UM

浏览/检索结果: 共3条,第1-3条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
作者:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
收藏  |  浏览/下载:8/0  |  提交时间:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Fuzzy density weight-based support vector regression for image denoising Journal article
Information Sciences, 2016,Volume: 339,Page: 175-188
作者:  Zhang Y.;  Xu S.;  Chen K.;  Liu Z.;  Chen C.L.P.
收藏  |  浏览/下载:1/0  |  提交时间:2019/02/11
Fuzzy density weight  Image denoising  Least squares support vector regression  
One-unit second-order blind identification with reference for short transient signals Journal article
Information Sciences, 2013,Volume: 227,Page: 90-101
作者:  Liu H.;  Xie X.;  Xu S.;  Wan F.;  Hu Y.
收藏  |  浏览/下载:3/0  |  提交时间:2018/12/24
Blind Source Separation (Bss)  Constrained Blind Source Separation  Second Order Blind Identification (Sobi)  Second-order Blind Identification With Reference  Short Transient Signal