Login / Signup
Protection against adversarial attacks with randomization of recognition algorithm.
Grigory B. Marshalko
Svetlana Koreshkova
Published in:
J. Comput. Virol. Hacking Tech. (2024)
Keyphrases
</>
recognition algorithm
recognition process
countermeasures
iris recognition
palmprint
face databases
watermarking scheme
multi agent
privacy preserving
three dimensional
human identification
wireless sensor networks
watermarking algorithm
decomposition algorithm
palmprint recognition
kinect sensor