Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. Hadid, A. In pages 113-118, 2014. IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). bibtex @inProceedings{
title = {Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.},
type = {inProceedings},
year = {2014},
pages = {113-118},
publisher = {IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},
id = {f89f20d3-effb-387c-aa96-ecc2c5735ec5},
created = {2019-11-19T16:29:07.777Z},
file_attached = {false},
profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},
group_id = {28b2996c-b80f-3c26-be71-695caf7040ac},
last_modified = {2019-11-19T16:31:56.576Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {mvg:1911},
source_type = {inproceedings},
folder_uuids = {8292f5ec-1c57-4113-a303-25778e695f8c},
private_publication = {false},
bibtype = {inProceedings},
author = {Hadid, A}
}
Downloads: 0
{"_id":"STsArsQKk8uStnEap","bibbaseid":"hadid-facebiometricsunderspoofingattacksvulnerabilitiescountermeasuresopenissuesandresearchdirections-2014","authorIDs":[],"author_short":["Hadid, A."],"bibdata":{"title":"Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.","type":"inProceedings","year":"2014","pages":"113-118","publisher":"IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","id":"f89f20d3-effb-387c-aa96-ecc2c5735ec5","created":"2019-11-19T16:29:07.777Z","file_attached":false,"profile_id":"bddcf02d-403b-3b06-9def-6d15cc293e20","group_id":"28b2996c-b80f-3c26-be71-695caf7040ac","last_modified":"2019-11-19T16:31:56.576Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"mvg:1911","source_type":"inproceedings","folder_uuids":"8292f5ec-1c57-4113-a303-25778e695f8c","private_publication":false,"bibtype":"inProceedings","author":"Hadid, A","bibtex":"@inProceedings{\n title = {Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.},\n type = {inProceedings},\n year = {2014},\n pages = {113-118},\n publisher = {IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)},\n id = {f89f20d3-effb-387c-aa96-ecc2c5735ec5},\n created = {2019-11-19T16:29:07.777Z},\n file_attached = {false},\n profile_id = {bddcf02d-403b-3b06-9def-6d15cc293e20},\n group_id = {28b2996c-b80f-3c26-be71-695caf7040ac},\n last_modified = {2019-11-19T16:31:56.576Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {mvg:1911},\n source_type = {inproceedings},\n folder_uuids = {8292f5ec-1c57-4113-a303-25778e695f8c},\n private_publication = {false},\n bibtype = {inProceedings},\n author = {Hadid, A}\n}","author_short":["Hadid, A."],"bibbaseid":"hadid-facebiometricsunderspoofingattacksvulnerabilitiescountermeasuresopenissuesandresearchdirections-2014","role":"author","urls":{},"downloads":0},"bibtype":"inProceedings","creationDate":"2019-11-19T16:11:28.803Z","downloads":0,"keywords":[],"search_terms":["face","biometrics","under","spoofing","attacks","vulnerabilities","countermeasures","open","issues","research","directions","hadid"],"title":"Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions.","year":2014}