Identificador persistente para citar o vincular este elemento: http://hdl.handle.net/10553/15082
Campo DC Valoridioma
dc.contributor.authorMohan Chakka, Muralien_US
dc.contributor.authorAnjos, Andréen_US
dc.contributor.authorMarcel, Sébastienen_US
dc.contributor.authorTronci, Robertoen_US
dc.contributor.authorMuntoni, Danieleen_US
dc.contributor.authorFadda, Gianlucaen_US
dc.contributor.authorPili, Maurizioen_US
dc.contributor.authorSirena, Nicolaen_US
dc.contributor.authorMurgia, Gabrieleen_US
dc.contributor.authorRistori, Marcoen_US
dc.contributor.authorRoli, Fabioen_US
dc.contributor.authorYan, Junjieen_US
dc.contributor.authorYi, Dongen_US
dc.contributor.authorLei, Zhenen_US
dc.contributor.authorZhang, Zhiweien_US
dc.contributor.authorLi, Stan Z.en_US
dc.contributor.authorSchwartz, William Robsonen_US
dc.contributor.authorRocha, Andersonen_US
dc.contributor.authorPedrini, Helioen_US
dc.contributor.authorLorenzo-Navarro, Javieren_US
dc.contributor.authorCastrillón-Santana, Modestoen_US
dc.contributor.authorMäättä, Jukkaen_US
dc.contributor.authorHadid, Abdenouren_US
dc.contributor.authorPietikäinen, Mattien_US
dc.date.accessioned2015-11-24T15:09:33Z-
dc.date.accessioned2018-06-15T09:21:25Z-
dc.date.available2015-11-24T15:09:33Z-
dc.date.available2018-06-15T09:21:25Z-
dc.date.issued2011en_US
dc.identifier.isbn9781457713583en_US
dc.identifier.urihttp://hdl.handle.net/10553/15082-
dc.description.abstractSpoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.es
dc.languageengen_US
dc.source2011 International Joint Conference on Biometrics, IJCB 2011 [ISBN 9781457713583]en_US
dc.subject120304 Inteligencia artificiales
dc.titleCompetition on counter measures to 2-D facial spoofing attacksen_US
dc.typeinfo:eu-repo/semantics/conferenceObjecten_US
dc.typeConferenceObjectes
dc.relation.conference2011 International Joint Conference on Biometrics, IJCB 2011
dc.identifier.doi10.1109/IJCB.2011.6117509
dc.identifier.scopus84862953522-
dc.contributor.authorscopusid55264420900-
dc.contributor.authorscopusid6506491800-
dc.contributor.authorscopusid6603136018-
dc.contributor.authorscopusid14017094000-
dc.contributor.authorscopusid26030613600-
dc.contributor.authorscopusid54911437000-
dc.contributor.authorscopusid54912287000-
dc.contributor.authorscopusid35090396800-
dc.contributor.authorscopusid54912556600-
dc.contributor.authorscopusid54914385900-
dc.contributor.authorscopusid57194734588-
dc.contributor.authorscopusid55265567300-
dc.contributor.authorscopusid23135479100-
dc.contributor.authorscopusid24280193100
dc.contributor.authorscopusid57202066920-
dc.contributor.authorscopusid55648280900-
dc.contributor.authorscopusid34870116100-
dc.contributor.authorscopusid7201885423-
dc.contributor.authorscopusid16643616700-
dc.contributor.authorscopusid6506736837-
dc.contributor.authorscopusid15042453800-
dc.contributor.authorscopusid22333278500-
dc.contributor.authorscopusid54913926800-
dc.contributor.authorscopusid55925650500-
dc.contributor.authorscopusid7006291661-
dc.identifier.absysnet716479-
dc.investigacionIngeniería y Arquitecturaes
dc.rights.accessrightsinfo:eu-repo/semantics/openAccesses
dc.type2Actas de congresosen_US
dc.date.coverdateDiciembre 2011
dc.identifier.conferenceidevents121425
dc.identifier.ulpgces
item.grantfulltextopen-
item.fulltextCon texto completo-
crisitem.event.eventsstartdate11-10-2011-
crisitem.event.eventsenddate13-10-2011-
crisitem.author.deptGIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional-
crisitem.author.deptIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.deptDepartamento de Informática y Sistemas-
crisitem.author.deptGIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional-
crisitem.author.deptIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.deptDepartamento de Informática y Sistemas-
crisitem.author.orcid0000-0002-2834-2067-
crisitem.author.orcid0000-0002-8673-2725-
crisitem.author.parentorgIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.parentorgIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.fullNameLorenzo Navarro, José Javier-
crisitem.author.fullNameCastrillón Santana, Modesto Fernando-
Colección:Actas de congresos
miniatura
Postprint
Adobe PDF (282,56 kB)
Vista resumida

Google ScholarTM

Verifica

Altmetric


Comparte



Exporta metadatos



Este elemento está sujeto a una licencia Licencia Creative Commons Creative Commons