Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal., , , , and . ICB, page 1-8. IEEE, (2019)Generalized Presentation Attack Detection: a face anti-spoofing evaluation proposal., , , , and . CoRR, (2019)The Replay-Mobile Face Presentation-Attack Database., , , and . BIOSIG, volume P-260 of LNI, page 209-216. GI / IEEE, (2016)Entropy Econometrics for combining regional economic forecasts: A Data-Weighted Prior Estimator., and . J. Geogr. Syst., 19 (4): 349-370 (2017)Face presentation attack detection. A comprehensive evaluation of the generalisation problem., , , , and . IET Biom., 10 (4): 408-429 (2021)A competition on generalized software-based face presentation attack detection in mobile scenarios., , , , , , , , , and 35 other author(s). IJCB, page 688-696. IEEE, (2017)Built-in face recognition for smart photo sharing in mobile devices., , , and . ICME, page 1-4. IEEE Computer Society, (2011)Entropy of Gabor Filtering for Image Quality Assessment., , , and . ICIAR (1), volume 6111 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)