Folgen
Divya Velayudhan
Divya Velayudhan
Khalifa University
Bestätigte E-Mail-Adresse bei ku.ac.ae
Titel
Zitiert von
Zitiert von
Jahr
Deep fusion driven semantic segmentation for the automatic recognition of concealed contraband items
M Shafay, T Hassan, D Velayudhan, E Damiani, N Werghi
Proceedings of the 12th International Conference on Soft Computing and …, 2021
242021
Emotional speaker identification using a novel capsule nets model
AB Nassif, I Shahin, A Elnagar, D Velayudhan, A Alhudhaif, K Polat
Expert Systems with Applications 193, 116469, 2022
232022
Recent advances in baggage threat detection: A comprehensive and systematic survey
D Velayudhan, T Hassan, E Damiani, N Werghi
ACM Computing Surveys 55 (8), 1-38, 2022
182022
Baggage threat recognition using deep low-rank broad learning detector
D Velayudhan, T Hassan, AH Ahmed, E Damiani, N Werghi
2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON), 966-971, 2022
152022
Balanced affinity loss for highly imbalanced baggage threat contour-driven instance segmentation
A Ahmed, A Obeid, D Velayudhan, T Hassan, E Damiani, N Werghi
2022 IEEE International Conference on Image Processing (ICIP), 981-985, 2022
112022
Baggage threat detection under extreme class imbalance
A Ahmed, D Velayudhan, T Hassan, B Hassan, J Dias, N Werghi
2022 2nd International Conference on Digital Futures and Transformative …, 2022
52022
Programmable broad learning system to detect concealed and imbalanced baggage threats
M Shafay, T Hassan, A Ahmed, D Velayudhan, J Dias, N Werghi
2022 2nd International Conference on Digital Futures and Transformative …, 2022
52022
Two-phase approach for recovering images corrupted by Gaussian-plus-impulse noise
D Velayudhan, S Paul
2016 International Conference on Inventive Computation Technologies (ICICT), 2016
52016
Transformers for imbalanced baggage threat recognition
D Velayudhan, AH Ahmed, T Hassan, M Bennamoun, E Damiani, ...
2022 IEEE International Symposium on Robotic and Sensors Environments (ROSE …, 2022
32022
Enhancing security in X-ray baggage scans: A contour-driven learning approach for abnormality classification and instance segmentation
A Ahmed, D Velayudhan, T Hassan, M Bennamoun, E Damiani, N Werghi
Engineering Applications of Artificial Intelligence 130, 107639, 2024
22024
Highly Imbalanced Baggage Threat Classification
A Ahmed, D Velayudhan, T Hassan, M Bennamoun, E Damiani, N Werghi
ICMLC '23: Proceedings of the 2023 15th International Conference on Machine …, 0
2*
Removal of random-valued impulse noise using detection filters and group sparse modeling
D Velayudhan, S Paul
2016 International Conference on Advances in Computing, Communications and …, 2016
12016
Incremental convolutional transformer for baggage threat detection
T Hassan, B Hassan, M Owais, D Velayudhan, J Dias, M Ghazal, ...
Pattern Recognition, 110493, 2024
2024
Autonomous Localization of X-Ray Baggage Threats via Weakly Supervised Learning
D Velayudhan, A Ahmed, T Hassan, N Gour, M Owais, M Bennamoun, ...
IEEE Transactions on Industrial Informatics, 2024
2024
Context-Aware Transformers for Weakly Supervised Baggage Threat Localization
D Velayudhan, A Ahmed, T Hassan, M Bennamoun, E Damiani, N Werghi
2023 IEEE International Conference on Image Processing (ICIP), 3538-3542, 2023
2023
Underwater Fish Tracking-by-Detection: An Adaptive Tracking Approach
D Velayudhan, A Ghimire, J Dias, N Werghi, S Javed
International Conference on Pattern Recognition, 504-515, 2022
2022
Underwater Fish Tracking via Detection: An Adaptive Tracking Approach
D Velayudhan, A Ghimire, S Javed, N Werghi
Detection Transformer Framework for Recognition of Heavily Occluded Suspicious Objects
A Ahmed, M Alansari, K Alnuaimi, D Velayudhan, T Hassan, N Werghi
2023 IEEE International Conference on Computational Intelligence and Virtual …, 0
Incremental Instance Segmentation for Cluttered Baggage Threat Detection
A Nasim, D Velayudhan, AH Ahmed, T Hassan, S Akcay, MU Akram, ...
2023 IEEE International Conference on Computational Intelligence and Virtual …, 0
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19