Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving verification accuracy by synthesis of locally enhanced biometric images and deformable model, , and . Signal Processing, 87 (11): 2746--2764 (November 2007)Detox Loss: Fairness Constraints for Learning With Imbalanced Data., , , and . IEEE Trans. Biom. Behav. Identity Sci., 5 (2): 244-254 (2023)On Matching Faces with Alterations due to Plastic Surgery and Disguise., , , and . BTAS, page 1-7. IEEE, (2018)Learning A Shared Transform Model for Skull to Digital Face Image Matching., , , , and . BTAS, page 1-7. IEEE, (2018)Age Transformation for Improving Face Recognition Performance., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 576-583. Springer, (2007)Self-similarity representation of Weber faces for kinship classification., , and . BTAS, page 245-250. IEEE, (2012)Detecting medley of iris spoofing attacks using DESIST., , , , and . BTAS, page 1-6. IEEE, (2016)Automated clarity and quality assessment for latent fingerprints., , and . BTAS, page 1-6. IEEE, (2013)Leap signature recognition using HOOF and HOT features., , and . ICIP, page 5012-5016. IEEE, (2014)Incremental subclass discriminant analysis: A case study in face recognition., , , and . ICIP, page 593-596. IEEE, (2012)