Svetlana N. Yanushkevich

According to our database1, Svetlana N. Yanushkevich authored at least 92 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening.
Computers & Security, 2019

Generative Adversarial Network for Radar Signal Synthesis.
Proceedings of the International Joint Conference on Neural Networks, 2019

Dog Identification using Soft Biometrics and Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

Face Attribute Prediction in Live Video using Fusion of Features and Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

Detecting Thermal Face Signature Abnormalities.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

Multi-Metric Evaluation of Thermal-to-Visual Face Recognition.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

Risk Inference Models for Security Applications.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

Face Attributes and Detection of Drug Addicts.
Proceedings of the Eighth International Conference on Emerging Security Technologies, 2019

2018
Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure.
IEEE Trans. Intelligent Transportation Systems, 2018

Gait Type Analysis Using Dynamic Bayesian Networks.
Sensors, 2018

Biometric-enabled watchlists technology.
IET Biometrics, 2018

CNN+RNN Depth and Skeleton based Dynamic Hand Gesture Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Technology Gap Navigator: Emerging Design of Biometric-Enabled Risk Assessment Machines.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders.
IEEE Comp. Int. Mag., 2017

Watchlist risk assessment using multiparametric cost and relative entropy.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Utilizing gait traits to improve e-border watchlist performance.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Risk assessment in the face-based watchlist screening in e-borders.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Multi-Scale histogram tone mapping algorithm enables better object detection in wide dynamic range images.
Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2017

2016
Risk Assessment in Authentication Machines.
, 2016

Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications.
IEEE Trans. Human-Machine Systems, 2016

Pain recognition and intensity classification using facial expressions.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Multispectral hand recognition using the Kinect v2 sensor.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Wearable system-on-module for prosopagnosia rehabilitation.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
Biometrics for Biomedical Applications.
Proceedings of the Applications of Computational Intelligence in Biomedical Technology, 2015

Belief Network Support via Decision Diagrams.
Proceedings of the 2015 IEEE International Symposium on Multiple-Valued Logic, 2015

Taxonomy and Modeling of Impersonation in e-Border Authentication.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015

Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor.
Proceedings of the Sixth International Conference on Emerging Security Technologies, 2015

2014
Expression, Pose, and Illumination Invariant Face Recognition using Lower Order Pseudo Zernike Moments.
Proceedings of the VISAPP 2014, 2014

Multi-resolution fusion of DTCWT and DCT for shift invariant face recognition.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Fuzzy Rule Based Quality Measures for Adaptive Multimodal Biometric Fusion at Operation Time.
Proceedings of the FCTA 2014 - Proceedings of the International Conference on Fuzzy Computation Theory and Applications, part of IJCCI 2014, Rome, Italy, 22, 2014

Biometric Intelligence in Authentication Machines: from Talking Faces to Talking Robots.
Proceedings of the IIAI 3rd International Congress on Advanced Applied Informatics, 2014

Multispectral Hand Biometrics.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

Modeling Risks in Biometric-Based Authentication Control Systems.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

Risk profiler in automated human authentication.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence for Engineering Solutions, 2014

Adaptive multi-stream score fusion for illumination invariant face recognition.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2014

Multi-spectral facial biometrics in access control.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2014

Automated border control: Problem formalization.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management, 2014

One-shot facial feature extraction based on Gauss-Laguerre filter.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
Introduction to Noise-Resilient Computing
Synthesis Lectures on Digital Circuits and Systems, Morgan & Claypool Publishers, ISBN: 9781627050234, 2013

Facial biometrics for situational awareness systems.
IET Biometrics, 2013

Situational Awareness through Biometrics.
IEEE Computer, 2013

Noise-Tolerant Model of a Ternary Inverter Based on Markov Random Field.
Proceedings of the 43rd IEEE International Symposium on Multiple-Valued Logic, 2013

An Efficient Facial Expression Recognition System in Infrared Images.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

Modified Multiscale Vesselness Filter for Facial Feature Detection.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

2012
Gauss-Laguerre wavelet textural feature fusion with geometrical information for facial expression identification.
EURASIP J. Image and Video Processing, 2012

A fast large scale iris database classification with Optimum-Path Forest technique: A case study.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Secure Biometric System Design.
Proceedings of the 2012 Third International Conference on Emerging Security Technologies, 2012

Thermal Face Recognition: A Fusion Approach.
Proceedings of the 2012 Third International Conference on Emerging Security Technologies, 2012

Optimum-Path Forest Classifier for Large Scale Biometric Applications.
Proceedings of the 2012 Third International Conference on Emerging Security Technologies, 2012

Reliability evaluation of multivalued logic circuits via probabilistic transfer matrices.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

Applying fusion in thermal face recognition.
Proceedings of the 2012 BIOSIG, 2012

2011
DNA.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Belief trees and networks for biometric applications.
Soft Comput., 2011

Fault Tolerant Computing Paradigm for Random Molecular Phenomena: Hopfield Gates and Logic Networks.
Proceedings of the 41st IEEE International Symposium on Multiple-Valued Logic, 2011

Mutant Fault Injection in Functional Properties of a Model to Improve Coverage Metrics.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011

Synthetic Biometrics for Training Users of Biometric and Biomedical Systems.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

Tutorial: Belief network design for biometric systems.
Proceedings of the 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management, 2011

2009
Facial Biometrics Using Nontensor Product Wavelet and 2D Discriminant Techniques.
IJPRAI, 2009

Fundamentals of Biometric System Design: New Course for Electrical, Computer, and Software Engineering Students.
Proceedings of the 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009

2008
Editorial.
IJPRAI, 2008

Noniterative 3D Face Reconstruction Based on Photometric Stereo.
IJPRAI, 2008

Support of Interviewing Techniques in Physical Access Control Systems.
Proceedings of the Computational Forensics, Second International Workshop, 2008

Biometric-Based Decision Support Assistance in Physical Access Control Systems.
Proceedings of the 2008 ECSIS Symposium on Bio-inspired, 2008

2007
Introduction to Synthesis in Biometrics.
Proceedings of the Image Pattern Recognition - Synthesis and Analysis in Biometrics, 2007

Fundamentals of Biometric-Based Training System Design.
Proceedings of the Image Pattern Recognition - Synthesis and Analysis in Biometrics, 2007

Introduction to the Special Issue: Nano MVL Structures.
Multiple-Valued Logic and Soft Computing, 2007

Accelerating Decision Making Support in Biometric Assistant for Remote Temperature Measures.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

Biometric technologies and applications.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007

2006
A concept of intelligent biometric-based early detection and warning system.
Proceedings of the 2006 International Conference on Privacy, 2006

Embedding and Assembling Techniques for Spatial Computing Structure Design using Decision Trees and Diagrams.
Proceedings of the 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006), 2006

Synthetic Biometrics: A Survey.
Proceedings of the International Joint Conference on Neural Networks, 2006

2004
Linearity of Word-Level Representations of Multiple-Valued Networks.
Multiple-Valued Logic and Soft Computing, 2004

Three Dimensional Multiple Valued Circuits Design Based on Single-Electron Logic.
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004

2003
Editorial - Artificial Intelligence in Logic Design.
Artif. Intell. Rev., 2003

Three-Dimensional Feedforward Neural Networks and Their Realization by Nano-Devices.
Artif. Intell. Rev., 2003

2002
Matrix and combinatorics solutions of Boolean differential equations.
Discrete Applied Mathematics, 2002

Linearity of World-Level Circuit Models: New Understanding.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002

The Word-Level Models for Efficient Computation of Multiple-Valued Functions. PART 1: LAR Based Model.
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002

The Word-Level Models for Efficient Computation of Multiple-Valued Functions. PART 2: LWL Based Model.
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002

2001
On the number of generators for transeunt triangles.
Discrete Applied Mathematics, 2001

Two-Stage Exact Detection of Symmetrics.
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001

Information Theory Method for Flexible Network Synthesis.
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001

2000
Comments on "Sympathy: fast exact minimization of fixedpolarity Reed-Muller expansion for symmetric functions".
IEEE Trans. on CAD of Integrated Circuits and Systems, 2000

Information Theoretic Approach to Minimization of Polynomial Expressions over GF(4).
Proceedings of the 30th IEEE International Symposium on Multiple-Valued Logic, 2000

Experiments on FPRM Expressions for Partially Symmetric Logic Functions.
Proceedings of the 30th IEEE International Symposium on Multiple-Valued Logic, 2000

Evolutionary Multi-Level Network Synthesis in Given Design Style.
Proceedings of the 30th IEEE International Symposium on Multiple-Valued Logic, 2000

Application of Design Style in Evolutionary Multi-Level Networks Synthesis.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

1998
Functional Entropy and Decision Trees.
Proceedings of the 28th IEEE International Symposium on Multiple-Valued Logic, 1998

1997
Test Pattern Generation for Combinatorial Multi-Valued Networks Based on Generalized D-Algorithm.
Proceedings of the 27th IEEE International Symposium on Multiple-Valued Logic, 1997

1996
A Class of Logic design Problems solved based on Parallel Computations of Butterfly Configurations.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

Technique of Computing Logic Derivatives for MVL-Functions.
Proceedings of the 26th IEEE International Symposium on Multiple-Valued Logic, 1996


  Loading...