Author of the publication

FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.

, , , , , , , and . SenSys, page 167-180. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Application Vulnerability to Soft Errors in Multi-level Cache Hierarchy., , , and . Euro-Par Workshops (2), volume 7156 of Lecture Notes in Computer Science, page 272-281. Springer, (2011)3D target location based on RFID polarization phase model., , , , , , , , , and 2 other author(s). EURASIP J. Wirel. Commun. Netw., 2022 (1): 17 (2022)An Unsupervised Crop Classification Method Based on Principal Components Isometric Binning., , , , , , , and . ISPRS Int. J. Geo Inf., 9 (11): 648 (2020)Alleviating Catastrophic Forgetting of Incremental Object Detection via Within-Class and Between-Class Knowledge Distillation., , , , , , and . ICCV, page 18848-18858. IEEE, (2023)Reducing Information Loss for Spiking Neural Networks., , , , , , , and . CoRR, (2023)Direct Learning-Based Deep Spiking Neural Networks: A Review., , and . CoRR, (2023)Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets., , , , , and . IACR Cryptol. ePrint Arch., (2021)Ternary Spike: Learning Ternary Spikes for Spiking Neural Networks., , , , , , and . AAAI, page 12244-12252. AAAI Press, (2024)Research on Similarity Simulation Experiment of Mine Pressure Appearance in Surface Gully Working Face Based on BOTDA., , , , and . Sensors, 23 (22): 9063 (November 2023)FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge., , , , , , , and . SenSys, page 167-180. ACM, (2023)