暂无分享,去创建一个
Andrew Beng Jin Teoh | Massimo Tistarelli | Xingbo Dong | Zhe Jin | Hanrui Wang | M. Tistarelli | A. Teoh | Hanrui Wang | Zhe Jin | Xingbo Dong
[1] Emre Kaplan,et al. Known Sample Attacks on Relation Preserving Data Transformations , 2020, IEEE Transactions on Dependable and Secure Computing.
[2] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[3] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[4] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Zhe Jin,et al. Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.
[6] Zhe Jin,et al. A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[7] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[8] Guoqiang Han,et al. Deep Secure Quantization: On secure biometric hashing against similarity-based attacks , 2019, Signal Process..
[9] Nicholas I. M. Gould,et al. A globally convergent Lagrangian barrier algorithm for optimization with general inequality constraints and simple bounds , 1997, Math. Comput..
[10] Kiyoung Moon,et al. Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[11] Patrick Lacharme,et al. A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing , 2020, IEEE Transactions on Information Forensics and Security.
[12] Pong C. Yuen,et al. Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..
[13] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[14] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Christophe Rosenberger,et al. Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[16] A. Lee Swindlehurst,et al. Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches , 2019, IEEE Transactions on Information Forensics and Security.
[17] Pritee Khanna,et al. Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features , 2019, IEEE Transactions on Information Forensics and Security.
[18] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[19] M. Kubát. An Introduction to Machine Learning , 2017, Springer International Publishing.
[20] Jung Yeon Hwang,et al. Open-set face identification with index-of-max hashing by learning , 2020, Pattern Recognit..
[21] H. Adeli,et al. Augmented Lagrangian genetic algorithm for structural optimization , 1994 .
[22] Christoph Busch,et al. Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).
[23] Zhe Jin,et al. A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[24] Charless C. Fowlkes,et al. Do We Need More Training Data? , 2015, International Journal of Computer Vision.
[25] Julian Fiérrez,et al. Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).