Abstract is missing.
- Adversarial domain adaptive subspace clusteringMahdi Abavisani, Vishal M. Patel. 1-8 [doi]
- Analysis of head and torso movements for authenticationGayathri Manogna Parimi, Partha Pratim Kundu, Vir V. Phoha. 1-8 [doi]
- A gender-specific behavioral analysis of mobile device usage dataTempestt J. Neal, Damon L. Woodard. 1-8 [doi]
- Towards quantifying the entropy of fingervein patterns across different feature extractorsVedrana Krivokuca, Sébastien Marcel. 1-8 [doi]
- Continuous authentication using one-class classifiers and their fusionRajesh Kumar, Partha Pratim Kundu, Vir V. Phoha. 1-8 [doi]
- A novel set of pixel difference-based features for pedestrian detectionXing Liu, Kar-Ann Toh. 1-6 [doi]
- Fusion analysis of soft biometrics for recognition at a distanceBingchen H. Guo, Mark S. Nixon, John N. Carter. 1-8 [doi]
- Gender classification from periocular NIR images using fusion of CNNs modelsJuan Tapia, C. Carlos Aravena. 1-6 [doi]
- Prediction of human error using eye movements patterns for unintentional insider threat detectionHassan Takabi, Yessir Hashem, Ram Dantu. 1-8 [doi]
- Biometrie presentation attack detection using gaze alignmentNawal Alsufyani, Asad Ali, Sanaul Hoque, Farzin Deravi. 1-8 [doi]
- Secure smart metering based on LoRa technologyYao Cheng, Hendra Saputra, Leng Meng Goh, Yongdong Wu. 1-8 [doi]
- Improved sequential fusion of heart-signal and fingerprint for anti-spoofingRami Mohammad Jomaa, Md. Saiful Islam, Hassan Mathkour. 1-7 [doi]
- Multi-view gait recognition using 2D-EGEI and NMFChen Wu, Yuanlin Zhang, Yonghong Song. 1-8 [doi]
- VGR-net: A view invariant gait recognition networkDaksh Thapar, Aditya Nigam, Divyansh Aggarwal, Punjal Agarwal. 1-8 [doi]
- Normalized face image generation with perceptron generative adversarial networksXiaofeng Liu, B. V. K. Vijaya Kumar, Yubin Ge, Chao Yang, Jane You, Ping Jia. 1-8 [doi]
- On the use of convolutional neural networks for speech presentation attack detectionPavel Korshunov, Andre R. Goncalves, Ricardo P. V. Violato, Flávio O. Simões, Sébastien Marcel. 1-8 [doi]
- GHCLNet: A generalized hierarchically tuned contact lens detection networkAvantika Singh, Vishesh Mistry, Dhananjay Yadav, Aditya Nigam. 1-8 [doi]
- A longitudinal study of iris recognition in childrenMorgan Johnson, David Yambay, Dan Rissacher, Laura Holsopple, Stephanie Schuckers. 1-7 [doi]
- Privacy preserving IP tracebackLe Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing. 1-8 [doi]
- Facial biometrie presentation attack detection using temporal texture co-occurrenceShi Pan, Farzin Deravi. 1-7 [doi]
- Robust gender classification using extended multi-spectral imaging by exploring the spectral angle mapperR. Raghavendra, Narayan Vetrekar, Kiran B. Raja, Rajendra S. Gad, Christoph Busch. 1-8 [doi]
- Pooling body parts on feature maps for misalignment robust person re-identificationYuting Liu, Qijun Zhao, Zhihong Wu. 1-8 [doi]
- DyGazePass: A gaze gesture-based dynamic authentication system to counter shoulder surfing and video analysis attacksVijay Rajanna, Adil Hamid Malla, Rahul Ashok Bhagat, Tracy Hammond. 1-8 [doi]
- Cloud-ID-Screen: Secure fingerprint data in the cloudFahad Alsolami, Bayan Alzahrani, Terranee E. Boult. 1-8 [doi]
- CNN based key frame extraction for face in video recognitionXuan Qi, Chen Liu, Stephanie Schuckers. 1-8 [doi]