2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542312
|View full text |Cite
|
Sign up to set email alerts
|

Multimodal biometrics for improvised security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
2
0
2
Order By: Relevance
“…The text component uses the pre-trained BERT model defined in the Hugginface library. 2 This model consists of a bidirectional Transformer pre-trained on a large corpus using a combination of masked linguistic modelling target and next-sentence prediction tasks. In the current experimental setup, the model was fine-tuned using an output linear layer that transforms the 768 outputs into 10, corresponding to the number of classes (cities) of the problem at hand.…”
Section: City Classifiermentioning
confidence: 99%
See 1 more Smart Citation
“…The text component uses the pre-trained BERT model defined in the Hugginface library. 2 This model consists of a bidirectional Transformer pre-trained on a large corpus using a combination of masked linguistic modelling target and next-sentence prediction tasks. In the current experimental setup, the model was fine-tuned using an output linear layer that transforms the 768 outputs into 10, corresponding to the number of classes (cities) of the problem at hand.…”
Section: City Classifiermentioning
confidence: 99%
“…In the area of cybersecurity, the paper presented in [2] shows a 4-fold security system using fusion of facial recognition, retina pattern and fingerprint pattern along with the personal password, which is recognised using keystroke dynamics. Their goal was to reduce the probability of false acceptance rates and false rejection rates.…”
Section: Introductionmentioning
confidence: 99%
“…Podemos citar alguns exemplos de seu uso: caixas eletrônicos; smartphones, tablets e notebooks; controle ISSN: 1137-3601 (print), 1988-3064 (on-line) c IBERAMIA and the authors eletrônico de acesso aos locais de trabalho; identificação de usuários de planos de saúde. Em alguns casos, para aumentar ainda mais as taxas de correta identificação individual e o grau de confiabilidade no sistema que identificará o indivíduo, são utilizados sistemas biométricos multimodais, envolvendo mais de uma característica biométrica na identificação, como por exemplo, um sistema capturar a imagem dá ıris e da impressão digital e utilizar ambas para a identificação [3] [4][5] [6].…”
Section: Introductionunclassified
“…http://scikit-learn.org/ Acessado em 22/02/2019 4. https://pypi.org/project/PyWavelets/ Acessado em 22/02/2019…”
unclassified