Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Iris Images through Asymmetric Digital Watermarking., , , and . AutoID, page 192-197. IEEE, (2007)Recurrent Embedding Aggregation Network for Video Face Recognition., , , and . CoRR, (2019)A Comparison of Human and Automated Face Verification Accuracy on Unconstrained Image Sets., , , , and . CVPR Workshops, page 229-236. IEEE Computer Society, (2016)Decision dependability and its application to identity management., , and . CSIIRW, page 68. ACM, (2009)Understanding Confounding Factors in Face Detection and Recognition., , , , and . ICB, page 1-8. IEEE, (2019)End-to-End Protocols and Performance Metrics For Unconstrained Face Recognition., , , and . ICB, page 1-8. IEEE, (2019)IARPA Janus Benchmark - C: Face Dataset and Protocol., , , , , , , , , and 1 other author(s). ICB, page 158-165. IEEE, (2018)A preliminary study on identifying sensors from iris images., , , and . CVPR Workshops, page 50-56. IEEE Computer Society, (2015)Grouper: Optimizing Crowdsourced Face Annotations., , , , and . CVPR Workshops, page 163-170. IEEE Computer Society, (2016)Identifying sensors from fingerprint images., , , and . CVPR Workshops, page 78-84. IEEE Computer Society, (2009)