default search action
Abhishek Nagar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c18]Saifeng Ni, Ran Luo, Yue Zhang, Madhukar Budagavi, Andrew Joseph Dickerson, Abhishek Nagar, Xiaohu Guo:
Scan2Avatar: Automatic Rigging for 3D Raw Human Scans. SIGGRAPH Posters 2020: 15:1-15:2
2010 – 2019
- 2016
- [c17]Dewan Fahim Noor, Zhu Li, Abhishek Nagar:
Robust object re-identification with Grassmann subspace feature for key points aggregation. ICIP 2016: 4260-4263 - 2015
- [c16]Zejia Zheng, Zhu Li, Abhishek Nagar, Kyungmo Park:
Compact deep neural networks for device based image classification. ICME Workshops 2015: 1-6 - [c15]Abhishek Nagar, Xu Zhu:
Gesture control by wrist surface electromyography. PerCom Workshops 2015: 556-561 - [p2]Zejia Zheng, Zhu Li, Abhishek Nagar:
Compact Deep Neural Networks for Device-Based Image Classification. Mobile Cloud Visual Media Computing 2015: 201-217 - 2014
- [c14]Victor Fragoso, Gaurav Srivastava, Abhishek Nagar, Zhu Li, Kyungmo Park, Matthew A. Turk:
Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation. CVPR Workshops 2014: 126-131 - [c13]Abhishek Nagar, Zhu Li, Gaurav Srivastava, Kyungmo Park:
AKULA - Adaptive Cluster Aggregation for Visual Search. DCC 2014: 13-22 - [c12]Ramya Srinivasan, Abhishek Nagar, Anshuman Tewari, Donato Mitrani, Amit K. Roy-Chowdhury:
Face recognition based on SIGMA sets of image features. ICASSP 2014: 499-503 - 2013
- [j5]Xin Xin, Abhishek Nagar, Gaurav Srivastava, Zhu Li, Felix C. A. Fernandes, Aggelos K. Katsaggelos:
Large Visual Repository Search with Hash Collision Design Optimization. IEEE Multim. 20(2): 62-71 (2013) - [c11]Serhat Selcuk Bucak, Ankur Saxena, Abhishek Nagar, Felix C. A. Fernandes, Kong-Posh Bhat:
Mid-level feature based local descriptor selection for image search. VCIP 2013: 1-6 - [c10]Abhishek Nagar, Ankur Saxena, Serhat Selcuk Bucak, Felix C. A. Fernandes, Kong-Posh Bhat:
Low complexity image matching using color based SIFT. VCIP 2013: 1-6 - [p1]Anil K. Jain, Karthik Nandakumar, Abhishek Nagar:
Fingerprint Template Protection: From Theory to Practice. Security and Privacy in Biometrics 2013: 187-214 - 2012
- [j4]Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
Multibiometric Cryptosystems Based on Feature-Level Fusion. IEEE Trans. Inf. Forensics Secur. 7(1): 255-268 (2012) - [j3]Abhishek Nagar, Heeseung Choi, Anil K. Jain:
Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach. IEEE Trans. Inf. Forensics Secur. 7(6): 1752-1765 (2012) - 2011
- [c9]Heeseung Choi, Abhishek Nagar, Anil K. Jain:
On the evidential value of fingerprints. IJCB 2011: 1-8 - 2010
- [j2]Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognit. Lett. 31(8): 733-741 (2010) - [c8]Abhishek Nagar, Shantanu Rane, Anthony Vetro:
Privacy and security of features extracted from minutiae aggregates. ICASSP 2010: 1826-1829 - [c7]Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
Biometric template transformation: a security analysis. Media Forensics and Security 2010: 75410O - [c6]Abhishek Nagar, Shantanu Rane, Anthony Vetro:
Alignment and bit extraction for secure fingerprint biometrics. Media Forensics and Security 2010: 75410N
2000 – 2009
- 2009
- [c5]Abhishek Nagar, Anil K. Jain:
On the security of non-invertible fingerprint template transforms. WIFS 2009: 81-85 - 2008
- [j1]Anil K. Jain, Karthik Nandakumar, Abhishek Nagar:
Biometric Template Security. EURASIP J. Adv. Signal Process. 2008 (2008) - [c4]Anil K. Jain, Jianjiang Feng, Abhishek Nagar, Karthik Nandakumar:
On matching latent fingerprints. CVPR Workshops 2008: 1-8 - [c3]Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
Securing fingerprint template: Fuzzy vault with minutiae descriptors. ICPR 2008: 1-4 - 2007
- [c2]Karthik Nandakumar, Abhishek Nagar, Anil K. Jain:
Hardening Fingerprint Fuzzy Vault Using Password. ICB 2007: 927-937 - 2006
- [c1]Abhishek Nagar, Santanu Chaudhury:
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme. ICPR (4) 2006: 537-540
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint