Esteban Rivera

Orcid: 0000-0002-1068-0623

According to our database1, Esteban Rivera authored at least 18 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Amplitude-Modulated Singular Value Decomposition for Ultrafast Ultrasound Imaging of Gas Vesicles.
IEEE Trans. Medical Imaging, August, 2025

VESPA: Towards un(Human)supervised Open-World Pointcloud Labeling for Autonomous Driving.
CoRR, July, 2025

Inconsistency-based Active Learning for LiDAR Object Detection.
CoRR, May, 2025

Scenario Understanding of Traffic Scenes Through Large Visual Language Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2025

HeAL3D: Heuristical-enhanced Active Learning for 3D Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2025

V3LMA: Visual 3D-enhanced Language Model for Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2025

2024
Camera-LiDAR Inconsistency Analysis for Active Learning in Object Detection.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

2023
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.
Int. J. Inf. Sec., December, 2023

Quantifying the LiDAR Sim-to-Real Domain Shift: A Detailed Investigation Using Object Detectors and Analyzing Point Clouds at Target-Level.
IEEE Trans. Intell. Veh., April, 2023

EDGAR: An Autonomous Driving Research Platform - From Feature Development to Real-World Application.
CoRR, 2023

2022
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms.
Comput. Secur., 2022

A Siamese Neural Network for Scalable Behavioral Biometrics Authentication.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Scalable and Secure HTML5 Canvas-Based User Authentication.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
A video-based vehicle counting system using an embedded device in realistic traffic conditions.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study.
Proceedings of the Pattern Recognition - 12th Mexican Conference, 2020

SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

Risk-based Authentication Based on Network Latency Profiling.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020


  Loading...