John D. Bustard

According to our database1, John D. Bustard authored at least 12 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.
Sci. Eng. Ethics, 2018

2015
The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications.
IEEE Signal Process. Mag., 2015

Gait biometrics under spoofing attacks: an experimental investigation.
J. Electronic Imaging, 2015

2014
Gait Anti-spoofing.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Measuring and mitigating targeted biometric impersonation.
IET Biom., 2014

2013
Targeted biometric impersonation.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Improving Gait Biometrics under Spoofing Attacks.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Targeted impersonation as a tool for the detection of biometric system vulnerabilities.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Can gait biometrics be Spoofed?
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2010
Toward Unconstrained Ear Recognition From Two-Dimensional Images.
IEEE Trans. Syst. Man Cybern. Part A, 2010

3D morphable model construction for robust ear and face recognition.
Proceedings of the Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, 2010


  Loading...