Author of the publication

A Knowledge Enforcement Network-Based Approach for Classifying a Photographer's Images.

, , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (15): 2250046:1-2250046:29 (December 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation., , , , , and . Image Vis. Comput., (2020)Hessian-based robust ray-tracing of implicit surfaces on GPU., , and . SIGGRAPH Asia Technical Briefs, page 16:1-16:4. ACM, (2018)Multimodal Biometric Score Fusion Using Gaussian Mixture Model and Monte Carlo Method., , and . J. Comput. Sci. Technol., 25 (4): 771-782 (2010)Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging., , , , , and . IEEE Access, (2020)Adversarial Attacks Against Face Recognition: A Comprehensive Study., , and . IEEE Access, (2021)Texture based features for robust palmprint recognition: a comparative study., and . EURASIP J. Inf. Secur., (2015)DFCANet: Dense Feature Calibration-Attention Guided Network for Cross Domain Iris Presentation Attack Detection., , , and . CoRR, (2021)Deep Composite Face Image Attacks: Generation, Vulnerability and Detection., and . CoRR, (2022)Video Presentation Attack Detection in Visible Spectrum Iris Recognition Using Magnified Phase Information., , and . IEEE Trans. Inf. Forensics Secur., 10 (10): 2048-2056 (2015)3D Face Morphing Attacks: Generation, Vulnerability and Detection., and . CoRR, (2022)