Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2018
- Kai Cao, Anil K. Jain:
Latent Fingerprint Recognition: Role of Texture Template. BTAS 2018: 1-9 - Akshay Agarwal, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? BTAS 2018: 1-7 - Ewelina Bartuzi, Mateusz Trokielewicz:
Thermal Features for Presentation Attack Detection in Hand Biometrics. BTAS 2018: 1-6 - Sushil Bhattacharjee, Amir Mohammadi, Sébastien Marcel:
Spoofing Deep Face Recognition with Custom Silicone Masks. BTAS 2018: 1-7 - Vishnu Naresh Boddeti:
Secure Face Matching Using Fully Homomorphic Encryption. BTAS 2018: 1-10 - Philip Bontrager, Aditi Roy, Julian Togelius, Nasir D. Memon, Arun Ross:
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*. BTAS 2018: 1-9 - Cunjian Chen, Arun Ross:
Exploring the Use of IrisCodes for Presentation Attack Detection. BTAS 2018: 1-9 - Yujia Chen, Lingxiao Song, Yibo Hu, Ran He:
Adversarial Occlusion-aware Face Detection. BTAS 2018: 1-9 - Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremy M. Dawson, Nasser M. Nasrabadi:
ID Preserving Generative Adversarial Network for Partial Latent Fingerprint Reconstruction. BTAS 2018: 1-10 - Naser Damer, Alexandra Mosegui Saladie, Andreas Braun, Arjan Kuijper:
MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network. BTAS 2018: 1-10 - Naser Damer, Yaza Wainakh, Viola Boller, Sven von den Berken, Philipp Terhörst, Andreas Braun, Arjan Kuijper:
CrazyFaces: Unassisted Circumvention of Watchlist Face Identification. BTAS 2018: 1-9 - Abhijit Das, Chiara Galdi, Hu Han, Raghavendra Ramachandra, Jean-Luc Dugelay, Antitza Dantcheva:
Recent Advances in Biometric Technology for Mobile Devices. BTAS 2018: 1-11 - Debayan Deb, Susan Wiper, Sixue Gong, Yichun Shi, Cori Tymoszek, Alison Fletcher, Anil K. Jain:
Face Recognition: Primates in the Wild. BTAS 2018: 1-10 - Luca Debiasi, Christof Kauba, Bernhard Prommegger, Andreas Uhl:
Near-Infrared Illumination Add-On for Mobile Hand-Vein Acquisition. BTAS 2018: 1-9 - Luca Debiasi, Christian Rathgeb, Ulrich Scherhag, Andreas Uhl, Christoph Busch:
PRNU Variance Analysis for Morphed Face Image Detection. BTAS 2018: 1-9 - Xing Di, He Zhang, Vishal M. Patel:
Polarimetric Thermal to Visible Face Verification via Attribute Preserved Synthesis. BTAS 2018: 1-10 - Joshua J. Engelsma, Kai Cao, Anil K. Jain:
Fingerprint Match in Box. BTAS 2018: 1-10 - Rishabh Garg, Yashasvi Baweja, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa, Nalini K. Ratha:
Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition. BTAS 2018: 1-7 - Akhil Goel, Anirudh Singh, Akshay Agarwal, Mayank Vatsa, Richa Singh:
SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition. BTAS 2018: 1-7 - Guillaume Heusch, Sébastien Marcel:
Pulse-based Features for Face Presentation Attack Detection. BTAS 2018: 1-8 - Heinz Hofbauer, Ehsaneddin Jalilian, Ana Filipa Sequeira, James M. Ferryman, Andreas Uhl:
Mobile NIR Iris Recognition: Identifying Problems and Solutions. BTAS 2018: 1-9 - John J. Howard, Andrew J. Blanchard, Yevgeniy B. Sirotin, Jacob A. Hasselgren, Arun R. Vemury:
An Investigation of High-Throughput Biometric Systems: Results of the 2018 Department of Homeland Security Biometric Technology Rally. BTAS 2018: 1-7 - John J. Howard, Andrew J. Blanchard, Yevgeniy B. Sirotin, Jacob A. Hasselgren, Arun R. Vemury:
On Efficiency and Effectiveness Tradeoffs in High-Throughput Facial Biometric Recognition Systems. BTAS 2018: 1-7 - Yibo Hu, Lingxiao Song, Bing Yu, Ran He, Zhenan Sun:
Adversarial Embedding and Variational Aggregation for Video Face Recognition. BTAS 2018: 1-8 - Yi Huang, Adams Wai-Kin Kong, Kwok-Yan Lam:
From the Perspective of CNN to Adversarial Iris Images. BTAS 2018: 1-10 - Seyed Mehdi Iranmanesh, Hadi Kazemi, Sobhan Soleymani, Ali Dabouei, Nasser M. Nasrabadi:
Deep Sketch-Photo Face Recognition Assisted by Facial Attributes. BTAS 2018: 1-10 - Anubhav Jain, Richa Singh, Mayank Vatsa:
On Detecting GANs and Retouching based Synthetic Alterations. BTAS 2018: 1-7 - Nathan D. Kalka, Brianna Maze, James A. Duncan, Kevin OrConnor, Stephen J. Elliott, Kaleb Hebert, Julia Bryan, Anil K. Jain:
IJB-S: IARPA Janus Surveillance Video Benchmark. BTAS 2018: 1-9 - Mahmut Karakaya:
Deep Learning Frameworks for Off-Angle Iris Recognition. BTAS 2018: 1-8 - Christof Kauba, Bernhard Prommegger, Andreas Uhl:
Focussing the Beam - A New Laser Illumination Based Data Set Providing Insights to Finger-Vein Recognition. BTAS 2018: 1-9
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 13:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint