Author:
Attia Abdelouahab,Chaa Mourad,Akhtar Zahid,Chahir Youssef
Publisher
Springer Science and Business Media LLC
Subject
Control and Optimization,Computer Science Applications,Modelling and Simulation,Control and Systems Engineering
Reference26 articles.
1. Adeoye OS (2010) A survey of emerging biometric technologies. Int J Comput Appl 9(10):1–5
2. Akhtar Z, Alfarid N (2011) Secure learning algorithm for multimodal biometric systems against spoof attacks. In: Proc. international conference on information and network technology (IPCSIT), vol. 4, pp 52–57
3. Akhtar Z, Fumera G, Marcialis GL, Roli F (2011) Robustness evaluation of biometric systems under spoof attacks. In: International conference on image analysis and processing, pp 159–168
4. Angelov PP, Gu X (2018) Deep rule-based classifier with human-level performance and characteristics. Inf Sci (Ny) 463–464:196–213
5. Bao R-J, Rong H-J, Angelov PP, Chen B, Wong PK (2018) Correntropy-based evolving fuzzy neural system. IEEE Trans Fuzzy Syst 26(3):1324–1338
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献