Author of the publication

On the vulnerability of face verification systems to hill-climbing attacks.

, , , , and . Pattern Recognit., 43 (3): 1027-1038 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LBP - TOP Based Countermeasure against Face Spoofing Attacks., , , and . ACCV Workshops (1), volume 7728 of Lecture Notes in Computer Science, page 121-132. Springer, (2012)On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing., , , and . ICB, page 75-81. IEEE, (2018)On the vulnerability of palm vein recognition to spoofing attacks., and . ICB, page 319-325. IEEE, (2015)Improving face authentication using virtual samples., , and . ICASSP (3), page 233-236. IEEE, (2003)Towards Directly Modeling Raw Speech Signal for Speaker Verification Using CNNS., , and . ICASSP, page 4884-4888. IEEE, (2018)Domain Adaptation in Multi-Channel Autoencoder based Features for Robust Face Anti-Spoofing., , and . ICB, page 1-8. IEEE, (2019)Vulnerability assessment and detection of Deepfake videos., and . ICB, page 1-6. IEEE, (2019)Confidence measures for multimodal identity verification., , , and . Inf. Fusion, 3 (4): 267-276 (2002)Deeply vulnerable: a study of the robustness of face recognition to presentation attacks., , and . IET Biom., 7 (1): 15-26 (2018)The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database., , , , and . CoRR, (2020)