Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-line signature recognition through the combination of real dynamic data and synthetically generated static data., , , , , and . Pattern Recognit., 48 (9): 2921-2934 (2015)SVC-onGoing: Signature verification competition., , , , , , , , , and 22 other author(s). Pattern Recognit., (2022)Morphing Attack Detection - Database, Evaluation Platform and Benchmarking., , , , , , , , , and 12 other author(s). CoRR, (2020)Anomaly Detection With Convolutional Autoencoders for Fingerprint Presentation Attack Detection., , , and . IEEE Trans. Biom. Behav. Identity Sci., 3 (2): 190-202 (2021)Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms., , , , and . Comput. Vis. Image Underst., 117 (10): 1512-1525 (2013)Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption., , , and . IWBF, page 1-6. IEEE, (2022)Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features., , , , and . ICB, page 501-506. IEEE, (2015)Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy., , and . IJCB, page 302-310. IEEE, (2017)Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication., , and . IET Biom., 10 (5): 457-459 (2021)A novel hand reconstruction approach and its application to vulnerability assessment., , , , , and . Inf. Sci., (2014)