Author of the publication

A Survey on Unknown Presentation Attack Detection for Fingerprint.

, , , and . INTAP, volume 1382 of Communications in Computer and Information Science, page 189-202. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study of Astronomical Clock towers in Europe and China based on their detailed 3D modeling., and . DH, page 509-511. Alliance of Digital Humanities Organizations (ADHO), (2013)Pattern-Reconfigurable Cylindrical Dielectric Resonator Antenna Based on Parasitic Elements., , , and . IEEE Access, (2017)Nested Timed Automata with Frozen Clocks., , and . FORMATS, volume 9268 of Lecture Notes in Computer Science, page 189-205. Springer, (2015)Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones., and . ICBEA, page 18-23. ACM, (2018)Enhanced Performance of a Phosphorescent White LED CAP 64QAM VLC system utilizing Deep Neural Network (DNN) Post Equalization., , , and . ICCC, page 173-176. IEEE, (2019)CAT: A Customized Automata Toolkit., , , , and . QRS Companion, page 171-177. IEEE, (2016)Internet of Vehicle System Based on Automotive Headlight utilizing Probabilistic Shaping., , , , and . WCSP, page 1-4. IEEE, (2019)Multi-view Machines., , , and . WSDM, page 427-436. ACM, (2016)Size dependent oxygen buffering capacity of ceria nanocrystals, , , , , , and . Chemical Communications, 46 (11): 1887--1889 (2010)Corrigendum to "Development and investigation of efficient artificial bee colony algorithm for numerical function optimization" Appl. Soft Comput. 12(2012) 320-332., , and . Appl. Soft Comput., 13 (4): 2143 (2013)