Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference44 articles.
1. 30107-3:2017(en) I (2017) Information technology – biometric presentation attack detection – part 3: Testing and reporting
2. Abhyankar A, Schuckers S (2009) Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn 42(3):452–464
3. Arjovsky M, Bottou L (2017) Towards principled methods for training generative adversarial networks. In: 5th International Conference on Learning Representations (ICLR), pp 1–17
4. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: 34th International Conference on Machine Learning (ICML), pp 214–223
5. Arora S (2019) Fingerprint spoofing detection to improve customer security in mobile financial applications using deep learning. Arab J Sci Eng 45(4):2847–2863
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献