Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy., , and . IJCB, page 302-310. IEEE, (2017)An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris., , and . WIFS, page 1-6. IEEE, (2020)Preserving privacy in speaker and speech characterisation., , , , , , , , , and 9 other author(s). Comput. Speech Lang., (2019)Introduction to Iris Presentation Attack Detection., , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection., , , , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)Variations of handwritten signatures with time: A sigma-lognormal analysis., , , , and . ICB, page 1-6. IEEE, (2013)Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm., , , and . ICB, page 40-45. IEEE, (2012)On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection., , , , and . ICB, page 1-6. IEEE, (2019)On the vulnerability of face recognition systems towards morphed face attacks., , , , , and . IWBF, page 1-6. IEEE, (2017)Fingerprint Presentation Attack Detection Method Based on a Bag-of-Words Approach., , , , and . CIARP, volume 10657 of Lecture Notes in Computer Science, page 263-271. Springer, (2017)