z-logo
open-access-imgOpen Access
Target Identity Recognition Method based on Trusted Information Fusion
Author(s) -
Lu Wang
Publication year - 2019
Language(s) - English
DOI - 10.23940/ijpe.19.04.p19.12351246
Subject(s) - identity (music) , computer security , computer science , information fusion , identity theft , fusion , artificial intelligence , art , aesthetics , linguistics , philosophy

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here