M. L. Chiang

  • Citations Per Year
Learn More
Face spoofing attack is one of the recent security problems that face recognition systems are proven to be vulnerable to. The spoofing occurs when an attacker bypass the authentication scheme by presenting a copy of the face image for a valid user. Therefore, it's very easy to perform a face recognition spoofing attack with compare to other biometrics. This(More)
A cloud computing environment consists of a huge number of processors and memories, high-speed networks, and various application services to provide a lot of service over the Internet for users. However, there are two critical problems in the Internet service provider¡¦s (ISP): unfair and unbalanced problems produced by dispatching tasks without(More)
  • 1