1. Adler A (2004) Images can be regenerated from quantized biometric match score data. In: Proceedings of Canadian conference on electrical and computer engineering (CCECE), pp 469–472
2. Akhtar Z, Kale S, Alfarid N (2011) Spoof attacks in mutimodal biometric systems. In: Proceedings of international conference on information and network technology (IPCSIT), vol 4, pp 46–51. IACSIT Press
3. Alegre F, Vipperla R, Evans N, Fauve B (2012) On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings of European signal processing conference (EUSIPCO), pp 36–40
4. Anjos A, Günther M, de Freitas Pereira T, Korshunov P, Mohammadi A, Marcel S (2017) Continuously reproducing toolchains in pattern recognition and machine learning experiments. In: Proceedings of international conference on machine learning (ICML)
5. Anjos A, Shafey LE et al (2012) Bob: a free signal processing and machine learning toolbox for researchers. In: Proceedings ACM international conference on multimedia (ACM MM), pp 1449–1452