News
Furthermore, we conduct practical presentation attacks using the generated face images in digital replay attacks against real face recognition systems, showing the vulnerability of face recognition ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results