共 50 条
- [1] Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 455 - 461
- [2] Use of Face Detection to Qualify Image Processing Algorithms [J]. NIP28: 28TH INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES / DIGITAL FABRICATION 2012, 2012, : 234 - 235
- [3] Novel Technique for Face Spoof Detection in Image Processing [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1989 - 1992
- [6] An Effective and Robust Method for Unauthorized Reader Detection Based on Tag's Energy [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [7] TELOMERES Preventing unauthorized entry [J]. NATURE REVIEWS MOLECULAR CELL BIOLOGY, 2012, 13 (09) : 539 - 539
- [9] Preventing Unauthorized Data Flows [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 41 - 62