1. Introduction · Adversarial biometric recognition; · Spoof detection based on deep learning and handcrafted features; · Attack transferability in biometric ...
確定! 回上一頁