Author of the publication

Face Spoof Detection With Image Distortion Analysis.

, , and . IEEE Trans. Inf. Forensics Secur., 10 (4): 746-761 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On S-(p, q)-Dyck paths., , and . Ars Comb., (2016)Joint Resource and Trajectory Optimization for Heterogeneous-UAVs Enabled Aerial-Ground Cooperative Computing Networks., , , , and . IEEE Trans. Veh. Technol., 72 (7): 8812-8826 (July 2023)A Full-Scale Connected CNN-Transformer Network for Remote Sensing Image Change Detection., , , , , , and . Remote. Sens., 15 (22): 5383 (November 2023)A Multi-Primitive-Based Hierarchical Optimal Approach for Semantic Labeling of ALS Point Clouds., , , and . Remote. Sens., 11 (10): 1243 (2019)Large-Scale Automatic Identification of Industrial Vacant Land., , , , and . ISPRS Int. J. Geo Inf., 12 (10): 409 (October 2023)Mining Mobile Intelligence for Wireless Systems: A Deep Neural Network Approach., , and . IEEE Comput. Intell. Mag., 15 (1): 24-31 (2020)Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning., , , and . IEEE Trans. Serv. Comput., 16 (2): 1310-1323 (March 2023)Energy-Efficient Resource Allocation for Mobile Edge Computing With Multiple Relays., , , , , and . IEEE Internet Things J., 9 (13): 10732-10750 (2022)Multi-UAV-Enabled Mobile-Edge Computing for Time-Constrained IoT Applications., , , , and . IEEE Internet Things J., 8 (20): 15553-15567 (2021)Big Data-Based Attack Scenario Reconstruction Architecture in Smart Grid., , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 1178-1187. Springer, (2018)