Login / Signup
Face morphing attack detection and attacker identification based on a watchlist.
Fei Peng
Le Qin
Min Long
Published in:
Signal Process. Image Commun. (2022)
Keyphrases
</>
attack detection
attack scenarios
multistage
intrusion detection system
intrusion detection
network security
cyber attacks
reinforcement learning
dynamic programming
data processing
product recommendation