Abstract: Face recognition has been successfully deployed in real-time applications, including secure applications such as border control. The vulnerability of face recognition systems (FRSs) to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results