C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Face Presentation Attack Detection Based on Exclusivity Regularized Attention Maps.
Yong Wu
Qijun Zhao
Published in:
ICCAI (2019)
Keyphrases
</>
attack detection
multistage
intrusion detection system
attack scenarios
anomaly detection
product recommendation
data mining
feature extraction
cloud computing