Author of the publication

Novel palmprint representations for palmprint recognition.

, , , and . ICMV, volume 9445 of SPIE Proceedings, page 944505. SPIE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sparse Representation Based on Discriminant Locality Preserving Dictionary Learning for Face Recognition., , , and . IDEAL, volume 10585 of Lecture Notes in Computer Science, page 306-314. Springer, (2017)Codebook Design Optimization Based on Estimation of Distribution Algorithms., and . ICNC (5), page 481-484. IEEE Computer Society, (2008)A High and Efficient Sparse and Compressed Sensing-Based Security Approach for Biometric Protection., , , and . ICIC (2), volume 10362 of Lecture Notes in Computer Science, page 666-677. Springer, (2017)Automatic Design of Hierarchical TS-FS Model Using Ant Programming and PSO Algorithm., , and . AIMSA, volume 3192 of Lecture Notes in Computer Science, page 285-294. Springer, (2004)Face Anti-spoofing Algorithm Based on Gray Level Co-occurrence Matrix and Dual Tree Complex Wavelet Transform., , and . IDEAL, volume 10585 of Lecture Notes in Computer Science, page 192-200. Springer, (2017)Quantitative Estimation of Rainfall Rate Intensity Based on Deep Convolutional Neural Network and Radar Reflectivity Factor., , , , , and . ICBDT, page 244-247. ACM, (2019)EMN: An Edge Mask based Network for Building Detection from Remote Sensing Images., , , , , and . ICBDT, page 242-247. ACM, (2022)School-Enterprise Cooperative Innovation and Entrepreneurship Courses and Case Library of Emerging Engineering Education., , , , and . Edutainment, volume 11462 of Lecture Notes in Computer Science, page 263-267. Springer, (2018)Vision Transformer with Depth Auxiliary Information for Face Anti-spoofing., , , , and . ICONIP (3), volume 13625 of Lecture Notes in Computer Science, page 335-346. Springer, (2022)Automatic identification of vulnerable plaque based on flexible neural tree., , , , , , and . SPAC, page 242-245. IEEE, (2018)