default search action
Jag Mohan Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Jag Mohan Singh, Raghavendra Ramachandra:
3-D Face Morphing Attacks: Generation, Vulnerability and Detection. IEEE Trans. Biom. Behav. Identity Sci. 6(1): 103-117 (2024) - [c20]Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, Rajendra S. Gad:
VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection. FG 2024: 1-9 - [c19]Jag Mohan Singh, Raghavendra Ramachandra:
3D Face Morphing Attack Generation using Non-Rigid Registration. FG 2024: 1-5 - [i11]Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, Rajendra S. Gad:
VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection. CoRR abs/2404.12680 (2024) - [i10]Jag Mohan Singh, Raghavendra Ramachandra:
3D Face Morphing Attack Generation using Non-Rigid Registration. CoRR abs/2404.15765 (2024) - 2023
- [j3]Jag Mohan Singh, Raghavendra Ramachandra:
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection. IEEE Access 11: 76468-76485 (2023) - [c18]Jag Mohan Singh, Sushma Venkatesh, Raghavendra Ramachandra:
Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques. FUSION 2023: 1-8 - [c17]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh:
Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes. IJCB 2023: 1-9 - [i9]Jag Mohan Singh, Sushma Venkatesh, Raghavendra Ramachandra:
Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques. CoRR abs/2305.03264 (2023) - [i8]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh:
Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes. CoRR abs/2309.13704 (2023) - 2022
- [c16]Jag Mohan Singh, Raghavendra Ramachandra:
Fusion of Deep Features for Differential Face Morphing Attack Detection at Automatic Border Control Gates. EUVIP 2022: 1-5 - [c15]Jag Mohan Singh, Raghavendra Ramachandra:
Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance. IJCB 2022: 1-10 - [c14]Jag Mohan Singh, Ahmed Madhun, Ahmed Mohammed Kedir, Raghavendra Ramachandra:
Smartphone based Finger-Photo Verification using Siamese Network. VISIGRAPP (4: VISAPP) 2022: 553-559 - [c13]Jag Mohan Singh, Raghavendra Ramachandra:
DLDFD: Recurrence Free 2D Convolution Approach for Deep Fake Detection. VISIGRAPP (4: VISAPP) 2022: 568-574 - [i7]Jag Mohan Singh, Raghavendra Ramachandra:
3D Face Morphing Attacks: Generation, Vulnerability and Detection. CoRR abs/2201.03454 (2022) - [i6]Jag Mohan Singh, Raghavendra Ramachandra:
Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance. CoRR abs/2209.15474 (2022) - [i5]Jag Mohan Singh, Raghavendra Ramachandra:
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection. CoRR abs/2211.11039 (2022) - 2021
- [j2]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking. IEEE Trans. Inf. Forensics Secur. 16: 4336-4351 (2021) - [c12]Sandip Purnapatra, Nic Smalt, Keivan Bahmani, Priyanka Das, David Yambay, Amir Mohammadi, Anjith George, Thirimachos Bourlai, Sébastien Marcel, Stephanie Schuckers, Meiling Fang, Naser Damer, Fadi Boutros, Arjan Kuijper, Alperen Kantarci, Basar Demir, Zafer Yildiz, Zabi Ghafoory, Hasan Dertli, Hazim Kemal Ekenel, Son Vu, Vassilis Christophides, Dashuang Liang, Guanghao Zhang, Zhanlong Hao, Junfu Liu, Yufeng Jin, Samo Liu, Samuel Huang, Salieri Kuei, Jag Mohan Singh, Raghavendra Ramachandra:
Face Liveness Detection Competition (LivDet-Face) - 2021. IJCB 2021: 1-10 - 2020
- [c11]Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra:
A Survey on Unknown Presentation Attack Detection for Fingerprint. INTAP 2020: 189-202 - [c10]Jag Mohan Singh, Raghavendra Ramachandra, Christoph Busch:
Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection. INTAP 2020: 203-214 - [c9]Jag Mohan Singh, Raghavendra Ramachandra, Patrick Bours:
Fusion of Texture and Optical Flow Using Convolutional Neural Networks for Gender Classification in Videos. INTAP 2020: 227-236 - [i4]Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra:
A Survey on Unknown Presentation Attack Detection for Fingerprint. CoRR abs/2005.08337 (2020) - [i3]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking. CoRR abs/2006.06458 (2020)
2010 – 2019
- 2019
- [c8]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features. CVIP (2) 2019: 49-61 - [c7]Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition. SITIS 2019: 8-14 - [c6]Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
Robust Morph-Detection at Automated Border Control Gate Using Deep Decomposed 3D Shape & Diffuse Reflectance. SITIS 2019: 106-112 - [i2]Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance. CoRR abs/1912.01372 (2019) - [i1]Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition. CoRR abs/1912.01408 (2019) - 2018
- [c5]Jag Mohan Singh, Pankaj Shivdayal Wasnik, Ramachandra Raghavendra:
Hessian-based robust ray-tracing of implicit surfaces on GPU. SIGGRAPH Asia Technical Briefs 2018: 16:1-16:4 - 2013
- [c4]Jag Mohan Singh:
Real-time approximate and exact CSG of implicit surfaces on the GPU. NCVPRIPG 2013: 1-3 - 2010
- [j1]Jag Mohan Singh, P. J. Narayanan:
Real-Time Ray Tracing of Implicit Surfaces on the GPU. IEEE Trans. Vis. Comput. Graph. 16(2): 261-272 (2010)
2000 – 2009
- 2007
- [c3]Kedarnath Thangudu, Lakshmi Gade, Jag Mohan Singh, P. J. Narayanan:
Point Based Representations for Hierarchical Environments. ICCTA 2007: 574-578 - 2006
- [c2]Sunil Mohan Ranta, Jag Mohan Singh, P. J. Narayanan:
GPU Objects. ICVGIP 2006: 352-363 - [c1]Jag Mohan Singh, P. J. Narayanan:
Progressive Decomposition of Point Clouds Without Local Planes. ICVGIP 2006: 364-375
Coauthor Index
aka: Raghavendra Ramachandra
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint