Author of the publication

FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.

, , , , , , , and . SenSys, page 167-180. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Best Practice of University and Community Cooperation in Open Source Software Project - TV Station Media Images Query System for Example., , , and . I-SPAN, page 346-349. IEEE, (2018)Fault Detection Based on Modified Kernel Semi-Supervised Locally Linear Embedding., , , and . IEEE Access, (2018)Distributed Control of Angle-constrained Circular Formations using Bearing-only Measurements, , , , and . CoRR, (2012)ROS+unity: An efficient high-fidelity 3D multi-UAV navigation and control simulator in GPS-denied environments., , , , and . IECON, page 2562-2567. IEEE, (2015)Real-time optical flow-based video stabilization for unmanned aerial vehicles., , , , , and . J. Real-Time Image Processing, 16 (6): 1975-1985 (2019)AETv2: AutoEncoding Transformations for Self-Supervised Representation Learning by Minimizing Geodesic Distances in Lie Groups., , , , and . CoRR, (2019)A Novel Positioning System of Potential WiFi Hotspots for Software Defined WiFi Network Planning., , and . CCNC, page 1-6. IEEE, (2019)Multi-view Locality Low-rank Embedding for Dimension Reduction., , and . Knowl. Based Syst., (2020)Fuzzy rough clustering for categorical data., , , and . Int. J. Machine Learning & Cybernetics, 10 (11): 3213-3223 (2019)Modeling and control of discrete event systems using finite state machines with variables and their applications in power grids., , , , , and . Syst. Control. Lett., 61 (1): 212-222 (2012)