Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hessian-based robust ray-tracing of implicit surfaces on GPU., , and . SIGGRAPH Asia Technical Briefs, page 16:1-16:4. ACM, (2018)Adversarial Attacks Against Face Recognition: A Comprehensive Study., , and . IEEE Access, (2021)Algorithmic Fairness in Face Morphing Attack Detection., , and . CoRR, (2021)Deep Composite Face Image Attacks: Generation, Vulnerability and Detection., and . CoRR, (2022)Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins., , , and . IWBF, page 1-6. IEEE, (2023)ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation., , , , , , , , and . ISVC (1), volume 13017 of Lecture Notes in Computer Science, page 251-264. Springer, (2021)Unsupervised Real-World Super-resolution Using Variational Auto-encoder and Generative Adversarial Network., , , , , , and . ICPR Workshops (2), volume 12662 of Lecture Notes in Computer Science, page 703-718. Springer, (2020)Multimodal person verification system using face and speech., , and . Biometrics Technology, volume 2 of Procedia Computer Science, page 181-187. Elsevier, (2010)Fusion of Deep Features for Differential Face Morphing Attack Detection at Automatic Border Control Gates., and . EUVIP, page 1-5. IEEE, (2022)Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging., , , , , and . IEEE Access, (2020)