UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Yu Shilian, Ai Ye, Xu Bo, Zhou Yicong, Li Weifeng, Liao Qingmin, Poh Norman. Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks[J]. Information Sciences, 2016, 352-353, 188-202.
Authors:  Yu Shilian;  Ai Ye;  Xu Bo;  Zhou Yicong;  Li Weifeng; et al.
Favorite | TC[WOS]:5 TC[Scopus]:6 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Feature denoising using joint sparse representation for in-car speech recognition Journal article
Li Weifeng, Zhou Yicong, Poh Norman, Zhou Fei, Liao Qingmin. Feature denoising using joint sparse representation for in-car speech recognition[J]. IEEE Signal Processing Letters, 2013, 20(7), 681-684.
Authors:  Li Weifeng;  Zhou Yicong;  Poh Norman;  Zhou Fei;  Liao Qingmin
Favorite | TC[WOS]:28 TC[Scopus]:35  IF:3.2/3.4 | Submit date:2018/12/21
Dictionary Training  In-car Speech Recognition  Log Mel-filter Bank (Mfb) Outputs  Sparse Representation