Artykuły w czasopismach na temat „Face presentation attack detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Face presentation attack detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Abdullakutty, Faseela, Pamela Johnston i Eyad Elyan. "Fusion Methods for Face Presentation Attack Detection". Sensors 22, nr 14 (12.07.2022): 5196. http://dx.doi.org/10.3390/s22145196.
Pełny tekst źródłaZhu, Shuaishuai, Xiaobo Lv, Xiaohua Feng, Jie Lin, Peng Jin i Liang Gao. "Plenoptic Face Presentation Attack Detection". IEEE Access 8 (2020): 59007–14. http://dx.doi.org/10.1109/access.2020.2980755.
Pełny tekst źródłaKowalski, Marcin. "A Study on Presentation Attack Detection in Thermal Infrared". Sensors 20, nr 14 (17.07.2020): 3988. http://dx.doi.org/10.3390/s20143988.
Pełny tekst źródłaWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante i Stan Z. Li. "Multi-Modal Face Presentation Attack Detection". Synthesis Lectures on Computer Vision 9, nr 1 (27.07.2020): 1–88. http://dx.doi.org/10.2200/s01032ed1v01y202007cov017.
Pełny tekst źródłaAlshareef, Norah, Xiaohong Yuan, Kaushik Roy i Mustafa Atay. "A Study of Gender Bias in Face Presentation Attack and Its Mitigation". Future Internet 13, nr 9 (14.09.2021): 234. http://dx.doi.org/10.3390/fi13090234.
Pełny tekst źródłaBenlamoudi, Azeddine, Salah Eddine Bekhouche, Maarouf Korichi, Khaled Bensid, Abdeldjalil Ouahabi, Abdenour Hadid i Abdelmalik Taleb-Ahmed. "Face Presentation Attack Detection Using Deep Background Subtraction". Sensors 22, nr 10 (15.05.2022): 3760. http://dx.doi.org/10.3390/s22103760.
Pełny tekst źródłaWan, Jun, Sergio Escalera, Hugo Jair Escalante, Guodong Guo i Stan Z. Li. "Special Issue on Face Presentation Attack Detection". IEEE Transactions on Biometrics, Behavior, and Identity Science 3, nr 3 (lipiec 2021): 282–84. http://dx.doi.org/10.1109/tbiom.2021.3089903.
Pełny tekst źródłaNguyen, Dat, Tuyen Pham, Min Lee i Kang Park. "Visible-Light Camera Sensor-Based Presentation Attack Detection for Face Recognition by Combining Spatial and Temporal Information". Sensors 19, nr 2 (20.01.2019): 410. http://dx.doi.org/10.3390/s19020410.
Pełny tekst źródłaRamachandra, Raghavendra, i Christoph Busch. "Presentation Attack Detection Methods for Face Recognition Systems". ACM Computing Surveys 50, nr 1 (13.04.2017): 1–37. http://dx.doi.org/10.1145/3038924.
Pełny tekst źródłaPeng, Fei, Le Qin i Min Long. "Face presentation attack detection using guided scale texture". Multimedia Tools and Applications 77, nr 7 (13.05.2017): 8883–909. http://dx.doi.org/10.1007/s11042-017-4780-0.
Pełny tekst źródłaNguyen, Dat Tien, Tuyen Danh Pham, Ganbayar Batchuluun, Kyoung Jun Noh i Kang Ryoung Park. "Presentation Attack Face Image Generation Based on a Deep Generative Adversarial Network". Sensors 20, nr 7 (25.03.2020): 1810. http://dx.doi.org/10.3390/s20071810.
Pełny tekst źródłaDu, Yuting, Tong Qiao, Ming Xu i Ning Zheng. "Towards Face Presentation Attack Detection Based on Residual Color Texture Representation". Security and Communication Networks 2021 (15.03.2021): 1–16. http://dx.doi.org/10.1155/2021/6652727.
Pełny tekst źródłaKowalski, Marcin, i Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques". Photonics Letters of Poland 13, nr 2 (30.06.2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.
Pełny tekst źródłaWang, Caixun, Bingyao Yu i Jie Zhou. "A Learnable Gradient operator for face presentation attack detection". Pattern Recognition 135 (marzec 2023): 109146. http://dx.doi.org/10.1016/j.patcog.2022.109146.
Pełny tekst źródłaFang, Meiling, Naser Damer, Florian Kirchbuchner i Arjan Kuijper. "Real masks and spoof faces: On the masked face presentation attack detection". Pattern Recognition 123 (marzec 2022): 108398. http://dx.doi.org/10.1016/j.patcog.2021.108398.
Pełny tekst źródłaYu, Bingyao, Jiwen Lu, Xiu Li i Jie Zhou. "Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning". IEEE Transactions on Information Forensics and Security 17 (2022): 413–27. http://dx.doi.org/10.1109/tifs.2021.3135748.
Pełny tekst źródłaSequeira, Ana F., Tiago Gonçalves, Wilson Silva, João Ribeiro Pinto i Jaime S. Cardoso. "An exploratory study of interpretability for face presentation attack detection". IET Biometrics 10, nr 4 (12.06.2021): 441–55. http://dx.doi.org/10.1049/bme2.12045.
Pełny tekst źródłaRaghavendra, R., Kiran B. Raja i Christoph Busch. "Presentation Attack Detection for Face Recognition Using Light Field Camera". IEEE Transactions on Image Processing 24, nr 3 (marzec 2015): 1060–75. http://dx.doi.org/10.1109/tip.2015.2395951.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Xiaoyue Jiang, Fabio Roli i Xiaoyi Feng. "CompactNet: learning a compact space for face presentation attack detection". Neurocomputing 409 (październik 2020): 191–207. http://dx.doi.org/10.1016/j.neucom.2020.05.017.
Pełny tekst źródłaJia, Shan, Guodong Guo, Zhengquan Xu i Qiangchang Wang. "Face presentation attack detection in mobile scenarios: A comprehensive evaluation". Image and Vision Computing 93 (styczeń 2020): 103826. http://dx.doi.org/10.1016/j.imavis.2019.11.004.
Pełny tekst źródłaQin, Le, Fei Peng, Min Long, Raghavendra Ramachandra i Christoph Busch. "Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study". ACM Transactions on Privacy and Security 25, nr 1 (28.02.2022): 1–28. http://dx.doi.org/10.1145/3491199.
Pełny tekst źródłaH, Vinutha, i Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques". Computer Science and Information Technologies 4, nr 1 (1.03.2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.p1-13.
Pełny tekst źródłaYu, Zitong, Xiaobai Li, Pichao Wang i Guoying Zhao. "TransRPPG: Remote Photoplethysmography Transformer for 3D Mask Face Presentation Attack Detection". IEEE Signal Processing Letters 28 (2021): 1290–94. http://dx.doi.org/10.1109/lsp.2021.3089908.
Pełny tekst źródłaCosta‐Pazo, Artur, Daniel Pérez‐Cabo, David Jiménez‐Cabello, José Luis Alba‐Castro i Esteban Vazquez‐Fernandez. "Face presentation attack detection. A comprehensive evaluation of the generalisation problem". IET Biometrics 10, nr 4 (28.06.2021): 408–29. http://dx.doi.org/10.1049/bme2.12049.
Pełny tekst źródłaMuhammad, Usman, Zitong Yu i Jukka Komulainen. "Self-supervised 2D face presentation attack detection via temporal sequence sampling". Pattern Recognition Letters 156 (kwiecień 2022): 15–22. http://dx.doi.org/10.1016/j.patrec.2022.03.001.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Jun Wu, Lei Yang i Huijian Han. "Face presentation attack detection based on optical flow and texture analysis". Journal of King Saud University - Computer and Information Sciences 34, nr 4 (kwiecień 2022): 1455–67. http://dx.doi.org/10.1016/j.jksuci.2022.02.019.
Pełny tekst źródłaMa, Yukun, Yaowen Xu i Fanghao Liu. "Multi-Perspective Dynamic Features for Cross-Database Face Presentation Attack Detection". IEEE Access 8 (2020): 26505–16. http://dx.doi.org/10.1109/access.2020.2971224.
Pełny tekst źródłaGeorge, Anjith, Zohreh Mostaani, David Geissenbuhler, Olegs Nikisins, Andre Anjos i Sebastien Marcel. "Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network". IEEE Transactions on Information Forensics and Security 15 (2020): 42–55. http://dx.doi.org/10.1109/tifs.2019.2916652.
Pełny tekst źródłaWang, Guoqing, Hu Han, Shiguang Shan i Xilin Chen. "Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection". IEEE Transactions on Information Forensics and Security 16 (2021): 56–69. http://dx.doi.org/10.1109/tifs.2020.3002390.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Xiaoyue Jiang, Yupeng Ma, Fabio Roli i Xiaoyi Feng. "3D face mask presentation attack detection based on intrinsic image analysis". IET Biometrics 9, nr 3 (11.03.2020): 100–108. http://dx.doi.org/10.1049/iet-bmt.2019.0155.
Pełny tekst źródłaSun, Pengcheng, Dan Zeng, Xiaoyan Li, Lin Yang, Liyuan Li, Zhouxia Chen i Fansheng Chen. "A 3D Mask Presentation Attack Detection Method Based on Polarization Medium Wave Infrared Imaging". Symmetry 12, nr 3 (3.03.2020): 376. http://dx.doi.org/10.3390/sym12030376.
Pełny tekst źródłaGonzález‐Soler, Lázaro J., Marta Gomez‐Barrero i Christoph Busch. "On the generalisation capabilities of Fisher vector‐based face presentation attack detection". IET Biometrics 10, nr 5 (2.05.2021): 480–96. http://dx.doi.org/10.1049/bme2.12041.
Pełny tekst źródłaNguyen, Hoai Phuong, Anges Delahaies, Florent Retraint i Frederic Morain-Nicolier. "Face Presentation Attack Detection Based on a Statistical Model of Image Noise". IEEE Access 7 (2019): 175429–42. http://dx.doi.org/10.1109/access.2019.2957273.
Pełny tekst źródłaRehman, Yasar Abbas Ur, Lai-Man Po i Jukka Komulainen. "Enhancing deep discriminative feature maps via perturbation for face presentation attack detection". Image and Vision Computing 94 (luty 2020): 103858. http://dx.doi.org/10.1016/j.imavis.2019.103858.
Pełny tekst źródłaPinto, Allan, Siome Goldenstein, Alexandre Ferreira, Tiago Carvalho, Helio Pedrini i Anderson Rocha. "Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection". IEEE Transactions on Information Forensics and Security 15 (2020): 3347–58. http://dx.doi.org/10.1109/tifs.2020.2988168.
Pełny tekst źródłaEiny, Sajad, Cemil Oz i Yahya Dorostkar Navaei. "IoT Cloud-Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model". Journal of Sensors 2021 (30.08.2021): 1–18. http://dx.doi.org/10.1155/2021/5047808.
Pełny tekst źródłaLiu, Si-Qi, Xiangyuan Lan i Pong C. Yuen. "Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection". IEEE Transactions on Information Forensics and Security 16 (2021): 2683–96. http://dx.doi.org/10.1109/tifs.2021.3050060.
Pełny tekst źródłaSepas-Moghaddam, Alireza, Fernando Pereira i Paulo Lobato Correia. "Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further". IEEE Transactions on Information Forensics and Security 13, nr 7 (lipiec 2018): 1696–709. http://dx.doi.org/10.1109/tifs.2018.2799427.
Pełny tekst źródłaDwivedi, Abhishek, i Shekhar Verma. "SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept". Scientific Temper 13, nr 02 (12.12.2022): 165–72. http://dx.doi.org/10.58414/scientifictemper.2022.13.2.25.
Pełny tekst źródłaMa, Yukun, Lifang Wu, Zeyu Li i Fanghao liu. "A novel face presentation attack detection scheme based on multi-regional convolutional neural networks". Pattern Recognition Letters 131 (marzec 2020): 261–67. http://dx.doi.org/10.1016/j.patrec.2020.01.002.
Pełny tekst źródłaMing, Zuheng, Muriel Visani, Muhammad Muzzamil Luqman i Jean-Christophe Burie. "A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices". Journal of Imaging 6, nr 12 (15.12.2020): 139. http://dx.doi.org/10.3390/jimaging6120139.
Pełny tekst źródłaTamtama, Gabriel Indra Widi, i I. Kadek Dendy Senapartha. "Fake Face Detection System Using MobileNets Architecture". CESS (Journal of Computer Engineering, System and Science) 8, nr 2 (3.07.2023): 329. http://dx.doi.org/10.24114/cess.v8i2.43762.
Pełny tekst źródłaGeorge, Anjith, i Sebastien Marcel. "Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks". IEEE Transactions on Information Forensics and Security 16 (2021): 361–75. http://dx.doi.org/10.1109/tifs.2020.3013214.
Pełny tekst źródłaSafaa El‐Din, Yomna, Mohamed N. Moustafa i Hani Mahdi. "Deep convolutional neural networks for face and iris presentation attack detection: survey and case study". IET Biometrics 9, nr 5 (29.07.2020): 179–93. http://dx.doi.org/10.1049/iet-bmt.2020.0004.
Pełny tekst źródłaGaldi, Chiara, Valeria Chiesa, Christoph Busch, Paulo Lobato Correia, Jean-Luc Dugelay i Christine Guillemot. "Light Fields for Face Analysis". Sensors 19, nr 12 (14.06.2019): 2687. http://dx.doi.org/10.3390/s19122687.
Pełny tekst źródłaPeng, Fei, Le Qin i Min Long. "Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning". Journal of Visual Communication and Image Representation 66 (styczeń 2020): 102746. http://dx.doi.org/10.1016/j.jvcir.2019.102746.
Pełny tekst źródłaShen, Meng, Yaqian Wei, Zelin Liao i Liehuang Zhu. "IriTrack". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, nr 2 (23.06.2021): 1–21. http://dx.doi.org/10.1145/3463515.
Pełny tekst źródłaHassani, Ali, Jon Diedrich i Hafiz Malik. "Monocular Facial Presentation–Attack–Detection: Classifying Near-Infrared Reflectance Patterns". Applied Sciences 13, nr 3 (3.02.2023): 1987. http://dx.doi.org/10.3390/app13031987.
Pełny tekst źródłaB R, Rohini, Dr Yogish H K i Dr Deepa Y. "DEEP LEARNING BASED CHALLENGE RESPONSE LIVELINESS MATCHING FOR PRESENTATION ATTACK DETECTION IN FACE RECOGNITION BIOMETRIC AUTHENTICATION SYSTEMS". Indian Journal of Computer Science and Engineering 13, nr 3 (20.06.2022): 709–20. http://dx.doi.org/10.21817/indjcse/2022/v13i3/221303063.
Pełny tekst źródłaFavorskaya, Margarita N., i Andrey I. Pakhirka. "Building depth maps for detection of presentation attacks in face recognition systems". Информационные и математические технологии в науке и управлении, nr 3 (2022): 40–48. http://dx.doi.org/10.38028/esi.2022.27.3.005.
Pełny tekst źródła