Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of Identification Performance of Facial Regions from CCTV Images., , , , , and . IWCF, volume 8915 of Lecture Notes in Computer Science, page 83-91. Springer, (2014)Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation., , , , , , and . CoRR, (2023)Introduction to Presentation Attacks in Signature Biometrics and Recent Advances., , , , and . CoRR, (2023)Toward Face Biometric De-identification using Adversarial Examples., , , , , , and . CoRR, (2023)Feature exploration for biometric recognition using millimetre wave body images., , , , and . EURASIP J. Image Video Process., (2015)Children Age Group Detection based on Human-Computer Interaction and Time Series Analysis., , , , , , , and . CoRR, (2024)Comparative Analysis and Fusion of Spatiotemporal Information for Footstep Recognition., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 35 (4): 823-834 (2013)Analysing Facial Regions for Face Recognition Using Forensic Protocols., , and . PAAMS (Workshops), volume 365 of Communications in Computer and Information Science, page 223-230. Springer, (2013)Toward Face Biometric De-identification using Adversarial Examples., , , , , , and . COMPSAC, page 723-728. IEEE, (2023)IEEE BigData 2023 Keystroke Verification Challenge (KVC)., , , , , , , , , and 19 other author(s). IEEE Big Data, page 6092-6100. IEEE, (2023)