Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. A, H. In pages 113-118, 2014. IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). bibtex @inProceedings{
title = {Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.},
type = {inProceedings},
year = {2014},
pages = {113-118},
publisher = {IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
id = {cf667966-f07d-338c-a3c2-1794e0ccc43f},
created = {2019-11-19T13:00:36.926Z},
file_attached = {false},
profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},
group_id = {17585b85-df99-3a34-98c2-c73e593397d7},
last_modified = {2019-11-19T13:49:21.908Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {mvg:1911},
source_type = {inproceedings},
private_publication = {false},
bibtype = {inProceedings},
author = {A, Hadid}
}
Downloads: 0
{"_id":"imNA3DZviFoGHkgpL","bibbaseid":"a-facebiometricsunderspoofingattacksvulnerabilitiescountermeasuresopenissuesandresearchdirections-2014","authorIDs":[],"author_short":["A, H."],"bibdata":{"title":"Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.","type":"inProceedings","year":"2014","pages":"113-118","publisher":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","id":"cf667966-f07d-338c-a3c2-1794e0ccc43f","created":"2019-11-19T13:00:36.926Z","file_attached":false,"profile_id":"bddcf02d-403b-3b06-9def-6d15cc293e20","group_id":"17585b85-df99-3a34-98c2-c73e593397d7","last_modified":"2019-11-19T13:49:21.908Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"mvg:1911","source_type":"inproceedings","private_publication":false,"bibtype":"inProceedings","author":"A, Hadid","bibtex":"@inProceedings{\n title = {Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.},\n type = {inProceedings},\n year = {2014},\n pages = {113-118},\n publisher = {IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},\n id = {cf667966-f07d-338c-a3c2-1794e0ccc43f},\n created = {2019-11-19T13:00:36.926Z},\n file_attached = {false},\n profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},\n group_id = {17585b85-df99-3a34-98c2-c73e593397d7},\n last_modified = {2019-11-19T13:49:21.908Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {mvg:1911},\n source_type = {inproceedings},\n private_publication = {false},\n bibtype = {inProceedings},\n author = {A, Hadid}\n}","author_short":["A, H."],"bibbaseid":"a-facebiometricsunderspoofingattacksvulnerabilitiescountermeasuresopenissuesandresearchdirections-2014","role":"author","urls":{},"downloads":0},"bibtype":"inProceedings","creationDate":"2019-11-19T13:17:05.975Z","downloads":0,"keywords":[],"search_terms":["face","biometrics","under","spoofing","attacks","vulnerabilities","countermeasures","open","issues","research","directions","a"],"title":"Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.","year":2014}