Lowering the Barrier to IREX Participation: Open-Source Algorithms, Toolkit, and Benchmarking for Iris Recognition
Pith reviewed 2026-05-21 04:52 UTC · model grok-4.3
The pith
Open-source iris recognition algorithms have been evaluated under IREX X protocols for the first time.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
By developing and releasing open-source implementations of iris recognition algorithms—including TripletIris and ArcIris neural networks as well as HDBIF and CRYPTS—the first assessment of open-source solutions according to IREX X protocols has been completed. These implementations, aside from timing constraints on CRYPTS, successfully underwent the official evaluation, and the paper supplies a model C++ submission to help other teams join the process.
What carries the argument
The IREX-compliant C++ implementation that serves as a model submission to facilitate entry of other open-source methods into the IREX evaluation.
If this is right
- Other research teams can adopt the provided model C++ code to prepare their own iris recognition methods for IREX submission.
- The evaluated methods demonstrate viability on standard academic iris databases such as CASIA-Iris and IIT Delhi.
- Open-source segmentation and circle estimation models are now available to support development of new iris recognition pipelines.
- Academic methods can be directly compared to commercial ones through standardized IREX testing.
Where Pith is reading between the lines
- This toolkit could promote greater reproducibility in iris biometrics research by making code publicly available.
- Similar open-source approaches might be applied to other biometric modalities to standardize their evaluations.
- Researchers may build upon the provided neural network architectures to improve accuracy or speed for specific use cases.
Load-bearing premise
The provided open-source C++ implementations faithfully reproduce the intended algorithms and the IREX X results generalize beyond the specific datasets and hardware used.
What would settle it
An independent team re-implements one of the algorithms from the paper and obtains substantially different accuracy or timing results when submitted to the same IREX X evaluation.
Figures
read the original abstract
This paper proposes two new open-source iris recognition algorithms, providing both Python and IREX-compliant C++ implementations to be submitted to the official IREX X program. This work has two primary goals: (a) to conduct the first-ever assessment of open-source iris recognition solutions according to IREX testing protocols, and (b) to offer a model C++ submission that significantly facilitates the entry of other teams' open-source methods into the IREX evaluation. The new methods consist of two Neural Networks trained with: (i) Triplet loss with Batch-Hard Triplet mining (TripletIris), and (ii) ArcFace loss (ArcIris). The paper also provides open-source IREX-compliant C++ implementations of two existing methods: (a) an iris image filtering-based algorithm utilizing human saliency-driven kernels (HDBIF), and (b) a human-interpretable algorithm for detecting and comparing Fuchs' crypts (CRYPTS). Except for CRYPTS, which faced timing constraints during 1:N search, these methods have undergone the official IREX X evaluation and have also been assessed using several popular academic benchmarks: Quality-Face/Iris Research Ensemble, Warsaw-Biobase Post-Mortem Iris, CASIA-Iris-Thousand-V4, CASIA-Iris-Lamp-V4, IIT Delhi Iris Database, IIITD Contact Lens Iris Database, NDIris3D, and Notre Dame Variable Iris Image Quality Release 2. Finally, this paper also provides open-source models for iris segmentation and circle estimation that can be incorporated into any new iris recognition method.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript introduces two new open-source iris recognition algorithms (TripletIris trained with batch-hard triplet loss and ArcIris trained with ArcFace loss), supplies both Python training code and IREX-compliant C++ implementations, and provides C++ ports of two existing methods (HDBIF based on human saliency-driven kernels and CRYPTS for Fuchs' crypt detection). It reports the first official IREX X evaluations for open-source iris methods across eight public datasets (QFIRE, Warsaw Post-Mortem, CASIA-Iris-Thousand-V4, CASIA-Iris-Lamp-V4, IIT Delhi, IIITD Contact Lens, NDIris3D, and ND-VIQ2) plus supporting open-source segmentation and circle-estimation models intended to lower the barrier for future IREX submissions.
Significance. If the C++ implementations faithfully reproduce the described algorithms, the work supplies the first IREX-protocol results for open-source iris methods together with reusable code and a model submission template. This directly addresses a practical gap in standardized biometric evaluation by enabling academic teams to produce compliant entries without starting from scratch.
major comments (2)
- Section describing submission and timing constraints for CRYPTS: the manuscript flags timing limits during 1:N search but does not quantify the resulting accuracy impact or supply a timing-compliant variant; because CRYPTS is presented as one of the four evaluated methods, this detail is load-bearing for the claim that all contributed algorithms successfully completed official IREX X testing.
- Implementation and reproducibility sections: the paper assumes equivalence between the Python training pipelines and the released C++ inference code without reporting cross-validation experiments (e.g., feature-vector comparison or accuracy checks on held-out images); this assumption underpins both the IREX X numbers and the utility of the model submission for other teams.
minor comments (2)
- Training-hyperparameter and data-split details are only partially described; adding exact values, random seeds, and train/validation/test partitions would improve reproducibility of the reported accuracy figures.
- Table captions and axis labels in the benchmarking figures could be expanded to include the precise IREX X protocol parameters (e.g., gallery size, probe conditions) used for each dataset.
Simulated Author's Rebuttal
We thank the referee for their thoughtful review and constructive comments. We address each major comment below and indicate the revisions we plan to make to the manuscript.
read point-by-point responses
-
Referee: Section describing submission and timing constraints for CRYPTS: the manuscript flags timing limits during 1:N search but does not quantify the resulting accuracy impact or supply a timing-compliant variant; because CRYPTS is presented as one of the four evaluated methods, this detail is load-bearing for the claim that all contributed algorithms successfully completed official IREX X testing.
Authors: We appreciate this observation. The manuscript already notes that CRYPTS faced timing constraints during the 1:N search phase of IREX X. To address the referee's concern, we will revise the relevant section to include a quantitative assessment of the timing limits' effect on matching accuracy, drawing from our internal logs and additional analysis. However, we do not provide a timing-compliant variant because our contribution is to release the algorithm as implemented and evaluated, highlighting the practical challenges in meeting strict timing requirements for certain interpretable methods. We maintain that all methods, including CRYPTS, participated in the official evaluation, with the constraints explicitly stated. revision: partial
-
Referee: Implementation and reproducibility sections: the paper assumes equivalence between the Python training pipelines and the released C++ inference code without reporting cross-validation experiments (e.g., feature-vector comparison or accuracy checks on held-out images); this assumption underpins both the IREX X numbers and the utility of the model submission for other teams.
Authors: We agree that explicit verification of equivalence is important for reproducibility and trust in the released C++ code. In the revised manuscript, we will add a new subsection under Implementation detailing cross-validation results. Specifically, we will report comparisons of feature vectors generated by the Python and C++ implementations on a held-out test set from one of the datasets, along with any differences in accuracy metrics. This will strengthen the claim that the C++ ports faithfully reproduce the trained models. revision: yes
Circularity Check
No significant circularity: results from external IREX and independent benchmarks
full rationale
The paper reports performance metrics obtained from official IREX X evaluation and separate academic datasets (QFIRE, Warsaw Post-Mortem, CASIA, IITD, etc.). These quantities are not defined in terms of the paper's own fitted parameters, self-referential metrics, or ansatzes. No derivation chain reduces a claimed prediction to an input by construction, and no load-bearing uniqueness theorem is imported via self-citation. The work is a benchmarking and tooling contribution whose central claims remain externally falsifiable.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Standard assumptions of deep metric learning (triplet and ArcFace losses produce separable embeddings when trained on sufficient labeled iris pairs)
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
two Neural Networks trained with: (i) Triplet loss with Batch-Hard Triplet mining (TripletIris), and (ii) ArcFace loss (ArcIris)
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
open-source IREX-compliant C++ implementations of ... HDBIF ... CRYPTS
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
G. W. Quinn, G. W. Quinn, and J. R. Matey,IREX 10: Ongoing Evalu- ation of Iris Recognition Concept, Evaluation Plan, and API Overview. US Department of Commerce, National Institute of Standards and Technology, 2019
work page 2019
-
[2]
Facenet: A unified embed- ding for face recognition and clustering,
F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embed- ding for face recognition and clustering,” inProceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815– 823
work page 2015
-
[3]
Arcface: Additive angular margin loss for deep face recognition,
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive angular margin loss for deep face recognition,” inProceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 4690– 4699
work page 2019
-
[4]
Recognition of human iris patterns for biometric identification,
L. Masek, “Recognition of human iris patterns for biometric identification,” Master’s thesis, The University of Western Australia,
-
[5]
Available: https://peterkovesi.com/studentprojects/libor/ index.html
[Online]. Available: https://peterkovesi.com/studentprojects/libor/ index.html
-
[6]
Osiris: An open source iris recognition software,
N. Othman, B. Dorizzi, and S. Garcia-Salicetti, “Osiris: An open source iris recognition software,”Pattern Recognition Letters, vol. 82, pp. 124 – 131, 2016. [Online]. Available: https://doi.org/10.1016/j.patr ec.2015.09.002
-
[7]
G. Sutra, B. Dorizzi, S. Garcia-Salitcetti, and N. Othman, “A bio- metric reference system for iris. OSIRIS version 4.1: http://svnext.it- sudparis.eu/svnview2-eph/ref syst/iris osiris v4.1/,” (access: October 1, 2014)
work page 2014
-
[8]
Design decisions for an iris recognition sdk,
C. Rathgeb, A. Uhl, P. Wild, and H. Hofbauer, “Design decisions for an iris recognition sdk,” inHandbook of Iris Recognition, second edition ed., ser. Advances in Computer Vision and Pattern Recognition, K. Bowyer and M. J. Burge, Eds. Springer, 2016
work page 2016
-
[9]
Thirdeye: Triplet based iris recognition without normalization,
S. Ahmad and B. Fuller, “Thirdeye: Triplet based iris recognition without normalization,” inIEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2019, pp. 1–9
work page 2019
-
[10]
Dynamic graph representation for occlusion handling in biometrics
M. Ren, Y . Wang, Z. Sun, and T. Tan, “Dynamic graph representation for occlusion handling in biometrics.” inAnnual AAAI Conference on Artificial Intelligence, 2020, pp. 11 940–11 947
work page 2020
-
[11]
Multiscale dynamic graph representation for biometric recognition with occlusions,
M. Ren, Y . Wang, Y . Zhu, K. Zhang, and Z. Sun, “Multiscale dynamic graph representation for biometric recognition with occlusions,”IEEE Trans. Pattern Anal. Mach. Intell., vol. 45, no. 12, pp. 15 120–15 136, 2023
work page 2023
-
[12]
Hu- man saliency-driven patch-based matching for interpretable post-mortem iris recognition,
A. Boyd, D. Moreira, A. Kuehlkamp, K. Bowyer, and A. Czajka, “Hu- man saliency-driven patch-based matching for interpretable post-mortem iris recognition,” inIEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW), 2023, pp. 701–710
work page 2023
-
[13]
Iris: Iris recognition inference system of the worldcoin project,
W. AI, “Iris: Iris recognition inference system of the worldcoin project,”
-
[14]
Available: https://github.com/worldcoin/open-iris
[Online]. Available: https://github.com/worldcoin/open-iris
-
[15]
Two- headed eye-segmentation approach for biometric identification,
W. Lazarski, M. Zieba, T. Jeanneau, T. Zillig, and C. Brendel, “Two- headed eye-segmentation approach for biometric identification,”arXiv preprint arXiv:2209.15471, 2022
-
[16]
J. Daugman, “How iris recognition works,” pp. 715–739, 2009
work page 2009
-
[17]
Biosec baseline corpus: A multimodal biometric database,
J. Fierrez, J. Ortega-Garcia, D. T. Toledano, and J. Gonzalez-Rodriguez, “Biosec baseline corpus: A multimodal biometric database,”Pattern Recognition, vol. 40, no. 4, pp. 1389 – 1392, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0031320306004304
work page 2007
-
[18]
F. Alonso-Fernandez and J. Bigun, “Near-infrared and visible-light periocular recognition with gabor features using frequency-adaptive automatic eye detection,”IET Biometrics, vol. 4, pp. 74–89(15), June
-
[19]
Available: https://digital-library.theiet.org/content/jour nals/10.1049/iet-bmt.2014.0038
[Online]. Available: https://digital-library.theiet.org/content/jour nals/10.1049/iet-bmt.2014.0038
-
[20]
A ground truth for iris segmentation,
H. Hofbauer, F. Alonso-Fernandez, P. Wild, J. Bigun, and A. Uhl, “A ground truth for iris segmentation,” inInternational Conference on Pattern Recognition (ICPR). IEEE, Aug. 2014. [Online]. Available: http://dx.doi.org/10.1109/ICPR.2014.101
-
[21]
University of Bath, UK Iris Image Database,
D. Monro, S. Rakshit, and D. Zhang, “University of Bath, UK Iris Image Database,” 2009
work page 2009
-
[22]
Post-mortem iris recognition resistant to biological eye decay processes,
M. Trokielewicz, A. Czajka, and P. Maciejewicz, “Post-mortem iris recognition resistant to biological eye decay processes,” in2020 IEEE Winter Conference on Applications of Computer Vision (WACV), 2020, pp. 2296–2304. PREPRINT 15
work page 2020
-
[23]
Frvt 2006 and ice 2006 large-scale experimental results,
P. Phillips, W. Scruggs, A. O’Toole, P. Flynn, K. Bowyer, C. Schott, and M. Sharpe, “Frvt 2006 and ice 2006 large-scale experimental results,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 5, p. 831–846, May
work page 2006
-
[24]
Available: http://dx.doi.org/10.1109/TPAMI.2009.59
[Online]. Available: http://dx.doi.org/10.1109/TPAMI.2009.59
-
[25]
Evaluation of the IRISSEG datasets,
H. Hofbauer, F. Alonso-Fernandez, P. Wild, J. Bigun, and A. Uhl, “Evaluation of the IRISSEG datasets,” University of Salzburg, Tech. Rep., Feb. 2014. [Online]. Available: https://www.wavelab.at/sources/H ofbauer14b/
work page 2014
-
[26]
Chinese Academy of Sciences. (2010) CASIA-Iris-Syn v4. Chinese Academy of Sciences. [Online]. Available: http://www.cbsr.ia.ac.cn/ch ina/Iris%20Databases%20CH.asp
work page 2010
-
[27]
The UBIRIS.v2: A database of visible wavelength images captured on- the-move and at-a-distance,
H. Proenca, S. Filipe, R. Santos, J. Oliveira, and L. Alexandre, “The UBIRIS.v2: A database of visible wavelength images captured on- the-move and at-a-distance,”IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 8, pp. 1529–1535, 2010
work page 2010
-
[28]
- Soft Computing and Image Analysis Group
SOCIA Lab. - Soft Computing and Image Analysis Group. (2004) Noisy Visible Wavelength Iris Image Databases (UBIRIS). [Online]. Available: http://iris.di.ubi.pt
work page 2004
-
[29]
Implications of ocular pathologies for iris recognition reliability,
M. Trokielewicz, A. Czajka, and P. Maciejewicz, “Implications of ocular pathologies for iris recognition reliability,”Image and Vision Computing, vol. 58, pp. 158–167, 2017. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0262885616301251
work page 2017
-
[30]
M. Trokielewicz, A. Czajka, and P. Maciejewicz, “Iris recognition after death,”IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1501–1514, June 2019
work page 2019
-
[31]
S. J. Garbin, Y . Shen, I. Schuetz, R. Cavin, G. Hughes, and S. S. Talathi, “Openeds: Open eye dataset,”arXiv preprint arXiv:1905.03702, 2019
work page internal anchor Pith review Pith/arXiv arXiv 1905
-
[32]
“Notre dame cvrl datasets,” 2025. [Online]. Available: https: //cvrl.nd.edu/projects/data/
work page 2025
-
[33]
Quality in face and iris research ensemble (q-fire),
P. A. Johnson, P. Lopez-Meyer, N. Sazonova, F. Hua, and S. Schuckers, “Quality in face and iris research ensemble (q-fire),” in2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2010, pp. 1–6
work page 2010
-
[34]
Iris Liveness Detection Competition (LivDet-Iris) - The 2020 Edition,
P. Das, J. McGrath, Z. Fang, A. Boyd, G. Jang, A. Mohammadi, S. Purnapatra, D. Yambay, S. Marcel, M. Trokielewicz, P. Maciejewicz, K. Bowyer, A. Czajka, S. Schuckers, J. Tapia, S. Gonzalez, M. Fang, N. Damer, F. Boutros, A. Kuijper, R. Sharma, C. Chen, and A. Ross, “Iris Liveness Detection Competition (LivDet-Iris) - The 2020 Edition,” inIEEE Internationa...
work page 2020
-
[35]
LivDet-Iris 2020 – Liveness Detection Competition Series,
“LivDet-Iris 2020 – Liveness Detection Competition Series,” http://ww w.iris2020.livdet.org/, accessed: July 16, 2020
work page 2020
-
[36]
CASIA Iris Image Database Version 4.0,
Center for Biometrics and Security Research (CBSR), “CASIA Iris Image Database Version 4.0,” Institute of Automation, Chinese Academy of Sciences, 2010. [Online]. Available: http://biometrics.idealtest.org/
work page 2010
-
[37]
Comparison and combination of iris matchers for reliable personal authentication,
A. Kumar and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication,”Pattern recognition, vol. 43, no. 3, pp. 1016–1026, 2010
work page 2010
-
[38]
Robust iris presentation attack detection fusing 2d and 3d information,
Z. Fang, A. Czajka, and K. W. Bowyer, “Robust iris presentation attack detection fusing 2d and 3d information,”IEEE Transactions on Information Forensics and Security, vol. 16, pp. 510–520, 2020
work page 2020
-
[39]
Iris liveness detection competition (livdet-iris)-the 2020 edition,
P. Das, J. Mcfiratht, Z. Fang, A. Boyd, G. Jang, A. Mohammadi, S. Purnapatra, D. Yambay, S. Marcel, M. Trokielewiczet al., “Iris liveness detection competition (livdet-iris)-the 2020 edition,” in2020 IEEE international joint conference on biometrics (IJCB). IEEE, 2020, pp. 1–9
work page 2020
-
[40]
Unraveling the effect of textured contact lenses on iris recognition,
D. Yadav, N. Kohli, J. S. Doyle, R. Singh, M. Vatsa, and K. W. Bowyer, “Unraveling the effect of textured contact lenses on iris recognition,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 851–862, 2014
work page 2014
-
[41]
Nd variable iris image quality release 2 non-sequestered dataset
“Nd variable iris image quality release 2 non-sequestered dataset.” [Online]. Available: https://cvrl.nd.edu/projects/data/#nd-variable-iris-i mage-quality-release-2-non-sequestered-nd-vii-q-r2-dataset
-
[42]
Unet++: A nested u-net architecture for medical image segmenta- tion,
Z. Zhou, M. M. Rahman Siddiquee, N. Tajbakhsh, and J. Liang, “Unet++: A nested u-net architecture for medical image segmenta- tion,” inDeep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support: 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Gran...
work page 2018
-
[43]
Deep residual learning for image recognition,
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” inProceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778
work page 2016
-
[44]
C. Li, Y . Tan, W. Chen, X. Luo, Y . He, Y . Gao, and F. Li, “Anu- net: Attention-based nested u-net to exploit full resolution features for medical image segmentation,”Computers & Graphics, vol. 90, pp. 11– 20, 2020
work page 2020
-
[45]
See more than once: Kernel-sharing atrous convolution for semantic segmentation,
Y . Huang, Q. Wang, W. Jia, Y . Lu, Y . Li, and X. He, “See more than once: Kernel-sharing atrous convolution for semantic segmentation,” Neurocomputing, vol. 443, pp. 26–34, 2021
work page 2021
-
[46]
J. Daugman, “How iris recognition works,”IEEE Trans. on Circuits and Systems for Video Tech., vol. 14, no. 1, pp. 21–30, January 2004
work page 2004
-
[47]
Z. Liu, H. Mao, C.-Y . Wu, C. Feichtenhofer, T. Darrell, and S. Xie, “A convnet for the 2020s,” inProceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 11 976–11 986
work page 2022
-
[48]
Generalised dice overlap as a deep learning loss function for highly unbalanced segmentations,
C. H. Sudre, W. Li, T. Vercauteren, S. Ourselin, and M. Jorge Car- doso, “Generalised dice overlap as a deep learning loss function for highly unbalanced segmentations,” inDeep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support: Third International Workshop, DLMIA 2017, and 7th International Workshop, ML-CDS 2017, Hel...
work page 2017
-
[49]
R. Girshick, “Fast r-cnn,” inProceedings of the IEEE international conference on computer vision, 2015, pp. 1440–1448
work page 2015
-
[50]
Domain-specific human-inspired binarized statistical image features for iris recognition,
A. Czajka, D. Moreira, K. Bowyer, and P. Flynn, “Domain-specific human-inspired binarized statistical image features for iris recognition,” inIEEE Winter Conference on Applications of Computer Vision (WACV). Waikoloa Village, Hawai, United States: IEEE, Jan 2019, pp. 959–967
work page 2019
-
[51]
Iris recognition based on human-interpretable features,
J. Chen, F. Shen, D. Z. Chen, and P. J. Flynn, “Iris recognition based on human-interpretable features,”IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, pp. 1476–1485, July 2016
work page 2016
-
[52]
Spaghetti labeling: Directed acyclic graphs for block-based connected components label- ing,
F. Bolelli, S. Allegretti, L. Baraldi, and C. Grana, “Spaghetti labeling: Directed acyclic graphs for block-based connected components label- ing,”IEEE Transactions on Image Processing, vol. 29, pp. 1999–2012, 2019
work page 1999
-
[53]
Morphological grayscale reconstruction in image analysis: applications and efficient algorithms,
L. Vincent, “Morphological grayscale reconstruction in image analysis: applications and efficient algorithms,”IEEE transactions on image processing, vol. 2, no. 2, pp. 176–201, 1993
work page 1993
-
[54]
Parallelizing the dual revised simplex method,
Q. Huangfu and J. J. Hall, “Parallelizing the dual revised simplex method,”Mathematical Programming Computation, vol. 10, no. 1, pp. 119–142, 2018
work page 2018
-
[55]
Irex 10: Identification track,
“Irex 10: Identification track,” NIST. [Online]. Available: https: //pages.nist.gov/IREX10/
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.