[1]
M. Omara, M. Fayez, H. Khalid, and S. Ghoniemy, “Restrictive Voting Technique for Faces Spoofing Attack”, Int. j. commun. netw. inf. secur., vol. 15, no. 1, pp. 204–216, Jun. 2023.