A.D. Clark, C. Whitelam, and T. Bourlai (2016). Document to Live Facial Identification. Face Recognition Across the Imaging Spectrum. T. Bourlai. Springer.
J.M. Dawson, S.C. Leffel, C. Whitelam, and T. Bourlai (2016). Collection of Multispectral Biometric Data for Cross-spectral Identification Applications. Face Recognition Across the Imaging Spectrum. T. Bourlai. Springer.
S.G. Crihalmeanu and A. Ross (2016). Multispectral ocular biometrics. Face Recognition Across the Imaging Spectrum. T. Bourlai. Springer.
Z. Cao, N. A. Schmid and T. Bourlai (2016). Local Operators and Measures for Heterogeneous Face Recognition. Face Recognition Across the Imaging Spectrum. T. Bourlai. Springer.
A. K. Jain and A. Ross (2015). “Bridging the Gap: From Biometrics to Forensics.” Philosophical Transactions of The Royal Society B. 370 (1674)
A. Rattani, W. Scheirer, and A. Ross (2015). “Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials.” IEEE Transactions on Information Forensics And Security. 10 (11).
A.B. Holbert, H.P. Whitelam, L.J. Sooter, J.M. Dawson, and L.A. Hornak (2015). “Hand Bacteria as an Identifier – A Biometric Evaluation.” Network Modeling Analysis in Health Informatics and Bioinformatics. 4 (1).
D. Wen, H. Han, and A. K. Jain (2015). Face Spoof Detection with Image Distortion Analysis. IEEE Transactions on Information Forensics and Security. 10 (4).
E. Marasco and A. Ross (2015). A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems. ACM Computing Surveys. 47 (2).
M. Piccirilli, G. Doretto, A. Ross, and D. Adjeroh (2016). A Mobile Structured Light System for 3D Face Acquisition. IEEE Sensors Journal. 16 (7).
N. Kalka, N. Bartlow, B. Cukic, A. Ross (2015). A Preliminary Study on Identifying Sensors from Iris Images. Proc. of IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition (CVPR) Conference.
Q. Zhu, G-D. Guo, W. Tang, and C. Q. Zhang (2015). A diagnosis algorithm by using graph-coloring under the PMC model. Journal of Combinatorial Optimization.
R. Jillela and A. Ross (2015). Segmenting Iris Images in the Visible Spectrum with Applications in Mobile Biometrics. Pattern Recognition Letters. 57
Y. Zhu, Z. Zheng, Y. Li, G. Mu, S. Shan, and G. Guo (2015). Still to Video Face Recognition Using a Heterogeneous Matching Approach. Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on.
Cao and N. A. Schmid (2015). Fusion of operators for heterogeneous periocular recognition at varying ranges. Pattern Recognition Letters.
Z. Cao and N. A. Schmid (2015). Novel composite operator for cross-spectral face recognition. SPIE Newsroom Magazine.
Z. Cao and N. A. Schmid (2015). Composite Multi-Lobe Descriptor for Cross Spectral Face Recognition: Matching Active IR to Visible Light Images. SPIE Proceedings Vol. 9476: Automatic Target Recognition XXV. Baltimore, MD, USA.
A. K. Jain, B. Klare, A. Ross (2015). Guidelines for Best Practices in Biometrics Research. Proc. of 8th IAPR International Conference on Biometrics (ICB).
K. Patel, H. Han, A. K. Jain and Greg Ott (2015). Live Face Video vs. Spoof Face Video: Use of Moire Patterns to Detect Replay Video Attacks. IEEE Intl’ Conf. Biometrics (ICB). Phuket, Thailand.
L. Best-Rowden and A. K. Jain (2015). Longitudinal study on face Recognition. IEEE Intl’ Conf. Biometrics (ICB).
S. El-Naggar and A. Ross (2015). Which Dataset is this Iris Image From?. Proc. of 7th IEEE International Workshop on Information Forensics and Security (WIFS). Rome, Italy.
Xueyan Li and Chen Liu (2015). Big Data Biometrics Processing: A Case Study of Iris Matching Algorithm on Intel Xeon Phi. Big Data: Algorithms, Analytics, and Applications KuanChing Li, Hai Jiang, Laurence T. Yang, Alfredo Cuzzocrea. Chapman & Hall/CRC. 393.
McGuffey, Charles and Liu, Chen and Schuckers, Stephanie (2015). Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security. CIT. Journal of Computing and Information Technology. 23 (4), 329-340.
Rissacher, Dan and Galy, Dan (2015). Cardiac radar for biometric identification using nearest neighbour of continuous wavelet transform peaks. Identity, Security and Behavior Analysis (ISBA), 2015 IEEE International Conference on.
McGuffey, Charles and Liu, Chen and Schuckers, Stephanie (2015). Implementation and optimization of a biometric cryptosystem using iris recognition. SPIE Defense+ Security.
Liu, Chen and Petroski, Benjamin and Cordone, Guthrie and Torres, Gildo and Schuckers, Stephanie (2015).Iris matching algorithm on manycore platforms. Technologies for Homeland Security (HST), 2015 IEEE International Symposium on.
Mura, Valerio and Ghiani, Luca and Marcialis, Gian Luca and Roli, Fabio and Yambay, David A and Schuckers, Stephanie A (2015). LivDet 2015 Fingerprint Liveness Detection Competition 2015. Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on.
McGuffey, Charles and Liu, Chen (2015). Multicore Approach towards Efficient Biometric Cryptosystems. Parallel Processing Workshops (ICPPW), 2015 44th International Conference on.
Kantarci, Burak and Erol Kantarci, Melike and Schuckers, Stephanie (2015). Towards secure cloudcentric Internet of Biometric Things. Cloud Networking (CloudNet), 2015 IEEE 4th International Conference on.
Charles McGuffey. Hardware Accelerator Approach Efficient Biometric Cryptosystems. (2015). Clarkson University.
T. Bourlai (2015). Face Recognition by using Multispectral Imagery. InfraMation. Nashville, TN.
Q. Gui, Z. Jin, M. V. Ruiz Blondet, S. Laszlo and W. Xu, “Towards EEG biometrics: pattern matching approaches for user identification,” Identity, Security and Behavior Analysis (ISBA), 2015 IEEE International Conference on, Hong Kong, 2015, pp. 1-6. doi: 10.1109/ISBA.2015.7126357
Q. Gui, Z. Jin and W. Xu, “Exploring EEG-based biometrics for user identification and authentication,” Signal Processing in Medicine and Biology Symposium (SPMB), 2014 IEEE, Philadelphia, PA, 2014, pp. 1-6. doi: 10.1109/SPMB.2014.7002950