• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Face morphing attack detection and attacker identification based on a watchlist.

Fei PengLe QinMin Long
Published in: Signal Process. Image Commun. (2022)
Keyphrases
  • attack detection
  • attack scenarios
  • multistage
  • intrusion detection system
  • intrusion detection
  • network security
  • cyber attacks
  • reinforcement learning
  • dynamic programming
  • data processing
  • product recommendation