Author of the publication

Contactless Fingerprint Recognition Based on Global Minutia Topology and Loose Genetic Algorithm.

, , and . IEEE Trans. Inf. Forensics Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Compound Loss Function With Shape Aware Weight Map for Microscopy Cell Segmentation., , and . IEEE Trans. Medical Imaging, 42 (5): 1278-1288 (May 2023)A Subgrid-Oriented Privacy-Preserving Microservice Framework Based on Deep Neural Network for False Data Injection Attack Detection in Smart Grids., , and . IEEE Trans. Ind. Informatics, 18 (3): 1957-1967 (2022)FingerGAN: A Constrained Fingerprint Generation Scheme for Latent Fingerprint Enhancement., , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (7): 8358-8371 (July 2023)Robust Fingerprint Matching Based on Convolutional Neural Networks., , and . MONAMI, volume 235 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 56-65. Springer, (2017)Representation Learning and Pattern Recognition in Cognitive Biometrics: A Survey., , , and . Sensors, 22 (14): 5111 (2022)Neural Architecture Search for Microscopy Cell Segmentation., and . MLMI@MICCAI, volume 12436 of Lecture Notes in Computer Science, page 542-551. Springer, (2020)Deep learning based automated latent fingerprint identification.. University of New South Wales, Sydney, Australia, (2019)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/63255).A Survey on 2D and 3D Contactless Fingerprint Biometrics: A Taxonomy, Review, and Future Directions., , and . IEEE Open J. Comput. Soc., (2021)A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications., , , and . CoRR, (2022)PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems., , , and . CoRR, (2022)