Shruti Bhilare

Orcid: 0009-0009-4836-3111

According to our database1, Shruti Bhilare authored at least 12 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation.
Pattern Anal. Appl., June, 2024

2023
Enhancing Transferability of Adversarial Audio in Speaker Recognition Systems.
Proceedings of the Pattern Recognition and Image Analysis - 11th Iberian Conference, 2023

Robust Adversarial Defence: Use of Auto-inpainting.
Proceedings of the Computer Analysis of Images and Patterns, 2023

2022
Increasing Transferability by Imposing Linearity and Perturbation in Intermediate Layer with Diverse Input Patterns.
Proceedings of the IEEE International Conference on Signal Processing and Communications, 2022

Generating Targeted Adversarial Attacks and Assessing their Effectiveness in Fooling Deep Neural Networks.
Proceedings of the IEEE International Conference on Signal Processing and Communications, 2022

2019
Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems.
Proceedings of the 5th IEEE International Conference on Identity, 2019

2018
A study on vulnerability and presentation attack detection in palmprint verification system.
Pattern Anal. Appl., 2018

Single-sensor hand-vein multimodal biometric recognition using multiscale deep pyramidal approach.
Mach. Vis. Appl., 2018

Securing palm-vein sensors against presentation attacks using image noise residuals.
J. Electronic Imaging, 2018

2017
Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system.
Proceedings of the Fifteenth IAPR International Conference on Machine Vision Applications, 2017


2016
Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera.
Proceedings of the IEEE International Conference on Identity, 2016


  Loading...