1. Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. A comprehensive review of cy- ber security vulnerabilities, threats, attacks, and solutions;Aktu˘g SS;Electronics,2023
2. Zinelabidine, Boulkenafet: Jukka Komu- lainen, and Abdenour Hadid. face anti- spoofing based on color texture analysis, (2015)
3. Sebastian, B., Wang, X.: Mike Ben- dersky, and Marc Najork. An analysis of the softmax cross entropy loss for learning-to- rank with binary relevance. In Proceedings of the 2019 ACM SIGIR International Confer- ence on the Theory of Information Retrieval (ICTIR 2019), pages 75–78, (2019)
4. Chen, S., Wang, W., Xia, B., You, X., Cao, Z., Ding, W.: Cde-gan: Cooperative dual evolution based generative adversarial network, (2021)
5. Jash, Dalvi: Sanket Bafna, Devansh Bagaria, and Shyamal Virnodkar. A survey on face recognition systems (2022)