A competition on generalized software-based face presentation attack detection in mobile scenarios Z Boulkenafet, J Komulainen, Z Akhtar, A Benlamoudi, D Samai, ... 2017 IEEE International Joint Conference on Biometrics (IJCB), 688-696, 2017 | 161 | 2017 |
Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach S Bhilare, G Jaswal, V Kanhangad, A Nigam Machine Vision and Applications 29 (8), 1269-1286, 2018 | 40 | 2018 |
Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera I Patil, S Bhilare, V Kanhangad 2016 IEEE international conference on identity, security and behavior …, 2016 | 24 | 2016 |
A study on vulnerability and presentation attack detection in palmprint verification system S Bhilare, V Kanhangad, N Chaudhari Pattern Analysis and Applications 21, 769-782, 2018 | 23 | 2018 |
Subband analysis for performance improvement of replay attack detection in speaker verification systems S Garg, S Bhilare, V Kanhangad 2019 IEEE 5th International Conference on Identity, Security, and Behavior …, 2019 | 14 | 2019 |
Anti-spoofing for display and print attacks on palmprint verification systems V Kanhangad, S Bhilare, P Garg, P Singh, N Chaudhari Biometric and Surveillance Technology for Human and Activity Identification …, 2015 | 14 | 2015 |
Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system S Bhilare, V Kanhangad, N Chaudhari 2017 Fifteenth IAPR International Conference on Machine Vision Applications …, 2017 | 6 | 2017 |
Generating Targeted Adversarial Attacks and Assessing their Effectiveness in Fooling Deep Neural Networks S Gajjar, A Hati, S Bhilare, S Mandal 2022 IEEE International Conference on Signal Processing and Communications …, 2022 | 4 | 2022 |
Enhancing transferability of adversarial audio in speaker recognition systems U Patel, S Bhilare, A Hati Iberian Conference on Pattern Recognition and Image Analysis, 617-628, 2023 | 3 | 2023 |
Increasing transferability by imposing linearity and perturbation in intermediate layer with diverse input patterns M Shah, S Mandal, S Bhilare, A Hati 2022 IEEE International Conference on Signal Processing and Communications …, 2022 | 3 | 2022 |
Securing palm-vein sensors against presentation attacks using image noise residuals S Bhilare, V Kanhangad Journal of electronic imaging 27 (5), 053028-053028, 2018 | 3 | 2018 |
Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation U Patel, S Bhilare, A Hati Pattern Analysis and Applications 27 (2), 60, 2024 | 1 | 2024 |
Robust Adversarial Defence: Use of Auto-inpainting S Sharma, R Joshi, S Bhilare, MV Joshi International Conference on Computer Analysis of Images and Patterns, 110-119, 2023 | 1 | 2023 |
Robust Adversarial Defense: An Analysis on Use of Auto-Inpainting S Sharma, R Joshi, S Bhilare, MV Joshi SN Computer Science 6 (1), 17, 2024 | | 2024 |
Presentation attack detection and matching techniques for hand-based biometric systems S Bhilare, N Chaudhari, V Kanhangad Discipline of Computer Science and Engineering, IIT Indore, 2019 | | 2019 |