Author of the publication

Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection.

, and . ICB, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REFICS: A Step Towards Linking Vision with Hardware Assurance., , , , and . WACV, page 3461-3470. IEEE, (2022)KinfaceNet: A New Deep Transfer Learning based Kinship Feature Extraction Framework., , , and . IJCB, page 1-10. IEEE, (2023)Head pose estimation in the wild using approximate view manifolds., and . CVPR Workshops, page 50-58. IEEE Computer Society, (2015)Physical Inspection & Attacks: New Frontier in Hardware Security., , , , , , and . IVSW, page 93-102. IEEE, (2018)Genetic-Based Type II Feature Extraction for Periocular Biometric Recognition: Less is More., , , , , and . ICPR, page 205-208. IEEE Computer Society, (2010)Personal Identification Utilizing Finger Surface Features., and . CVPR (2), page 1030-1036. IEEE Computer Society, (2005)Hybrid GAs for Eigen-based facial recognition., , , , , , , and . CIBIM, page 127-130. IEEE, (2011)GEFE: genetic & evolutionary feature extraction for periocular-based biometric recognition., , , , , and . ACM Southeast Regional Conference, page 44. ACM, (2010)Genetic based LBP feature extraction and selection for facial recognition., , , , , , , , and . ACM Southeast Regional Conference, page 197-200. ACM, (2011)SSGA & EDA based feature selection and weighting for face recognition., , , , , , and . IEEE Congress on Evolutionary Computation, page 1375-1381. IEEE, (2011)