{"type":"conference","publication":"2024 IEEE International Joint Conference on Biometrics (IJCB)","status":"public","_id":"64198","user_id":"97123","language":[{"iso":"eng"}],"publication_status":"published","year":"2024","citation":{"ieee":"R. Al-Refai et al., “On the Trustworthiness of Face Morphing Attack Detectors,” 2024, doi: 10.1109/ijcb62174.2024.10744447.","chicago":"Al-Refai, Rouqaiah, Clara Biagi, Cong Chen, Kiran Raja, Raghavendra Ramachandra, Christoph Busch, and Philipp Terhörst. “On the Trustworthiness of Face Morphing Attack Detectors.” In 2024 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2024. https://doi.org/10.1109/ijcb62174.2024.10744447.","ama":"Al-Refai R, Biagi C, Chen C, et al. On the Trustworthiness of Face Morphing Attack Detectors. In: 2024 IEEE International Joint Conference on Biometrics (IJCB). IEEE; 2024. doi:10.1109/ijcb62174.2024.10744447","apa":"Al-Refai, R., Biagi, C., Chen, C., Raja, K., Ramachandra, R., Busch, C., & Terhörst, P. (2024). On the Trustworthiness of Face Morphing Attack Detectors. 2024 IEEE International Joint Conference on Biometrics (IJCB). https://doi.org/10.1109/ijcb62174.2024.10744447","mla":"Al-Refai, Rouqaiah, et al. “On the Trustworthiness of Face Morphing Attack Detectors.” 2024 IEEE International Joint Conference on Biometrics (IJCB), IEEE, 2024, doi:10.1109/ijcb62174.2024.10744447.","short":"R. Al-Refai, C. Biagi, C. Chen, K. Raja, R. Ramachandra, C. Busch, P. Terhörst, in: 2024 IEEE International Joint Conference on Biometrics (IJCB), IEEE, 2024.","bibtex":"@inproceedings{Al-Refai_Biagi_Chen_Raja_Ramachandra_Busch_Terhörst_2024, title={On the Trustworthiness of Face Morphing Attack Detectors}, DOI={10.1109/ijcb62174.2024.10744447}, booktitle={2024 IEEE International Joint Conference on Biometrics (IJCB)}, publisher={IEEE}, author={Al-Refai, Rouqaiah and Biagi, Clara and Chen, Cong and Raja, Kiran and Ramachandra, Raghavendra and Busch, Christoph and Terhörst, Philipp}, year={2024} }"},"date_updated":"2026-02-19T07:51:28Z","publisher":"IEEE","author":[{"first_name":"Rouqaiah","full_name":"Al-Refai, Rouqaiah","last_name":"Al-Refai"},{"last_name":"Biagi","full_name":"Biagi, Clara","first_name":"Clara"},{"full_name":"Chen, Cong","last_name":"Chen","first_name":"Cong"},{"last_name":"Raja","full_name":"Raja, Kiran","first_name":"Kiran"},{"last_name":"Ramachandra","full_name":"Ramachandra, Raghavendra","first_name":"Raghavendra"},{"full_name":"Busch, Christoph","last_name":"Busch","first_name":"Christoph"},{"first_name":"Philipp","last_name":"Terhörst","id":"97123","full_name":"Terhörst, Philipp"}],"date_created":"2026-02-18T09:35:22Z","title":"On the Trustworthiness of Face Morphing Attack Detectors","doi":"10.1109/ijcb62174.2024.10744447"}