Author:
hamme Tim Van,Garofalo Giuseppe,Joos Sander,Preuveneers Davy,Joosen Wouter
Publisher
Springer International Publishing
Reference104 articles.
1. Livdet. https://livdet.org. Accessed 11 June 2020
2. Adler, A.: Images can be regenerated from quantized biometric match score data. In: Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No. 04CH37513), vol. 1, pp. 469–472. IEEE (2004)
3. Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: 2013 International Conference on Biometrics (ICB), pp. 1–7. IEEE (2013)
4. Lecture Notes in Computer Science;B Biggio,2012
5. Biggio, B., Russu, P., Didaci, L., Roli, F., et al.: Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag. 32(5), 31–41 (2015)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献