Login / Signup
Iris presentation attack detection: Where are we now?
Aidan Boyd
Zhaoyuan Fang
Adam Czajka
Kevin W. Bowyer
Published in:
Pattern Recognit. Lett. (2020)
Keyphrases
</>
attack detection
multistage
intrusion detection system
cyber attacks
iris recognition
attack scenarios
information systems
intrusion detection
product recommendation
data mining
association rules
data processing
network security