UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-2 of 2 Help

Filters                        
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Automatic image segmentation using salient key point extraction and star shape prior Journal article
Signal Processing, 2014,Volume: 105,Page: 122-136
Authors:  Liao X.;  Xu H.;  Zhou Y.;  Li K.;  Tao W.;  Guo Q.;  Liu L.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/21
Affinity Propagation Cluster  Graph Cut  Salient Point  Star Shape Prior  Unsupervised Image Segmentation