UM

Browse/Search Results:  1-2 of 2 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
An efficient image segmentation method based on a hybrid particle swarm algorithm with learning strategy Journal article
Information Sciences, 2016,Volume: 369,Page: 500-521
Authors:  Gao H.;  Pun C.-M.;  Kwong S.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/14
Exchange Method  Learning Item  Particle Swarm Optimization  Threshold Image Segmentation