Login / Signup

Face morphing attack detection and attacker identification based on a watchlist.

Fei PengLe QinMin Long
Published in: Signal Process. Image Commun. (2022)
Keyphrases
  • attack detection
  • attack scenarios
  • multistage
  • intrusion detection system
  • intrusion detection
  • network security
  • cyber attacks
  • reinforcement learning
  • dynamic programming
  • data processing
  • product recommendation