Abstract: Face recognition systems are vulnerable to a variety of presentation assaults, including print, mask, and replay attacks. To successfully address the issues faced by these assaults, we offer ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results