default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2018
- Mahdi Abavisani, Vishal M. Patel:
Adversarial domain adaptive subspace clustering. ISBA 2018: 1-8 - Fahad Alsolami, Bayan Alzahrani, Terrance E. Boult:
Cloud-ID-Screen: Secure fingerprint data in the cloud. ISBA 2018: 1-8 - Nawal Alsufyani, Asad Ali, Sanaul Hoque, Farzin Deravi:
Biometrie presentation attack detection using gaze alignment. ISBA 2018: 1-8 - Yao Cheng, Hendra Saputra, Leng Meng Goh, Yongdong Wu:
Secure smart metering based on LoRa technology. ISBA 2018: 1-8 - Bingchen H. Guo, Mark S. Nixon, John N. Carter:
Fusion analysis of soft biometrics for recognition at a distance. ISBA 2018: 1-8 - Morgan Johnson, David Yambay, Dan Rissacher, Laura Holsopple, Stephanie Schuckers:
A longitudinal study of iris recognition in children. ISBA 2018: 1-7 - Rami Mohammad Jomaa, Md. Saiful Islam, Hassan Mathkour:
Improved sequential fusion of heart-signal and fingerprint for anti-spoofing. ISBA 2018: 1-7 - Pavel Korshunov, André R. Gonçalves, Ricardo P. V. Violato, Flávio Olmos Simões, Sébastien Marcel:
On the use of convolutional neural networks for speech presentation attack detection. ISBA 2018: 1-8 - Vedrana Krivokuca, Sébastien Marcel:
Towards quantifying the entropy of fingervein patterns across different feature extractors. ISBA 2018: 1-8 - Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous authentication using one-class classifiers and their fusion. ISBA 2018: 1-8 - Xiaofeng Liu, B. V. K. Vijaya Kumar, Yubin Ge, Chao Yang, Jane You, Ping Jia:
Normalized face image generation with perceptron generative adversarial networks. ISBA 2018: 1-8 - Xing Liu, Kar-Ann Toh:
A novel set of pixel difference-based features for pedestrian detection. ISBA 2018: 1-6 - Yuting Liu, Qijun Zhao, Zhihong Wu:
Pooling body parts on feature maps for misalignment robust person re-identification. ISBA 2018: 1-8 - Tempestt J. Neal, Damon L. Woodard:
A gender-specific behavioral analysis of mobile device usage data. ISBA 2018: 1-8 - Shi Pan, Farzin Deravi:
Facial biometrie presentation attack detection using temporal texture co-occurrence. ISBA 2018: 1-7 - Gayathri Manogna Parimi, Partha Pratim Kundu, Vir V. Phoha:
Analysis of head and torso movements for authentication. ISBA 2018: 1-8 - Xuan Qi, Chen Liu, Stephanie Schuckers:
CNN based key frame extraction for face in video recognition. ISBA 2018: 1-8 - Ramachandra Raghavendra, Narayan Vetrekar, Kiran B. Raja, Rajendra S. Gad, Christoph Busch:
Robust gender classification using extended multi-spectral imaging by exploring the spectral angle mapper. ISBA 2018: 1-8 - Vijay Rajanna, Adil Hamid Malla, Rahul Ashok Bhagat, Tracy Hammond:
DyGazePass: A gaze gesture-based dynamic authentication system to counter shoulder surfing and video analysis attacks. ISBA 2018: 1-8 - Avantika Singh, Vishesh Mistry, Dhananjay Yadav, Aditya Nigam:
GHCLNet: A generalized hierarchically tuned contact lens detection network. ISBA 2018: 1-8 - Le Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Privacy preserving IP traceback. ISBA 2018: 1-8 - Hassan Takabi, Yessir Hashem, Ram Dantu:
Prediction of human error using eye movements patterns for unintentional insider threat detection. ISBA 2018: 1-8 - Juan E. Tapia, C. Carlos Aravena:
Gender classification from periocular NIR images using fusion of CNNs models. ISBA 2018: 1-6 - Daksh Thapar, Aditya Nigam, Divyansh Aggarwal, Punjal Agarwal:
VGR-net: A view invariant gait recognition network. ISBA 2018: 1-8 - Chen Wu, Yuanlin Zhang, Yonghong Song:
Multi-view gait recognition using 2D-EGEI and NMF. ISBA 2018: 1-8 - IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018, Singapore, January 11-12, 2018. IEEE 2018, ISBN 978-1-5386-2248-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-13 13:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint