default search action
8. BTAS 2016: Niagara Falls, NY, USA
- 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, September 6-9, 2016. IEEE 2016, ISBN 978-1-4673-9733-9
- Jun-Cheng Chen, Amit Kumar, Rajeev Ranjan, Vishal M. Patel, Azadeh Alavi, Rama Chellappa:
A cascaded convolutional neural network for age estimation of unconstrained faces. 1-8 - Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, Rama Chellappa:
Active user authentication for smartphones: A challenge data set and benchmark results. 1-8 - Hayreddin Çeker, Shambhu J. Upadhyaya:
Adaptive techniques for intra-user variability in keystroke dynamics. 1-6 - Brian M. Powell, Abhishek Kumar, Jatin Thapar, Gaurav Goswami, Mayank Vatsa, Richa Singh, Afzel Noore:
A multibiometrics-based CAPTCHA for improved online security. 1-8 - Michael Martin, Xuan Xu, Thirimachos Bourlai:
A multimedia application for location-based semantic retrieval of tattoos. 1-8 - Chunxu Tang, Vir V. Phoha:
An empirical evaluation of activities and classifiers for user identification on smartphones. 1-8 - Yang Hu, Konstantinos Sirlantzis, Gareth Howells:
A study on iris textural correlation using steering kernels. 1-8 - Jukka Komulainen, Iryna Anina, Jukka Holappa, Elhocine Boutellaa, Abdenour Hadid:
On the robustness of audiovisual liveness detection to visual speech animation. 1-8 - Yixin Du, Thirimachos Bourlai, Jeremy M. Dawson:
Automated classification of mislabeled near-infrared left and right iris images using convolutional neural networks. 1-6 - Pouya Samangouei, Rama Chellappa:
Convolutional neural networks for attribute-based active authentication on mobile devices. 1-8 - Rajesh Kumar, Vir V. Phoha, Abdul Serwadda:
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. 1-8 - John V. Monaco, Manuel M. Vindiola:
Crossing domains with the inductive transfer encoder: Case study in keystroke biometrics. 1-8 - Maneet Singh, Shruti Nagpal, Nikita Gupta, Sanchit Gupta, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa:
Cross-spectral cross-resolution video database for face recognition. 1-7 - Chengwu Liang, Lin Qi, Enqing Chen, Ling Guan:
Depth-based action recognition using multiscale sub-actions depth motion maps and local auto-correlation of space-time gradients. 1-7 - Naman Kohli, Daksha Yadav, Mayank Vatsa, Richa Singh, Afzel Noore:
Detecting medley of iris spoofing attacks using DESIST. 1-6 - Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch:
Detecting morphed face images. 1-7 - Benjamin S. Riggan, Nathaniel J. Short, Shuowen Hu, Heesung Kwon:
Estimation of visible spectrum faces from polarimetric thermal faces. 1-7 - Akshay Agarwal, Richa Singh, Mayank Vatsa:
Face anti-spoofing using Haralick features. 1-6 - Seong-Tae Kim, Dae Hoe Kim, Yong Man Ro:
Facial dynamic modelling using long short-term memory network: Analysis and application to face authentication. 1-6 - Nanang Susyanto, Raymond N. J. Veldhuis, Luuk J. Spreeuwers, Chris A. J. Klaassen:
Fixed FAR correction factor of score level fusion. 1-8 - Felix Juefei-Xu, Marios Savvides:
Fastfood dictionary learning for periocular-based full face hallucination. 1-8 - Mateusz Trokielewicz, Adam Czajka, Piotr Maciejewicz:
Human iris recognition in post-mortem subjects: Study and database. 1-6 - Kevin W. Bowyer, Patrick J. Flynn:
Biometric identification of identical twins: A survey. 1-8 - David S. Bolme, Ryan A. Tokola, Chris Boehnen, Tiffany B. Saul, Kelly A. Sauerwein, Dawnie Wolfe:
Impact of environmental factors on biometric matching during human decomposition. 1-8 - Inmaculada Tomeo-Reyes, Arun Ross, Vinod Chandran:
Investigating the impact of drug induced pupil dilation on automated iris recognition. 1-8 - Pavel Korshunov, Sébastien Marcel:
Joint operation of voice biometrics and presentation attack detection. 1-6 - Aythami Morales, Julian Fiérrez, Marta Gomez-Barrero, Javier Ortega-Garcia, Roberto Daza, John V. Monaco, Jugurta Montalvão, Jânio Coutinho Canuto, Anjith George:
KBOC: Keystroke biometrics OnGoing competition. 1-6 - Michael J. Coakley, John V. Monaco, Charles C. Tappert:
Keystroke biometric studies with short numeric input on smartphones. 1-6 - Hayreddin Çeker, Shambhu J. Upadhyaya:
User authentication with keystroke dynamics in long-text data. 1-6 - Yunbin Deng:
Long range standoff speaker identification using laser Doppler vibrometer. 1-6 - Mohamed Hasan, Noboru Babaguchi:
Long-term people reidentification using anthropometric signature. 1-6 - Devansh Arpit, Chetan Ramaiah, Venu Govindaraju:
Subspace learning via low rank projections for dimensionality reduction. 1-7 - Lingxiao He, Haiqing Li, Fei Liu, Nianfeng Liu, Zhenan Sun, Zhaofeng He:
Multi-patch convolution neural network for iris liveness detection. 1-7 - Lingxiao He, Haiqing Li, Qi Zhang, Zhenan Sun, Zhaofeng He:
Multiscale representation for partial face recognition under near infrared illumination. 1-7 - Domingo Mery, Yuning Zhao, Kevin W. Bowyer:
On accuracy estimation and comparison of results in biometric research. 1-8 - Daniel Martinho-Corbishley, Mark S. Nixon, John N. Carter:
On categorising gender in surveillance imagery. 1-6 - N. Pattabhi Ramaiah, Ajay Kumar:
On matching cross-spectral periocular images for accurate biometrics identification. 1-6 - Man Zhang, Qi Zhang, Zhenan Sun, Shujuan Zhou, Nasir Uddin Ahmed:
The BTAS∗Competition on Mobile Iris Recognition. 1-7 - Nik Suki, Norman Poh, Firham M. Senan, Nazri A. Zamani, M. Zaharudin A. Darus:
On the reproducibility and repeatability of likelihood ratio in forensics: A case study using face biometrics. 1-8 - Abhijit Sarkar, A. Lynn Abbott, Zachary R. Doerzaph:
Biometric authentication using photoplethysmography signals. 1-7 - Estefan Ortiz, Kevin W. Bowyer:
Pitfalls in studying "big data" from operational scenarios. 1-7 - Christof Kauba, Andreas Uhl:
PRNU-based image alignment for defective pixel detection. 1-7 - Pramuditha Perera, Vishal M. Patel:
Quickest intrusion detection in mobile active user authentication. 1-8 - Walter J. Scheirer, Patrick J. Flynn, Changxing Ding, Guodong Guo, Vitomir Struc, Mohamad Al Jazaery, Klemen Grm, Simon Dobrisek, Dacheng Tao, Yu Zhu, Joel Brogan, Sandipan Banerjee, Aparna Bharati, Brandon RichardWebster:
Report on the BTAS 2016 Video Person Recognition Evaluation. 1-8 - Anurag Chowdhury, Soumyadeep Ghosh, Richa Singh, Mayank Vatsa:
RGB-D face recognition via learning-based reconstruction. 1-7 - Pavel Korshunov, Sébastien Marcel, Hannah Muckenhirn, André R. Gonçalves, A. G. Souza Mello, Ricardo Paranhos Velloso Violato, Flávio Olmos Simões, Mário Uliani Neto, Marcus de Assis Angeloni, José Augusto Stuchi, Heinrich Dinkel, Nanxin Chen, Yanmin Qian, Dipjyoti Paul, Goutam Saha, Md. Sahidullah:
Overview of BTAS 2016 speaker anti-spoofing competition. 1-6 - Archit Taneja, Aakriti Tayal, Aakarsh Malhotra, Anush Sankaran, Mayank Vatsa, Richa Singh:
Fingerphoto spoofing in mobile devices: A preliminary study. 1-7 - Ishan Manjani, Hakki Sumerkan, Patrick J. Flynn, Kevin W. Bowyer:
Template aging in 3D and 2D face recognition. 1-6 - Yutong Zheng, Chenchen Zhu, Khoa Luu, Chandrasekhar Bhagavatula, T. Hoang Ngan Le, Marios Savvides:
Towards a deep learning framework for unconstrained face detection. 1-8 - Pei Li, Joel Brogan, Patrick J. Flynn:
Toward facial re-identification: Experiments with data from an operational surveillance camera plant. 1-8 - Swami Sankaranarayanan, Azadeh Alavi, Carlos Domingo Castillo, Rama Chellappa:
Triplet probabilistic embedding for face verification and clustering. 1-8 - Nawaf Almudhahka, Mark S. Nixon, Jonathon S. Hare:
Unconstrained human identification using comparative facial soft biometrics. 1-6 - Yi Huang, Adams Wai-Kin Kong:
Using a CNN ensemble for detecting pornographic and upskirt images. 1-7 - Fernando Alonso-Fernandez, Reuben A. Farrugia, Josef Bigün:
Very low-resolution iris recognition via Eigen-patch super-resolution and matcher fusion. 1-8 - He Zheng, Yapeng Ye, Liao Ni, Shilei Liu, Wenxin Li:
Which finger is the best for finger vein recognition? 1-5 - Richard Matovu, Abdul Serwadda:
Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.