Author of the publication

Face Spoof Detection With Image Distortion Analysis.

, , and . IEEE Trans. Inf. Forensics Secur., 10 (4): 746-761 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Search Approach Based on Query Similarity in Content-Centric Networks., , and . APNOMS, page 1-4. IEEE, (2019)Joint Optimization of Pico-Base-Station Density and Transmit Power for an Energy-Efficient Heterogeneous Cellular Network., , , and . Future Internet, 11 (10): 208 (2019)Big Data-Based Attack Scenario Reconstruction Architecture in Smart Grid., , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 1178-1187. Springer, (2018)On S-(p, q)-Dyck paths., , and . Ars Comb., (2016)Transforming Device Fingerprinting for Wireless Security via Online Multitask Metric Learning., , , and . IEEE Internet Things J., 7 (1): 208-219 (2020)Emotion Recognition from Physiological Signals using Multi-Hypergraph Neural Networks., , , and . ICME, page 610-615. IEEE, (2019)Automated Systolic Array Architecture Synthesis for High Throughput CNN Inference on FPGAs., , , , , , , and . DAC, page 29:1-29:6. ACM, (2017)Depth Estimation Using a Sliding Camera., , , and . IEEE Trans. Image Processing, 25 (2): 726-739 (2016)Large-Scale Automatic Identification of Industrial Vacant Land., , , , and . ISPRS Int. J. Geo Inf., 12 (10): 409 (October 2023)Mining Mobile Intelligence for Wireless Systems: A Deep Neural Network Approach., , and . IEEE Comput. Intell. Mag., 15 (1): 24-31 (2020)