Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using deep learning techniques and genetic-based feature extraction for presentation attack mitigation., , and . Array, (2020)Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection., , , , , and . Int. J. Intell. Comput. Cybern., 6 (1): 4-20 (2013)Genetic and evolutionary methods for biometric feature reduction., , , , , , , , , and . Int. J. Biom., 4 (3): 220-245 (2012)Genetic & Evolutionary Biometric Security: Disposable Feature Extractors for Mitigating Biometric Replay Attacks., , , , , , , , and . CSER, volume 8 of Procedia Computer Science, page 351-360. Elsevier, (2012)Mutibiometric System Based on Game Theory., , , and . ICIAR, volume 9164 of Lecture Notes in Computer Science, page 194-199. Springer, (2015)Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection., , , , , and . GECCO (Companion), page 1521-1522. ACM, (2012)A brief survey on multispectral iris recognition., , and . IJAPR, 3 (4): 308-323 (2016)GEFeS: Genetic & evolutionary feature selection for periocular biometric recognition., , , , , , , , and . CIBIM, page 152-156. IEEE, (2011)A comparison of GEC-based feature selection and weighting for multimodal biometric recognition., , , , , , , , , and . IEEE Congress on Evolutionary Computation, page 2725-2728. IEEE, (2011)A secure one time password protocol schema., , and . Int. J. Inf. Priv. Secur. Integr., 3 (2): 75-95 (2017)