Author of the publication

FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning.

, , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Points of Interest and Visual Dictionaries for Automatic Retinal Lesion Detection., , , , and . IEEE Trans. Biomed. Eng., 59 (8): 2244-2253 (2012)A Kinect-Based Wearable Face Recognition System to Aid Visually Impaired Users., , , , , , , and . IEEE Trans. Hum. Mach. Syst., 47 (1): 52-64 (2017)Learning Generalized Deep Feature Representation for Face Anti-Spoofing., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (10): 2639-2652 (2018)Illuminant-Based Transformed Spaces for Image Forensics., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (4): 720-733 (2016)Information Forensics and Security: A quarter-century-long journey., , , , , , , , , and . IEEE Signal Process. Mag., 40 (5): 67-79 (July 2023)Ground-to-Aerial Viewpoint Localization via Landmark Graphs Matching., , , and . IEEE Signal Process. Lett., (2020)Assessing the Need for Referral in Automatic Diabetic Retinopathy Detection., , , , , and . IEEE Trans. Biomed. Eng., 60 (12): 3391-3398 (2013)Fast Local Spatial Verification for Feature-Agnostic Large-Scale Image Retrieval., , , , , , and . IEEE Trans. Image Process., (2021)Behavior Knowledge Space-Based Fusion for Copy-Move Forgery Detection., , , , , , and . IEEE Trans. Image Process., 25 (10): 4729-4742 (2016)Image Provenance Analysis at Scale., , , , , , , , and . CoRR, (2018)