Please use this identifier to cite or link to this item:
http://hdl.handle.net/10553/15082
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohan Chakka, Murali | en_US |
dc.contributor.author | Anjos, André | en_US |
dc.contributor.author | Marcel, Sébastien | en_US |
dc.contributor.author | Tronci, Roberto | en_US |
dc.contributor.author | Muntoni, Daniele | en_US |
dc.contributor.author | Fadda, Gianluca | en_US |
dc.contributor.author | Pili, Maurizio | en_US |
dc.contributor.author | Sirena, Nicola | en_US |
dc.contributor.author | Murgia, Gabriele | en_US |
dc.contributor.author | Ristori, Marco | en_US |
dc.contributor.author | Roli, Fabio | en_US |
dc.contributor.author | Yan, Junjie | en_US |
dc.contributor.author | Yi, Dong | en_US |
dc.contributor.author | Lei, Zhen | en_US |
dc.contributor.author | Zhang, Zhiwei | en_US |
dc.contributor.author | Li, Stan Z. | en_US |
dc.contributor.author | Schwartz, William Robson | en_US |
dc.contributor.author | Rocha, Anderson | en_US |
dc.contributor.author | Pedrini, Helio | en_US |
dc.contributor.author | Lorenzo-Navarro, Javier | en_US |
dc.contributor.author | Castrillón-Santana, Modesto | en_US |
dc.contributor.author | Määttä, Jukka | en_US |
dc.contributor.author | Hadid, Abdenour | en_US |
dc.contributor.author | Pietikäinen, Matti | en_US |
dc.date.accessioned | 2015-11-24T15:09:33Z | - |
dc.date.accessioned | 2018-06-15T09:21:25Z | - |
dc.date.available | 2015-11-24T15:09:33Z | - |
dc.date.available | 2018-06-15T09:21:25Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.isbn | 9781457713583 | en_US |
dc.identifier.uri | http://hdl.handle.net/10553/15082 | - |
dc.description.abstract | Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest. | es |
dc.language | eng | en_US |
dc.source | 2011 International Joint Conference on Biometrics, IJCB 2011 [ISBN 9781457713583] | en_US |
dc.subject | 120304 Inteligencia artificial | es |
dc.title | Competition on counter measures to 2-D facial spoofing attacks | en_US |
dc.type | info:eu-repo/semantics/conferenceObject | en_US |
dc.type | ConferenceObject | es |
dc.relation.conference | 2011 International Joint Conference on Biometrics, IJCB 2011 | |
dc.identifier.doi | 10.1109/IJCB.2011.6117509 | |
dc.identifier.scopus | 84862953522 | - |
dc.contributor.authorscopusid | 55264420900 | - |
dc.contributor.authorscopusid | 6506491800 | - |
dc.contributor.authorscopusid | 6603136018 | - |
dc.contributor.authorscopusid | 14017094000 | - |
dc.contributor.authorscopusid | 26030613600 | - |
dc.contributor.authorscopusid | 54911437000 | - |
dc.contributor.authorscopusid | 54912287000 | - |
dc.contributor.authorscopusid | 35090396800 | - |
dc.contributor.authorscopusid | 54912556600 | - |
dc.contributor.authorscopusid | 54914385900 | - |
dc.contributor.authorscopusid | 57194734588 | - |
dc.contributor.authorscopusid | 55265567300 | - |
dc.contributor.authorscopusid | 23135479100 | - |
dc.contributor.authorscopusid | 24280193100 | |
dc.contributor.authorscopusid | 57202066920 | - |
dc.contributor.authorscopusid | 55648280900 | - |
dc.contributor.authorscopusid | 34870116100 | - |
dc.contributor.authorscopusid | 7201885423 | - |
dc.contributor.authorscopusid | 16643616700 | - |
dc.contributor.authorscopusid | 6506736837 | - |
dc.contributor.authorscopusid | 15042453800 | - |
dc.contributor.authorscopusid | 22333278500 | - |
dc.contributor.authorscopusid | 54913926800 | - |
dc.contributor.authorscopusid | 55925650500 | - |
dc.contributor.authorscopusid | 7006291661 | - |
dc.identifier.absysnet | 716479 | - |
dc.investigacion | Ingeniería y Arquitectura | es |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | es |
dc.type2 | Actas de congresos | en_US |
dc.date.coverdate | Diciembre 2011 | |
dc.identifier.conferenceid | events121425 | |
dc.identifier.ulpgc | Sí | es |
item.grantfulltext | open | - |
item.fulltext | Con texto completo | - |
crisitem.event.eventsstartdate | 11-10-2011 | - |
crisitem.event.eventsenddate | 13-10-2011 | - |
crisitem.author.dept | GIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional | - |
crisitem.author.dept | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.dept | Departamento de Informática y Sistemas | - |
crisitem.author.dept | GIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional | - |
crisitem.author.dept | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.dept | Departamento de Informática y Sistemas | - |
crisitem.author.orcid | 0000-0002-2834-2067 | - |
crisitem.author.orcid | 0000-0002-8673-2725 | - |
crisitem.author.parentorg | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.parentorg | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.fullName | Lorenzo Navarro, José Javier | - |
crisitem.author.fullName | Castrillón Santana, Modesto Fernando | - |
Appears in Collections: | Actas de congresos |
SCOPUSTM
Citations
129
checked on Dec 1, 2024
Page view(s)
79
checked on Jan 27, 2024
Download(s)
278
checked on Jan 27, 2024
Google ScholarTM
Check
Altmetric
Share
Export metadata
This item is licensed under a Creative Commons License