Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepRing: Protecting Deep Neural Network With Blockchain., , , , and . CVPR Workshops, page 2821-2828. Computer Vision Foundation / IEEE, (2019)Disguised Face Verification Using Inverse Disguise Quality., , , and . ECCV Workshops (6), volume 12540 of Lecture Notes in Computer Science, page 524-540. Springer, (2020)Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 41-46. IEEE Computer Society, (2017)Effect of illicit drug abuse on face recognition., , , , , and . WACV, page 1-7. IEEE Computer Society, (2016)When Sketch Face Recognition Meets Mask Obfuscation: Database and Benchmark., , , and . FG, page 1-5. IEEE, (2021)Evolutionary granular approach for recognizing faces altered due to plastic surgery., , , , and . FG, page 720-725. IEEE Computer Society, (2011)Scattering Transform for Matching Surgically Altered Face Images., , , and . ICPR, page 2215-2220. IEEE Computer Society, (2018)Face Recognition for Newborns, Toddlers, and Pre-School Children: A Deep Learning Approach., , and . ICPR, page 3156-3161. IEEE Computer Society, (2018)On Iris Spoofing Using Print Attack., , , and . ICPR, page 1681-1686. IEEE Computer Society, (2014)Likelihood ratio in a SVM framework: Fusing linear and non-linear face classifiers., , , and . CVPR Workshops, page 1-6. IEEE Computer Society, (2008)