News
The prevalent 2D face recognition systems, despite their widespread application in security, are susceptible to breaches using photographs, highlighting a critical vulnerability. This paper proposes ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results