Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Trust in eAssessment - the TeSLA System Solution., , , , and . CoRR, (2019)LBP - TOP Based Countermeasure against Face Spoofing Attacks., , , and . ACCV Workshops (1), volume 7728 of Lecture Notes in Computer Science, page 121-132. Springer, (2012)On the vulnerability of palm vein recognition to spoofing attacks., and . ICB, page 319-325. IEEE, (2015)On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing., , , and . ICB, page 75-81. IEEE, (2018)Improving face authentication using virtual samples., , and . ICASSP (3), page 233-236. IEEE, (2003)Domain Adaptation in Multi-Channel Autoencoder based Features for Robust Face Anti-Spoofing., , and . ICB, page 1-8. IEEE, (2019)Vulnerability assessment and detection of Deepfake videos., and . ICB, page 1-6. IEEE, (2019)Towards Directly Modeling Raw Speech Signal for Speaker Verification Using CNNS., , and . ICASSP, page 4884-4888. IEEE, (2018)Confidence measures for multimodal identity verification., , , and . Inf. Fusion, 3 (4): 267-276 (2002)Anti-spoofing, Evaluation Methodologies., , and . Encyclopedia of Biometrics, Springer US, (2015)