Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security evaluation of biometric authentication systems under real spoofing attacks., , , , and . IET Biom., 1 (1): 11-24 (2012)Audio-Visual Multimedia Quality Assessment: A Comprehensive Survey., and . IEEE Access, (2017)Smart Navigation and Energy Management Framework for Autonomous Electric Vehicles in Complex Environments., , , , , and . IEEE Internet Things J., 10 (21): 18641-18650 (November 2023)Gabor filter bank with deep autoencoder based face recognition system., , , and . Expert Syst. Appl., (2022)Deep learning-driven palmprint and finger knuckle pattern-based multimodal Person recognition system., , , and . Multim. Tools Appl., 81 (8): 10961-10980 (2022)Symmetric sum-based biometric score fusion., , and . IET Biom., 7 (5): 391-395 (2018)Combining Multiple Biometric Traits Using Asymmetric Aggregation Operators for Improved Person Recognition., , , , , , and . Symmetry, 12 (3): 444 (2020)Biometric Liveness Detection: Challenges and Research Opportunities., , and . IEEE Secur. Priv., 13 (5): 63-72 (2015)Face Spoof Attack Recognition Using Discriminative Image Patches., and . J. Electr. Comput. Eng., (2016)A deep learning platooning-based video information-sharing Internet of Things framework for autonomous driving systems., , , and . Int. J. Distributed Sens. Networks, (2019)