Walter J. Scheirer

According to our database1, Walter J. Scheirer authored at least 69 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Image Provenance Analysis at Scale.
IEEE Trans. Image Processing, 2018

The Extreme Value Machine.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

Convolutional Neural Networks for Subjective Face Attributes.
Image Vision Comput., 2018

The limits and potentials of deep learning for robotics.
I. J. Robotics Res., 2018

Trends and Controversies.
IEEE Intelligent Systems, 2018

Practical Text Phylogeny for Real-World Settings.
IEEE Access, 2018

UG^2: A Video Benchmark for Assessing the Impact of Image Restoration and Enhancement on Automatic Visual Recognition.
Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision, 2018

SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization.
Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision, 2018

To Frontalize or Not to Frontalize: Do We Really Need Elaborate Pre-processing to Improve Face Recognition?
Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision, 2018

Coupling Story to Visualization: Using Textual Analysis as a Bridge Between Data and Interpretation.
Proceedings of the 23rd International Conference on Intelligent User Interfaces, 2018

Visual Psychophysics for Making Face Recognition Algorithms More Explainable.
Proceedings of the Computer Vision - ECCV 2018, 2018

Verba Volant, Scripta Manent: An Open Source Platform for Collecting Data to Train OCR Models for Manuscript Studies.
Proceedings of the Digital Humanities 2018, 2018

2017
Extreme Value Theory-Based Methods for Visual Recognition
Synthesis Lectures on Computer Vision, Morgan & Claypool Publishers, 2017

Authorship Attribution for Social Media Forensics.
IEEE Trans. Information Forensics and Security, 2017

Neuron Segmentation Using Deep Complete Bipartite Networks.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

Déjà vu: Scalable place recognition using mutually supportive feature frequencies.
Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2017

Provenance filtering for multimedia phylogeny.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Spotting the difference: Context retrieval and analysis for improved forgery detection and localization.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

U-Phylogeny: Undirected provenance graph construction in the wild.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

SREFI: Synthesis of realistic example face images.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Predicting First Impressions with Deep Learning.
Proceedings of the 12th IEEE International Conference on Automatic Face & Gesture Recognition, 2017

Predicting First Impressions With Deep Learning.
Proceedings of the 12th IEEE International Conference on Automatic Face & Gesture Recognition, 2017

2016
The sense of a connection: Automatic tracing of intertextuality by meaning.
DSH, 2016

Fine-tuning Deep Belief Networks using Harmony Search.
Appl. Soft Comput., 2016

One-class slab support vector machine.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Report on the BTAS 2016 Video Person Recognition Evaluation.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

2015
Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials.
IEEE Trans. Information Forensics and Security, 2015

Model selection for Discriminative Restricted Boltzmann Machines through meta-heuristic techniques.
J. Comput. Science, 2015

Large-scale learning for media understanding.
EURASIP J. Image and Video Processing, 2015

On the Model Selection of Bernoulli Restricted Boltzmann Machines Through Harmony Search.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Fine-Tuning Convolutional Neural Networks Using Harmony Search.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2015

Improving Optimum-Path Forest Classification Using Confidence Measures.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2015

2014
Open set source camera attribution and device linking.
Pattern Recognition Letters, 2014

Good recognition is non-metric.
Pattern Recognition, 2014

Probability Models for Open Set Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2014

Perceptual Annotation: Measuring Human Vision to Improve Computer Vision.
IEEE Trans. Pattern Anal. Mach. Intell., 2014

Vision-based Simultaneous Localization and Mapping in Changing Outdoor Environments.
J. Field Robotics, 2014

Condition-invariant, top-down visual place recognition.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

Multi-class Open Set Recognition Using Probability of Inclusion.
Proceedings of the Computer Vision - ECCV 2014, 2014

Euterpe's Hidden Song: Patterns in Elegy.
Proceedings of the Digital Humanities 2014, 2014

2013
Toward Open Set Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Animal recognition in the Mojave Desert: Vision tools for field biologists.
Proceedings of the 2013 IEEE Workshop on Applications of Computer Vision, 2013

Modelling the Interpretation of Literary Allusion with Machine Learning Techniques.
Proceedings of the Digital Humanities 2013, 2013

Voice authentication using short phrases: Examining accuracy, security and privacy issues.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Learning for Meta-Recognition.
IEEE Trans. Information Forensics and Security, 2012

For your eyes only.
Proceedings of the IEEE Workshop on Applications of Computer Vision, 2012

Open Set Source Camera Attribution.
Proceedings of the 25th SIBGRAPI Conference on Graphics, Patterns and Images, 2012

PRIVV: Private remote iris-authentication with Vaulted Verification.
Proceedings of the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2012

Multi-attribute spaces: Calibration for attribute fusion and similarity search.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

Detecting and classifying scars, marks, and tattoos found in the wild.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Meta-Recognition: The Theory and Practice of Recognition Score Analysis.
IEEE Trans. Pattern Anal. Mach. Intell., 2011

Evidence of intertextuality: investigating Paul the Deacon's Angustae Vitae.
LLC, 2011

Vision of the unseen: Current trends and challenges in digital image and video forensics.
ACM Comput. Surv., 2011

Fusing with context: A Bayesian approach to combining descriptive attributes.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Visualizing Sound as Functional N-Grams in Homeric Greek Poetry.
Proceedings of the Digital Humanities 2011, 2011

2010
Beyond PKI: The Biocryptographic Key Infrastructure.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Robust Fusion: Extreme Value Theory for Recognition Score Normalization.
Proceedings of the Computer Vision, 2010

Evidence of Intertextuality: Investigating Paul the Deacon's.
Proceedings of the Digital Humanities 2010, 2010

FACE-GRAB: Face recognition with General Region Assigned to Binary operator.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2010

A taxonomy of face-models for system evaluation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2010

Face system evaluation toolkit: Recognition is harder than it seems.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

Correcting rolling-shutter distortion of CMOS sensors using facial feature detection.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

2009
Bipartite Biotokens: Definition, Implementation, and Analysis.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2008
Syntax vs. semantics: competing approaches to dynamic network intrusion detection.
IJSN, 2008

INSPEC2T: Inexpensive Spectrometer Color Camera Technology.
Proceedings of the 9th IEEE Workshop on Applications of Computer Vision (WACV 2008), 2008

Predicting biometric facial recognition failure with similarity surfaces and support vector machines.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

The Unseen Challenge data sets.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

2007
Revocable Fingerprint Biotokens: Accuracy and Security Analysis.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

2006
Network intrusion detection with semantics-aware capability.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006


  Loading...