Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing., , , and . ICB, page 75-81. IEEE, (2018)Construction project risk assessment using combined fuzzy and FMEA., and . IFSA/NAFIPS, page 232-237. IEEE, (2013)Eigenvoice speaker adaptation with minimal data for statistical speech synthesis systems using a MAP approach and nearest-neighbors., , and . IEEE ACM Trans. Audio Speech Lang. Process., 22 (12): 2146-2157 (2014)Deeply vulnerable: a study of the robustness of face recognition to presentation attacks., , and . IET Biom., 7 (1): 15-26 (2018)Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles., , and . CoRR, (2022)Using Neural Network for Solving of On-Line Economic Dispatch Problem., and . CIMCA/IAWTIC, page 87. IEEE Computer Society, (2006)Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis., and . SIU, page 1-4. IEEE, (2013)Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles., , and . IEEE Trans. Inf. Forensics Secur., (2023)Spoofing Deep Face Recognition with Custom Silicone Masks., , and . BTAS, page 1-7. IEEE, (2018)Recent Advances in Face Presentation Attack Detection., , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)