Login / Signup
Iris Presentation Attack Detection: Where Are We Now?
Aidan Boyd
Zhaoyuan Fang
Adam Czajka
Kevin W. Bowyer
Published in:
CoRR (2020)
Keyphrases
</>
attack detection
multistage
intrusion detection system
iris recognition
cyber attacks
dynamic programming
attack scenarios
data mining techniques
data collection
information systems
state space
rough sets
access control
unsupervised learning
network security