Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)PRNU-based detection of small-size image forgeries., , , , and . DSP, page 1-6. IEEE, (2011)Information fusion for computer security: State of the art and open issues., , , , and . Inf. Fusion, 10 (4): 274-284 (2009)Reconstruction of Car Crash Scenes Using a 3D Building and Query Algebra., , , and . SITIS, page 891-897. IEEE Computer Society, (2012)ECG databases for biometric systems: A systematic review., , , and . Expert Syst. Appl., (2017)A Multi-expert System for Movie Segmentation., , , , and . Multiple Classifier Systems, volume 2364 of Lecture Notes in Computer Science, page 304-313. Springer, (2002)Training convolutional neural networks for semantic classification of remote sensing imagery., , , and . JURSE, page 1-4. IEEE, (2017)A Multiple Classifier Approach for Detecting Naked Human Bodies in Images., and . ICIAP (2), volume 8157 of Lecture Notes in Computer Science, page 389-398. Springer, (2013)Combining Syntactic and Semantic Vector Space Models in the Health Domain by using a Clustering Ensemble., , , , and . HEALTHINF, page 382-385. SciTePress, (2013)A Graph-Based Method for Detecting and Classifying Clusters in Mammographic Images., , , , , and . SSPR/SPR, volume 4109 of Lecture Notes in Computer Science, page 484-493. Springer, (2006)