Author of the publication

Improving Fusion with Margin-Derived Confidence in Biometric Authentication Tasks.

, and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 474-483. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-privacy biometric protection scheme using ensemble systems., , and . IJCNN, page 1-8. IEEE, (2015)Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps., , and . IEEE Trans. Pattern Anal. Mach. Intell., 29 (3): 492-498 (2007)The multiscenario multienvironment biosecure multimodal database (BMDB), , , , , , , , , and 22 other author(s). IEEE Trans Pattern Anal Mach Intell, 32 (6): 1097--1111 (2010)Breast Cancer Data Analytics With Missing Values: A study on Ethnic, Age and Income Groups, , , , and . (2015)cite arxiv:1503.03680Comment: The paper analyzes a breast cancer data with missing values, where the missing values of ethnicity are imputed based on a Naive Bayes classifier. Further, the data was analysed from domain purpose as well such as the effect of ethnicity, age, and income on the survival of the breast cancer.Facilitating free travel in the Schengen area - A position paper by the European Association for Biometrics., , , , , , , , , and 38 other author(s). IET Biom., 12 (2): 112-128 (March 2023)How do correlation and variance of base-experts affect fusion in biometric authentication tasks?, and . IEEE Trans. Signal Process., 53 (11): 4384-4396 (2005)Feature Denoising Using Joint Sparse Representation for In-Car Speech Recognition., , , , and . IEEE Signal Process. Lett., 20 (7): 681-684 (2013)The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks., , , , , , , , , and . ICB, page 513-518. IEEE, (2015)Privacy preservation, sharing and collection of patient records using cryptographic techniques for cross-clinical secondary analytics., , and . CICARE, page 148-153. IEEE, (2014)Fusion, Quality-Based.. Encyclopedia of Biometrics, Springer US, (2015)