Subject
Hardware and Architecture,Information Systems,Signal Processing,Software
Reference163 articles.
1. I. Stylios, S. Kokolakis, O. Thanou, S. Chatzis, Behavioral biometrics & continuous user authentication on mobile devices: A survey, Inf. Fusion, 66, 76–99.
2. Face spoofing and counter-spoofing: A survey of state-of-the-art algorithms;Kisku;Trans. Mach. Learn. Artif. Intell.,2017
3. Critical features for face recognition;Abudarham;Cognition,2019
4. J. Yang, P. Ren, D. Zhang, D. Chen, F. Wen, H. Li, G. Hua, Neural aggregation network for video face recognition, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 4362–4371.
5. Presentation attack detection methods for face recognition systems: A comprehensive survey;Ramachandra;ACM Comput. Surv.,2017
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献