
|
Manfred Ziegler
|
Region-based Analysis and Coding of Stereoscopic Video
|
October 13, 1997
|
|
Patrick van der Meer
|
Variable Bit Rate Compressed Video
|
March 3, 1997
|
|
Frank Bosveld
|
Hierarchical Video Compression using SBC
|
September 23, 1996
|
|
Ruggero Franich
|
Disparity Estimation in Stereoscopic Digital Images
|
September 3, 1996
|
|
Emmanuel Frimout
|
Fast Playback of Helical-scan Recorded MPEG Video
|
November 28, 1995
|
|
Richard Kleihorst
|
Noise Filtering of Image Sequences
|
October 10, 1994
|
|
Ricardo Belfor
|
Subsampling Methods for Image Sequence Coding
|
June 9, 1994
|