Face anti-spoofing countermeasure: Efficient 2D materials classification using polarization imaging
| Format: | Restricted Document |
|---|
Similar Items
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016)
by: Parveen, Sajida, et al.
Published: (2016)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
2024_Gender Spoofing Detection Using Gait Energy Image Spatial Based Features
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)
by: Li, Siling
Published: (2012)
Analysis and countermeasure to improve machine efficiency by using overall equipment effectiveness (OEE) method
by: Law, Jessica Ka Ing
Published: (2015)
by: Law, Jessica Ka Ing
Published: (2015)
Narrative dissidence, spoof videos and alternative memory in China
by: Li, Siling
Published: (2015)
by: Li, Siling
Published: (2015)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Automatic landmarking on 2.5D face range images
by: Pui, Suk Ting
Published: (2014)
by: Pui, Suk Ting
Published: (2014)
Automatic Landmarking on 2.5D Face Range Images
by: Pui, Suk Ting, et al.
Published: (2015)
by: Pui, Suk Ting, et al.
Published: (2015)
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
Towards automatic landmarking on 2.5D face range images
by: Pui, Suk Ting, et al.
Published: (2013)
by: Pui, Suk Ting, et al.
Published: (2013)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
by: Meng, Q., et al.
Published: (2019)
by: Meng, Q., et al.
Published: (2019)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
The study of dangers and countermeasures of fake news in social media
by: Xie, Yuting, et al.
Published: (2021)
by: Xie, Yuting, et al.
Published: (2021)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
by: Abdul Satar, Azwan
Published: (2007)
by: Abdul Satar, Azwan
Published: (2007)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Rotating orthogonal polarization imaging
by: Zhu, Qun
Published: (2009)
by: Zhu, Qun
Published: (2009)
Classification of Emotion and Polarity from Twitter Data
by: Hamad, Rebeen Ali
Published: (2016)
by: Hamad, Rebeen Ali
Published: (2016)
Multimodal 2D-3D face recognition
by: Nagi, Gawed M., et al.
Published: (2013)
by: Nagi, Gawed M., et al.
Published: (2013)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Weld Defect Classification Using Polar Radius Signature And Neural Network
by: Teow, Soo Pei
Published: (2005)
by: Teow, Soo Pei
Published: (2005)
Polarity Classification Tool for Sentiment Analysis in Malay Language
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2019)
by: Awang Abu Bakar, Normi Sham, et al.
Published: (2019)
A study of tyre cavity resonance noise mechanism and countermeasures using vibroacoustic analysis
by: Zamri, Mohamed
Published: (2014)
by: Zamri, Mohamed
Published: (2014)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Analyses of rain fade countermeasure technique time diversity at 26 GHz
by: Ismail, Ahmad Fadzil, et al.
Published: (2012)
by: Ismail, Ahmad Fadzil, et al.
Published: (2012)
Analyses of rain fade countermeasure technique time diversity at 38 GHz
by: M. Saad, Nor Wahida, et al.
Published: (2013)
by: M. Saad, Nor Wahida, et al.
Published: (2013)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
Reverse training: An efficient approach for image set classification
by: Hayat, M., et al.
Published: (2014)
by: Hayat, M., et al.
Published: (2014)
Forward-looking sonar image registration using polar transform
by: Zhang, J., et al.
Published: (2016)
by: Zhang, J., et al.
Published: (2016)
Adaptive skin color classification technique for color-based face detection systems using integral image
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
Similar Items
-
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016) -
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014) -
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009) - 2024_Gender Spoofing Detection Using Gait Energy Image Spatial Based Features
-
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)