Author:
Wang Guangcheng,Wang Zhongyuan,Jiang Kui,Huang Baojin,He Zheng,Hu Ruimin
Funder
National Natural Science Foundation of China
Subject
Artificial Intelligence,Cognitive Neuroscience,Computer Science Applications
Reference52 articles.
1. Analysis of user-specific score characteristics for spoof biometric attacks;Rattani;2012 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW),2012
2. Spoofing and countermeasures for speaker verification: A survey;Wu;Speech Commun.,2015
3. Robust and high-security fingerprint recognition system using optical coherence tomography;Liu;Neurocomputing,2020
4. Fingerprints verification based on their spectrum;Kasban;Neurocomputing,2016
5. The white robber who carried out six raids disguised as a black man (2017). url:http://alturl.com/rvmqa.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献