共 50 条
- [2] Poisoning attacks on face authentication systems by using the generative deformation model Multimedia Tools and Applications, 2023, 82 : 29457 - 29476
- [5] Node compromise attacks and network connectivity DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2007, 2007, 6578
- [6] Detection of attacks based on compromise marks 2022 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2022,
- [7] FACE VERIFICATION WITH CHANGEABLE TEMPLATES 2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 324 - 329
- [8] Face biometrics with renewable templates SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
- [9] Protected Honey Face Templates BIOSIG 2015 PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP, 2015,