Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of Features., , , , and . ICCST, page 1-6. IEEE, (2019)Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?, , , and . Wirel. Commun. Mob. Comput., (2018)Vulnerabilities of biometric systems integrated in mobile devices: An evaluation., , , and . ICCST, page 1-8. IEEE, (2016)Improving Presentation Attack Detection in Dynamic Handwritten Signature Biometrics., , , and . IEEE Access, (2017)Performing a Presentation Attack Detection on Voice Biometrics., , , and . ICCST, page 1-5. IEEE, (2018)Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent Fingerprint., , , and . ICCST, page 1-5. IEEE, (2018)Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment., , , and . CISIS, volume 1267 of Advances in Intelligent Systems and Computing, page 316-326. Springer, (2020)Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries., , , and . ICCST, page 373-378. IEEE, (2015)Low-Cost and Efficient Hardware Solution for Presentation Attack Detection in Fingerprint Biometrics Using Special Lighting Microscopes., , , and . IEEE Access, (2019)The Mobile Pass Project: A User Interaction Evaluation., , , and . IEEE Trans. Hum. Mach. Syst., 48 (3): 311-315 (2018)