From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mobile Face Recognition Systems: Exploring Presentation Attack Vulnerability and Usability., , и . ICB, стр. 1-7. IEEE, (2019)Iris Image Compression Using Deep Convolutional Neural Networks., , и . Sensors, 22 (7): 2698 (2022)Segmentation-level Fusion for Iris Recogntion., , , и . BIOSIG, том P-245 из LNI, стр. 61-72. GI, (2015)Image metric-based biometric comparators: A supplement to feature vector-based Hamming distance?, , , и . BIOSIG, том P-196 из LNI, стр. 1-5. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.Selective encryption of the MC EZBC bitstream for DRM scenarios., и . MM&Sec, стр. 161-170. ACM, (2009)Exploring presentation attack vulnerability and usability of face recognition systems., , , и . IET Biom., 10 (2): 219-232 (2021)To recognize or not to recognize - A database of encrypted images with subjective recognition ground truth., , и . Inf. Sci., (2021)Deep Iris Compression., , и . ICPR Workshops (5), том 12665 из Lecture Notes in Computer Science, стр. 470-485. Springer, (2020)Isolating Iris Template Ageing in a Semi-Controlled Environment., , и . BIOSIG, том P-260 из LNI, стр. 369-376. GI / IEEE, (2016)To See or Not To See: Determining the Recognition Threshold of Encrypted Images., , и . EUVIP, стр. 1-6. IEEE, (2018)