Author of the publication

AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems.

, , , and . IJCB, page 1-10. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Coding Via a Nearest Neighbors Image Model.. IEEE Trans. Commun., 23 (3): 318-331 (1975)A Fast Karhunen-Loeve Transform for a Class of Random Processes.. IEEE Trans. Commun., 24 (9): 1023-1029 (1976)Fingerprint Recognition of Young Children., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1501-1514 (2017)Periocular Biometrics in the Visible Spectrum., , , and . IEEE Trans. Inf. Forensics Secur., 6 (1): 96-106 (2011)Design and Fabrication of 3D Fingerprint Targets., , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2284-2297 (2016)Face matching and retrieval using soft biometrics., and . IEEE Trans. Inf. Forensics Secur., 5 (3): 406-415 (2010)Fingerprint Spoof Detector Generalization., and . IEEE Trans. Inf. Forensics Secur., (2021)Evidence Accumulation Clustering Based on the K-Means Algorithm., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 442-451. Springer, (2002)Incorporating Image Quality in Multi-algorithm Fingerprint Verification., , , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 213-220. Springer, (2006)Fusion of Local and Regional Approaches for On-Line Signature Verification., , , and . IWBRS, volume 3781 of Lecture Notes in Computer Science, page 188-196. Springer, (2005)