Follow
Anusha V.S. Bhamidipati
Title
Cited by
Cited by
Year
DeFraudNet: End2End fingerprint spoof detection using patch level attention
S Banerjee, S Chaudhuri
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2020
202020
Compute to tell the tale: Goal-driven narrative generation
Y Wong, S Fan, Y Guo, Z Xu, K Stephen, R Sheoran, A Bhamidipati, ...
Proceedings of the 30th ACM International Conference on Multimedia, 6875-6882, 2022
82022
NarSUM'22: 1st Workshop on User-centric Narrative Summarization of Long Videos
M Kankanhalli, J Liu, Y Wong, K Stephen, R Sheoran, A Bhamidipati
Proceedings of the 30th ACM International Conference on Multimedia, 7400-7401, 2022
2022
A Study on Reconstruction Vulnerability of Daugman's Iriscode
SJ Youn, BVS Anusha, GY Kim
Journal of The Korea Society of Computer and Information 24 (2), 35-40, 2019
2019
A Study of Security Vulnerability of Iriscode
SJ Youn, BVS Anusha, GY Kim
Proceedings of the Korea Information Processing Society Conference, 193-195, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–5