Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-spoofing, Evaluation Methodologies., , and . Encyclopedia of Biometrics, Springer US, (2015)Joint operation of voice biometrics and presentation attack detection., and . BTAS, page 1-6. IEEE, (2016)Deeply vulnerable: a study of the robustness of face recognition to presentation attacks., , and . IET Biom., 7 (1): 15-26 (2018)Enhancing Trust in eAssessment - the TeSLA System Solution., , , , and . CoRR, (2019)Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks., and . IEEE Trans. Inf. Forensics Secur., (2021)Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR., , , , , , , and . IEEE Trans. Biom. Behav. Identity Sci., 4 (1): 135-147 (2022)Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks., , , , and . IEEE Trans. Biom. Behav. Identity Sci., 2 (4): 399-409 (2020)Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features., , and . IEEE Trans. Biom. Behav. Identity Sci., 2 (1): 15-25 (2020)Evaluation Methodologies., , and . Handbook of Biometric Anti-Spoofing, Springer, (2014)On the use of automatically generated synthetic image datasets for benchmarking face recognition., , and . IJCB, page 1-8. IEEE, (2021)