Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with occlusions in face recognition by region-based fusion., , , and . ICCST, page 1-6. IEEE, (2016)Analysis of Time Domain Information for Footstep Recognition., , , and . ISVC (1), volume 6453 of Lecture Notes in Computer Science, page 489-498. Springer, (2010)Mobile Passive Authentication through Touchscreen and Background Sensor Data., , , , , and . IWBF, page 1-6. IEEE, (2022)Toward Face Biometric De-identification using Adversarial Examples., , , , , , and . COMPSAC, page 723-728. IEEE, (2023)Analysing Facial Regions for Face Recognition Using Forensic Protocols., , and . PAAMS (Workshops), volume 365 of Communications in Computer and Information Science, page 223-230. Springer, (2013)Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation., , , , , , and . CoRR, (2023)Children Age Group Detection based on Human-Computer Interaction and Time Series Analysis., , , , , , , and . CoRR, (2024)Introduction to Presentation Attacks in Signature Biometrics and Recent Advances., , , , and . CoRR, (2023)Toward Face Biometric De-identification using Adversarial Examples., , , , , , and . CoRR, (2023)Feature exploration for biometric recognition using millimetre wave body images., , , , and . EURASIP J. Image Video Process., (2015)