Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection., , , , , , , and . IEEE Access, (2023)Alternative search techniques for face detection using location estimation and binary features., and . Comput. Vis. Image Underst., 117 (5): 551-570 (2013)A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers., , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 241-254 (2012)On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing., and . CoRR, (2020)Master Face Attacks on Face Recognition Systems., , , and . CoRR, (2021)The Threat of Deepfakes to Computer and Human Visions., and . Handbook of Digital Face Manipulation and Detection, Springer, (2022)Evaluation Methodologies for Biometric Presentation Attack Detection., , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)Template Inversion Attack against Face Recognition Systems using 3D Face Reconstruction., and . ICCV, page 19605-19615. IEEE, (2023)Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation., and . IJCB, page 1-10. IEEE, (2023)Inversion of Deep Facial Templates using Synthetic Data., and . IJCB, page 1-8. IEEE, (2023)