UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-3 of 3 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
Feature denoising using joint sparse representation for in-car speech recognition Journal article
IEEE Signal Processing Letters, 2013,Volume: 20,Issue: 7,Page: 681-684
Authors:  Li W.;  Zhou Y.;  Poh N.;  Zhou F.;  Liao Q.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/21
Dictionary Training  In-car Speech Recognition  Log Mel-filter Bank (Mfb) Outputs  Sparse Representation