Identificador persistente para citar o vincular este elemento:
http://hdl.handle.net/10553/15082
Campo DC | Valor | idioma |
---|---|---|
dc.contributor.author | Mohan Chakka, Murali | en_US |
dc.contributor.author | Anjos, André | en_US |
dc.contributor.author | Marcel, Sébastien | en_US |
dc.contributor.author | Tronci, Roberto | en_US |
dc.contributor.author | Muntoni, Daniele | en_US |
dc.contributor.author | Fadda, Gianluca | en_US |
dc.contributor.author | Pili, Maurizio | en_US |
dc.contributor.author | Sirena, Nicola | en_US |
dc.contributor.author | Murgia, Gabriele | en_US |
dc.contributor.author | Ristori, Marco | en_US |
dc.contributor.author | Roli, Fabio | en_US |
dc.contributor.author | Yan, Junjie | en_US |
dc.contributor.author | Yi, Dong | en_US |
dc.contributor.author | Lei, Zhen | en_US |
dc.contributor.author | Zhang, Zhiwei | en_US |
dc.contributor.author | Li, Stan Z. | en_US |
dc.contributor.author | Schwartz, William Robson | en_US |
dc.contributor.author | Rocha, Anderson | en_US |
dc.contributor.author | Pedrini, Helio | en_US |
dc.contributor.author | Lorenzo-Navarro, Javier | en_US |
dc.contributor.author | Castrillón-Santana, Modesto | en_US |
dc.contributor.author | Määttä, Jukka | en_US |
dc.contributor.author | Hadid, Abdenour | en_US |
dc.contributor.author | Pietikäinen, Matti | en_US |
dc.date.accessioned | 2015-11-24T15:09:33Z | - |
dc.date.accessioned | 2018-06-15T09:21:25Z | - |
dc.date.available | 2015-11-24T15:09:33Z | - |
dc.date.available | 2018-06-15T09:21:25Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.isbn | 9781457713583 | en_US |
dc.identifier.uri | http://hdl.handle.net/10553/15082 | - |
dc.description.abstract | Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest. | es |
dc.language | eng | en_US |
dc.source | 2011 International Joint Conference on Biometrics, IJCB 2011 [ISBN 9781457713583] | en_US |
dc.subject | 120304 Inteligencia artificial | es |
dc.title | Competition on counter measures to 2-D facial spoofing attacks | en_US |
dc.type | info:eu-repo/semantics/conferenceObject | en_US |
dc.type | ConferenceObject | es |
dc.relation.conference | 2011 International Joint Conference on Biometrics, IJCB 2011 | |
dc.identifier.doi | 10.1109/IJCB.2011.6117509 | |
dc.identifier.scopus | 84862953522 | - |
dc.contributor.authorscopusid | 55264420900 | - |
dc.contributor.authorscopusid | 6506491800 | - |
dc.contributor.authorscopusid | 6603136018 | - |
dc.contributor.authorscopusid | 14017094000 | - |
dc.contributor.authorscopusid | 26030613600 | - |
dc.contributor.authorscopusid | 54911437000 | - |
dc.contributor.authorscopusid | 54912287000 | - |
dc.contributor.authorscopusid | 35090396800 | - |
dc.contributor.authorscopusid | 54912556600 | - |
dc.contributor.authorscopusid | 54914385900 | - |
dc.contributor.authorscopusid | 57194734588 | - |
dc.contributor.authorscopusid | 55265567300 | - |
dc.contributor.authorscopusid | 23135479100 | - |
dc.contributor.authorscopusid | 24280193100 | |
dc.contributor.authorscopusid | 57202066920 | - |
dc.contributor.authorscopusid | 55648280900 | - |
dc.contributor.authorscopusid | 34870116100 | - |
dc.contributor.authorscopusid | 7201885423 | - |
dc.contributor.authorscopusid | 16643616700 | - |
dc.contributor.authorscopusid | 6506736837 | - |
dc.contributor.authorscopusid | 15042453800 | - |
dc.contributor.authorscopusid | 22333278500 | - |
dc.contributor.authorscopusid | 54913926800 | - |
dc.contributor.authorscopusid | 55925650500 | - |
dc.contributor.authorscopusid | 7006291661 | - |
dc.identifier.absysnet | 716479 | - |
dc.investigacion | Ingeniería y Arquitectura | es |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | es |
dc.type2 | Actas de congresos | en_US |
dc.date.coverdate | Diciembre 2011 | |
dc.identifier.conferenceid | events121425 | |
dc.identifier.ulpgc | Sí | es |
item.grantfulltext | open | - |
item.fulltext | Con texto completo | - |
crisitem.event.eventsstartdate | 11-10-2011 | - |
crisitem.event.eventsenddate | 13-10-2011 | - |
crisitem.author.dept | GIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional | - |
crisitem.author.dept | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.dept | Departamento de Informática y Sistemas | - |
crisitem.author.dept | GIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional | - |
crisitem.author.dept | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.dept | Departamento de Informática y Sistemas | - |
crisitem.author.orcid | 0000-0002-2834-2067 | - |
crisitem.author.orcid | 0000-0002-8673-2725 | - |
crisitem.author.parentorg | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.parentorg | IU Sistemas Inteligentes y Aplicaciones Numéricas | - |
crisitem.author.fullName | Lorenzo Navarro, José Javier | - |
crisitem.author.fullName | Castrillón Santana, Modesto Fernando | - |
Colección: | Actas de congresos |
Este elemento está sujeto a una licencia Licencia Creative Commons