Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach., , , and . Mach. Vis. Appl., 29 (8): 1269-1286 (2018)Generating Targeted Adversarial Attacks and Assessing their Effectiveness in Fooling Deep Neural Networks., , , and . SPCOM, page 1-5. IEEE, (2022)Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system., , and . MVA, page 39-42. IEEE, (2017)Increasing Transferability by Imposing Linearity and Perturbation in Intermediate Layer with Diverse Input Patterns., , , and . SPCOM, page 1-5. IEEE, (2022)A study on vulnerability and presentation attack detection in palmprint verification system., , and . Pattern Anal. Appl., 21 (3): 769-782 (2018)Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems., , and . ISBA, page 1-7. IEEE, (2019)A competition on generalized software-based face presentation attack detection in mobile scenarios., , , , , , , , , and 35 other author(s). IJCB, page 688-696. IEEE, (2017)Securing palm-vein sensors against presentation attacks using image noise residuals., and . J. Electronic Imaging, 27 (05): 053028 (2018)Enhancing Transferability of Adversarial Audio in Speaker Recognition Systems., , and . IbPRIA, volume 14062 of Lecture Notes in Computer Science, page 617-628. Springer, (2023)Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera., , and . ISBA, page 1-6. IEEE, (2016)