Artykuły w czasopismach na temat „Face presentation attack detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Face presentation attack detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Abdullakutty, Faseela, Pamela Johnston, and Eyad Elyan. "Fusion Methods for Face Presentation Attack Detection." Sensors 22, no. 14 (2022): 5196. http://dx.doi.org/10.3390/s22145196.
Pełny tekst źródłaZhu, Shuaishuai, Xiaobo Lv, Xiaohua Feng, Jie Lin, Peng Jin, and Liang Gao. "Plenoptic Face Presentation Attack Detection." IEEE Access 8 (2020): 59007–14. http://dx.doi.org/10.1109/access.2020.2980755.
Pełny tekst źródłaKowalski, Marcin. "A Study on Presentation Attack Detection in Thermal Infrared." Sensors 20, no. 14 (2020): 3988. http://dx.doi.org/10.3390/s20143988.
Pełny tekst źródłaWan, Jun, Guodong Guo, Sergio Escalera, Hugo Jair Escalante, and Stan Z. Li. "Multi-Modal Face Presentation Attack Detection." Synthesis Lectures on Computer Vision 9, no. 1 (2020): 1–88. http://dx.doi.org/10.2200/s01032ed1v01y202007cov017.
Pełny tekst źródłaAlshareef, Norah, Xiaohong Yuan, Kaushik Roy, and Mustafa Atay. "A Study of Gender Bias in Face Presentation Attack and Its Mitigation." Future Internet 13, no. 9 (2021): 234. http://dx.doi.org/10.3390/fi13090234.
Pełny tekst źródłaBenlamoudi, Azeddine, Salah Eddine Bekhouche, Maarouf Korichi, et al. "Face Presentation Attack Detection Using Deep Background Subtraction." Sensors 22, no. 10 (2022): 3760. http://dx.doi.org/10.3390/s22103760.
Pełny tekst źródłaWan, Jun, Sergio Escalera, Hugo Jair Escalante, Guodong Guo, and Stan Z. Li. "Special Issue on Face Presentation Attack Detection." IEEE Transactions on Biometrics, Behavior, and Identity Science 3, no. 3 (2021): 282–84. http://dx.doi.org/10.1109/tbiom.2021.3089903.
Pełny tekst źródłaNguyen, Dat, Tuyen Pham, Min Lee, and Kang Park. "Visible-Light Camera Sensor-Based Presentation Attack Detection for Face Recognition by Combining Spatial and Temporal Information." Sensors 19, no. 2 (2019): 410. http://dx.doi.org/10.3390/s19020410.
Pełny tekst źródłaRamachandra, Raghavendra, and Christoph Busch. "Presentation Attack Detection Methods for Face Recognition Systems." ACM Computing Surveys 50, no. 1 (2017): 1–37. http://dx.doi.org/10.1145/3038924.
Pełny tekst źródłaPeng, Fei, Le Qin, and Min Long. "Face presentation attack detection using guided scale texture." Multimedia Tools and Applications 77, no. 7 (2017): 8883–909. http://dx.doi.org/10.1007/s11042-017-4780-0.
Pełny tekst źródłaNguyen, Dat Tien, Tuyen Danh Pham, Ganbayar Batchuluun, Kyoung Jun Noh, and Kang Ryoung Park. "Presentation Attack Face Image Generation Based on a Deep Generative Adversarial Network." Sensors 20, no. 7 (2020): 1810. http://dx.doi.org/10.3390/s20071810.
Pełny tekst źródłaDu, Yuting, Tong Qiao, Ming Xu, and Ning Zheng. "Towards Face Presentation Attack Detection Based on Residual Color Texture Representation." Security and Communication Networks 2021 (March 15, 2021): 1–16. http://dx.doi.org/10.1155/2021/6652727.
Pełny tekst źródłaKowalski, Marcin, and Krzysztof Mierzejewski. "Detection of 3D face masks with thermal infrared imaging and deep learning techniques." Photonics Letters of Poland 13, no. 2 (2021): 22. http://dx.doi.org/10.4302/plp.v13i2.1091.
Pełny tekst źródłaWang, Caixun, Bingyao Yu, and Jie Zhou. "A Learnable Gradient operator for face presentation attack detection." Pattern Recognition 135 (March 2023): 109146. http://dx.doi.org/10.1016/j.patcog.2022.109146.
Pełny tekst źródłaFang, Meiling, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. "Real masks and spoof faces: On the masked face presentation attack detection." Pattern Recognition 123 (March 2022): 108398. http://dx.doi.org/10.1016/j.patcog.2021.108398.
Pełny tekst źródłaYu, Bingyao, Jiwen Lu, Xiu Li, and Jie Zhou. "Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning." IEEE Transactions on Information Forensics and Security 17 (2022): 413–27. http://dx.doi.org/10.1109/tifs.2021.3135748.
Pełny tekst źródłaSequeira, Ana F., Tiago Gonçalves, Wilson Silva, João Ribeiro Pinto, and Jaime S. Cardoso. "An exploratory study of interpretability for face presentation attack detection." IET Biometrics 10, no. 4 (2021): 441–55. http://dx.doi.org/10.1049/bme2.12045.
Pełny tekst źródłaRaghavendra, R., Kiran B. Raja, and Christoph Busch. "Presentation Attack Detection for Face Recognition Using Light Field Camera." IEEE Transactions on Image Processing 24, no. 3 (2015): 1060–75. http://dx.doi.org/10.1109/tip.2015.2395951.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Xiaoyue Jiang, Fabio Roli, and Xiaoyi Feng. "CompactNet: learning a compact space for face presentation attack detection." Neurocomputing 409 (October 2020): 191–207. http://dx.doi.org/10.1016/j.neucom.2020.05.017.
Pełny tekst źródłaJia, Shan, Guodong Guo, Zhengquan Xu, and Qiangchang Wang. "Face presentation attack detection in mobile scenarios: A comprehensive evaluation." Image and Vision Computing 93 (January 2020): 103826. http://dx.doi.org/10.1016/j.imavis.2019.11.004.
Pełny tekst źródłaQin, Le, Fei Peng, Min Long, Raghavendra Ramachandra, and Christoph Busch. "Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–28. http://dx.doi.org/10.1145/3491199.
Pełny tekst źródłaH, Vinutha, and Thippeswamy G. "Antispoofing in face biometrics: a comprehensive study on software-based techniques." Computer Science and Information Technologies 4, no. 1 (2023): 1–13. http://dx.doi.org/10.11591/csit.v4i1.p1-13.
Pełny tekst źródłaYu, Zitong, Xiaobai Li, Pichao Wang, and Guoying Zhao. "TransRPPG: Remote Photoplethysmography Transformer for 3D Mask Face Presentation Attack Detection." IEEE Signal Processing Letters 28 (2021): 1290–94. http://dx.doi.org/10.1109/lsp.2021.3089908.
Pełny tekst źródłaCosta‐Pazo, Artur, Daniel Pérez‐Cabo, David Jiménez‐Cabello, José Luis Alba‐Castro, and Esteban Vazquez‐Fernandez. "Face presentation attack detection. A comprehensive evaluation of the generalisation problem." IET Biometrics 10, no. 4 (2021): 408–29. http://dx.doi.org/10.1049/bme2.12049.
Pełny tekst źródłaMuhammad, Usman, Zitong Yu, and Jukka Komulainen. "Self-supervised 2D face presentation attack detection via temporal sequence sampling." Pattern Recognition Letters 156 (April 2022): 15–22. http://dx.doi.org/10.1016/j.patrec.2022.03.001.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Jun Wu, Lei Yang, and Huijian Han. "Face presentation attack detection based on optical flow and texture analysis." Journal of King Saud University - Computer and Information Sciences 34, no. 4 (2022): 1455–67. http://dx.doi.org/10.1016/j.jksuci.2022.02.019.
Pełny tekst źródłaMa, Yukun, Yaowen Xu, and Fanghao Liu. "Multi-Perspective Dynamic Features for Cross-Database Face Presentation Attack Detection." IEEE Access 8 (2020): 26505–16. http://dx.doi.org/10.1109/access.2020.2971224.
Pełny tekst źródłaGeorge, Anjith, Zohreh Mostaani, David Geissenbuhler, Olegs Nikisins, Andre Anjos, and Sebastien Marcel. "Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network." IEEE Transactions on Information Forensics and Security 15 (2020): 42–55. http://dx.doi.org/10.1109/tifs.2019.2916652.
Pełny tekst źródłaWang, Guoqing, Hu Han, Shiguang Shan, and Xilin Chen. "Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection." IEEE Transactions on Information Forensics and Security 16 (2021): 56–69. http://dx.doi.org/10.1109/tifs.2020.3002390.
Pełny tekst źródłaLi, Lei, Zhaoqiang Xia, Xiaoyue Jiang, Yupeng Ma, Fabio Roli, and Xiaoyi Feng. "3D face mask presentation attack detection based on intrinsic image analysis." IET Biometrics 9, no. 3 (2020): 100–108. http://dx.doi.org/10.1049/iet-bmt.2019.0155.
Pełny tekst źródłaSun, Pengcheng, Dan Zeng, Xiaoyan Li, et al. "A 3D Mask Presentation Attack Detection Method Based on Polarization Medium Wave Infrared Imaging." Symmetry 12, no. 3 (2020): 376. http://dx.doi.org/10.3390/sym12030376.
Pełny tekst źródłaGonzález‐Soler, Lázaro J., Marta Gomez‐Barrero, and Christoph Busch. "On the generalisation capabilities of Fisher vector‐based face presentation attack detection." IET Biometrics 10, no. 5 (2021): 480–96. http://dx.doi.org/10.1049/bme2.12041.
Pełny tekst źródłaNguyen, Hoai Phuong, Anges Delahaies, Florent Retraint, and Frederic Morain-Nicolier. "Face Presentation Attack Detection Based on a Statistical Model of Image Noise." IEEE Access 7 (2019): 175429–42. http://dx.doi.org/10.1109/access.2019.2957273.
Pełny tekst źródłaRehman, Yasar Abbas Ur, Lai-Man Po, and Jukka Komulainen. "Enhancing deep discriminative feature maps via perturbation for face presentation attack detection." Image and Vision Computing 94 (February 2020): 103858. http://dx.doi.org/10.1016/j.imavis.2019.103858.
Pełny tekst źródłaPinto, Allan, Siome Goldenstein, Alexandre Ferreira, Tiago Carvalho, Helio Pedrini, and Anderson Rocha. "Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection." IEEE Transactions on Information Forensics and Security 15 (2020): 3347–58. http://dx.doi.org/10.1109/tifs.2020.2988168.
Pełny tekst źródłaEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "IoT Cloud-Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model." Journal of Sensors 2021 (August 30, 2021): 1–18. http://dx.doi.org/10.1155/2021/5047808.
Pełny tekst źródłaLiu, Si-Qi, Xiangyuan Lan, and Pong C. Yuen. "Multi-Channel Remote Photoplethysmography Correspondence Feature for 3D Mask Face Presentation Attack Detection." IEEE Transactions on Information Forensics and Security 16 (2021): 2683–96. http://dx.doi.org/10.1109/tifs.2021.3050060.
Pełny tekst źródłaSepas-Moghaddam, Alireza, Fernando Pereira, and Paulo Lobato Correia. "Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further." IEEE Transactions on Information Forensics and Security 13, no. 7 (2018): 1696–709. http://dx.doi.org/10.1109/tifs.2018.2799427.
Pełny tekst źródłaDwivedi, Abhishek, and Shekhar Verma. "SCNN Based Classification Technique for the Face Spoof Detection Using Deep Learning Concept." Scientific Temper 13, no. 02 (2022): 165–72. http://dx.doi.org/10.58414/scientifictemper.2022.13.2.25.
Pełny tekst źródłaMa, Yukun, Lifang Wu, Zeyu Li, and Fanghao liu. "A novel face presentation attack detection scheme based on multi-regional convolutional neural networks." Pattern Recognition Letters 131 (March 2020): 261–67. http://dx.doi.org/10.1016/j.patrec.2020.01.002.
Pełny tekst źródłaMing, Zuheng, Muriel Visani, Muhammad Muzzamil Luqman, and Jean-Christophe Burie. "A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices." Journal of Imaging 6, no. 12 (2020): 139. http://dx.doi.org/10.3390/jimaging6120139.
Pełny tekst źródłaTamtama, Gabriel Indra Widi, and I. Kadek Dendy Senapartha. "Fake Face Detection System Using MobileNets Architecture." CESS (Journal of Computer Engineering, System and Science) 8, no. 2 (2023): 329. http://dx.doi.org/10.24114/cess.v8i2.43762.
Pełny tekst źródłaGeorge, Anjith, and Sebastien Marcel. "Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks." IEEE Transactions on Information Forensics and Security 16 (2021): 361–75. http://dx.doi.org/10.1109/tifs.2020.3013214.
Pełny tekst źródłaSafaa El‐Din, Yomna, Mohamed N. Moustafa, and Hani Mahdi. "Deep convolutional neural networks for face and iris presentation attack detection: survey and case study." IET Biometrics 9, no. 5 (2020): 179–93. http://dx.doi.org/10.1049/iet-bmt.2020.0004.
Pełny tekst źródłaGaldi, Chiara, Valeria Chiesa, Christoph Busch, Paulo Lobato Correia, Jean-Luc Dugelay, and Christine Guillemot. "Light Fields for Face Analysis." Sensors 19, no. 12 (2019): 2687. http://dx.doi.org/10.3390/s19122687.
Pełny tekst źródłaPeng, Fei, Le Qin, and Min Long. "Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning." Journal of Visual Communication and Image Representation 66 (January 2020): 102746. http://dx.doi.org/10.1016/j.jvcir.2019.102746.
Pełny tekst źródłaShen, Meng, Yaqian Wei, Zelin Liao, and Liehuang Zhu. "IriTrack." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 2 (2021): 1–21. http://dx.doi.org/10.1145/3463515.
Pełny tekst źródłaHassani, Ali, Jon Diedrich, and Hafiz Malik. "Monocular Facial Presentation–Attack–Detection: Classifying Near-Infrared Reflectance Patterns." Applied Sciences 13, no. 3 (2023): 1987. http://dx.doi.org/10.3390/app13031987.
Pełny tekst źródłaB R, Rohini, Dr Yogish H K, and Dr Deepa Y. "DEEP LEARNING BASED CHALLENGE RESPONSE LIVELINESS MATCHING FOR PRESENTATION ATTACK DETECTION IN FACE RECOGNITION BIOMETRIC AUTHENTICATION SYSTEMS." Indian Journal of Computer Science and Engineering 13, no. 3 (2022): 709–20. http://dx.doi.org/10.21817/indjcse/2022/v13i3/221303063.
Pełny tekst źródłaFavorskaya, Margarita N., and Andrey I. Pakhirka. "Building depth maps for detection of presentation attacks in face recognition systems." Информационные и математические технологии в науке и управлении, no. 3 (2022): 40–48. http://dx.doi.org/10.38028/esi.2022.27.3.005.
Pełny tekst źródła