Skip to main content

previous disabled Page of 7
and
  1. Article

    Open Access

    NeRF-FF: a plug-in method to mitigate defocus blur for runtime optimized neural radiance fields

    Neural radiance fields (NeRFs) have revolutionized novel view synthesis, leading to an unprecedented level of realism in rendered images. However, the reconstruction quality of NeRFs suffers significantly from...

    Tristan Wirth, Arne Rak, Max von Buelow, Volker Knauthe in The Visual Computer (2024)

  2. Article

    Open Access

    Ubiquitous multi-occupant detection in smart environments

    Recent advancements in ubiquitous computing have emphasized the need for privacy-preserving occupancy detection in smart environments to enhance security. This work presents a novel occupancy detection solutio...

    Daniel Fährmann, Fadi Boutros, Philipp Kubon in Neural Computing and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Distortion-Based Transparency Detection Using Deep Learning on a Novel Synthetic Image Dataset

    Transparency detection is a hard problem, as suggested by animals and humans flying or running into glass. However, humans seem to be able to learn and improve on the task with experience, begging the question...

    Volker Knauthe, Thomas Pöllabauer, Katharina Faller, Maurice Kraus in Image Analysis (2023)

  4. No Access

    Chapter and Conference Paper

    Acquisition of EFS and Capacitive Measurement Data on Low-Power and Connected IoT Devices

    In this extended version of the paper “Linoc: A Prototy** Platform for Capacitive and Passive Electrical Field Sensing” [15], the Linoc prototy** toolkit is presented in more detail, accompanied by evaluation...

    Julian von Wilmsdorff, Malte Lenhart, Florian Kirchbuchner in Sensor Networks (2022)

  5. Article

    Open Access

    The overlap** effect and fusion protocols of data augmentation techniques in iris PAD

    Iris Presentation Attack Detection (PAD) algorithms address the vulnerability of iris recognition systems to presentation attacks. With the great success of deep learning methods in various computer vision fie...

    Meiling Fang, Naser Damer, Fadi Boutros in Machine Vision and Applications (2021)

  6. No Access

    Chapter and Conference Paper

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...

    Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh in Advances in Visual Computing (2021)

  7. No Access

    Chapter and Conference Paper

    PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection

    A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks. Various methods have been propo...

    Naser Damer, Noémie Spiller, Meiling Fang, Fadi Boutros in Advances in Visual Computing (2021)

  8. No Access

    Chapter and Conference Paper

    Generalization of Fitness Exercise Recognition from Doppler Measurements by Domain-Adaption and Few-Shot Learning

    In previous works, a mobile application was developed using an unmodified commercial smartphone to recognize whole-body exercises. The working principle was based on the ultrasound Doppler sensing with the dev...

    Biying Fu, Naser Damer, Florian Kirchbuchner in Pattern Recognition. ICPR International Wo… (2021)

  9. No Access

    Chapter and Conference Paper

    AutoSNAP: Automatically Learning Neural Architectures for Instrument Pose Estimation

    Despite recent successes, the advances in Deep Learning have not yet been fully translated to Computer Assisted Intervention (CAI) problems such as pose estimation of surgical instruments. Currently, neural ar...

    David Kügler, Marc Uecker, Arjan Kuijper in Medical Image Computing and Computer Assis… (2020)

  10. No Access

    Chapter and Conference Paper

    Measurement Based AR for Geometric Validation Within Automotive Engineering and Construction Processes

    We look at the final stages of the automobile design process, during which the geometric validation process for a design, in particular for the vehicle front end, is examined. A concept is presented showing h...

    Muhammad Ali Shahid, Benjamin-Paul Jesche in Virtual, Augmented and Mixed Reality. Indu… (2020)

  11. No Access

    Chapter and Conference Paper

    NannyCaps - Monitoring Child Conditions and Activity in Automotive Applications Using Capacitive Proximity Sensing

    Children have to be transported safely. Securing children in a child seat is indicated. Due to structure and restraint systems, children are secured in case of an accident. Children require our attention to ke...

    Sebastian Frank, Arjan Kuijper in HCI International 2020 – Late Breaking Pap… (2020)

  12. No Access

    Chapter and Conference Paper

    Privacy by Design: Analysis of Capacitive Proximity Sensing as System of Choice for Driver Vehicle Interfaces

    Data collection is beneficial. Therefore, automotive manufacturers start including data collection services. At the same time, manufacturers install cameras for human machine interfaces in vehicles. But those ...

    Sebastian Frank, Arjan Kuijper in HCI International 2020 – Late Breaking Pap… (2020)

  13. No Access

    Article

    Automatic procedural model generation for 3D object variation

    3D objects are used for numerous applications. In many cases not only single objects but also variations of objects are needed. Procedural models can be represented in many different forms, but generally excel...

    Roman Getto, Arjan Kuijper, Dieter W. Fellner in The Visual Computer (2020)

  14. No Access

    Article

    Investigating large curved interaction devices

    Large interactive surfaces enable novel forms of interaction for their users, particularly in terms of collaborative interaction. During longer interactions, the ergonomic factors of interaction systems have t...

    Andreas Braun, Sebastian Zander-Walz, Martin Majewski in Personal and Ubiquitous Computing (2019)

  15. No Access

    Article

    Unsupervised privacy-enhancement of face representations using similarity-sensitive noise transformations

    Face images processed by a biometric system are expected to be used for recognition purposes only. However, recent work presented possibilities for automatically deducing additional information about an indivi...

    Philipp Terhörst, Naser Damer, Florian Kirchbuchner, Arjan Kuijper in Applied Intelligence (2019)

  16. Article

    Open Access

    Seamless and non-repetitive 4D texture variation synthesis and real-time rendering for measured optical material behavior

    We show how to overcome the single weakness of an existing fully automatic system for acquisition of spatially varying optical material behavior of real object surfaces. While the expression of spatially varyi...

    Martin Ritz, Simon Breitfelder, Pedro Santos, Arjan Kuijper in Computational Visual Media (2019)

  17. No Access

    Article

    Histograms of Gaussian normal distribution for 3D feature matching in cluttered scenes

    3D feature descriptors provide essential information to find given models in captured scenes. In practical applications, these scenes often contain clutter. This imposes severe challenges on the 3D object reco...

    Wei Zhou, Caiwen Ma, Tong Yao, Peng Chang, Qi Zhang, Arjan Kuijper in The Visual Computer (2019)

  18. No Access

    Article

    An experimental overview on electric field sensing

    Electric fields exist everywhere. They are influenced by living beings, conductive materials, and other charged entities. Electric field sensing is a passive capacitive measurement technique that detects chang...

    Julian von Wilmsdorff, Florian Kirchbuchner in Journal of Ambient Intelligence and Humani… (2019)

  19. No Access

    Article

    Performing indoor localization with electric potential sensing

    Location-based services or smart home applications all depend on an accurate indoor positioning system. Basically one divides these systems into token-based and token-free localization systems. In this work, w...

    Biying Fu, Florian Kirchbuchner in Journal of Ambient Intelligence and Humani… (2019)

  20. Chapter and Conference Paper

    Piggybacking Detection Based on Coupled Body-Feet Recognition at Entrance Control

    A major risk of an automated high-security entrance control is that an authorized person takes an unauthorized person into the secured area. This practice is called “piggybacking”. Known systems try to prevent...

    Dirk Siegmund, Vinh Phuc Tran in Progress in Pattern Recognition, Image Ana… (2019)

previous disabled Page of 7