Results 51 to 60 of about 89 (83)
Some of the next articles are maybe not open access.
Spoofing and countermeasures for speaker verification: A survey
Speech Communication, 2015Zhizheng Wu +2 more
exaly
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection
IEEE Transactions on Information Forensics and Security, 2015David Menotti +2 more
exaly
Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System
Sensors, 2018Yang Liu, Sihai Li, Qiangwen Fu
exaly
Spoofing Face Recognition With 3D Masks
IEEE Transactions on Information Forensics and Security, 2014Sébastien Marcel
exaly

