Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing., and . CoRR, (2020)An alternative scanning strategy to detect faces., and . ICASSP, page 2122-2125. IEEE, (2010)Anti-spoofing, Face Databases., , and . Encyclopedia of Biometrics, Springer US, (2015)Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection., , , , , , , and . IEEE Access, (2023)Alternative search techniques for face detection using location estimation and binary features., and . Comput. Vis. Image Underst., 117 (5): 551-570 (2013)A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers., , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 241-254 (2012)Biometrics Security and Privacy Protection From the Guest Editors., , , and . IEEE Signal Process. Mag., 32 (5): 17-18 (2015)Haar Local Binary Pattern Feature for Fast Illumination Invariant Face Detection., and . BMVC, page 1-12. British Machine Vision Association, (2009)Speaker Inconsistency Detection in Tampered Video., and . EUSIPCO, page 2375-2379. IEEE, (2018)Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS., , and . AVBPA, volume 2688 of Lecture Notes in Computer Science, page 911-920. Springer, (2003)