Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permutation-based biometric authentication protocols for mitigating replay attacks., , , and . IEEE Congress on Evolutionary Computation, page 1-5. IEEE, (2012)Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection., , , , , and . GECCO (Companion), page 1521-1522. ACM, (2012)A comparison of GEC-based feature selection and weighting for multimodal biometric recognition., , , , , , , , , and . IEEE Congress on Evolutionary Computation, page 2725-2728. IEEE, (2011)A comparison of genetic feature selection and weighting techniques for multi-biometric recognition., , , , , , , , and . ACM Southeast Regional Conference, page 205-208. ACM, (2011)GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition., , , , , , , and . MAICS, volume 710 of CEUR Workshop Proceedings, page 86-90. CEUR-WS.org, (2011)Pixel Consistency, K-Tournament Selection, and Darwinian-Based Feature Extraction., , , , , and . MAICS, volume 841 of CEUR Workshop Proceedings, page 126-130. CEUR-WS.org, (2012)Mitigating replay attacks using Darwinian-based Feature Extraction., , , , , , and . CISDA, page 1-7. IEEE, (2012)GEC-based multi-biometric fusion., , , , , , , and . IEEE Congress on Evolutionary Computation, page 2071-2074. IEEE, (2011)