Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Face Authentication Using Pixel-Based Weak Classifiers., and . ECCV Workshop BioAW, volume 3087 of Lecture Notes in Computer Science, page 24-31. Springer, (2004)Visual processing-inspired fern-audio features for noise-robust speaker verification., and . SAC, page 1491-1495. ACM, (2010)Domain Adaptation for Generalization of Face Presentation Attack Detection in Mobile Settengs with Minimal Information., , and . ICASSP, page 1001-1005. IEEE, (2020)Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets., , and . ICASSP, page 2947-2951. IEEE, (2020)Face Recognition Systems Under Spoofing Attacks., , , and . Face Recognition Across the Imaging Spectrum, Springer, (2016)Toward responsible face datasets: modeling the distribution of a disentangled latent space for sampling face images from demographic groups., , and . IJCB, page 1-11. IEEE, (2023)End-to-End convolutional neural network-based voice presentation attack detection., , and . IJCB, page 335-341. IEEE, (2017)Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation., , , and . IWBF, page 1-7. IEEE, (2018)Multispectral Deep Embeddings as a Countermeasure to Custom Silicone Mask Presentation Attacks., , and . IEEE Trans. Biom. Behav. Identity Sci., 1 (4): 238-251 (2019)Biometric Antispoofing Methods: A Survey in Face Recognition., , and . IEEE Access, (2014)