Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework Integrating Heterogeneous Databases for the Completion of Gene Networks., , , , and . IEEE Access, (2019)Open-set face identification with index-of-max hashing by learning., , , , , and . Pattern Recognit., (2020)Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System., , , , , , and . ICAIP, page 111-115. ACM, (2018)SLD-MAP: Surfel-Line Real-time Dense Mapping., , , , and . ICARCV, page 494-499. IEEE, (2022)Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes., , , and . IEEE Trans. Inf. Forensics Secur., (2021)R-IoM: Enhance Biometric Security with Redundancy-Reduced Hashcode Reliability., , , , , and . CCBR, volume 14463 of Lecture Notes in Computer Science, page 340-349. Springer, (2023)Alignment-Free Iris Cancellable Template Protection Scheme Based on Code-Blocks Encoding., , , , , and . CCBR, volume 14463 of Lecture Notes in Computer Science, page 291-300. Springer, (2023)Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition., , , , , and . FG, page 1-8. IEEE, (2021)Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition., , , , , , and . PRCV (5), volume 14429 of Lecture Notes in Computer Science, page 57-73. Springer, (2023)On the security risk of pre-image attack on cancelable biometrics., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (5): 102060 (2024)