Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of empirical evidence on different uncanny valley hypotheses: support for perceptual mismatch as one road to the valley of eeriness
The uncanny valley hypothesis, proposed already in the 1970s, suggests that almost but not
fully humanlike artificial characters will trigger a profound sense of unease. This hypothesis …
fully humanlike artificial characters will trigger a profound sense of unease. This hypothesis …
Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Seine: Short-to-long video diffusion model for generative transition and prediction
Recently video generation has achieved substantial progress with realistic results.
Nevertheless, existing AI-generated videos are usually very short clips (" shot-level'') …
Nevertheless, existing AI-generated videos are usually very short clips (" shot-level'') …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
Image2stylegan: How to embed images into the stylegan latent space?
We propose an efficient algorithm to embed a given image into the latent space of StyleGAN.
This embedding enables semantic image editing operations that can be applied to existing …
This embedding enables semantic image editing operations that can be applied to existing …
Diffmorpher: Unleashing the capability of diffusion models for image morphing
Diffusion models have achieved remarkable image generation quality surpassing previous
generative models. However a notable limitation of diffusion models in comparison to GANs …
generative models. However a notable limitation of diffusion models in comparison to GANs …
Face recognition systems under morphing attacks: A survey
U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
Two uncanny valleys: Re-evaluating the uncanny valley across the full spectrum of real-world human-like robots
The uncanny valley hypothesis describes how increased human-likeness of artificial entities,
ironically, could elicit a surge of negative reactions from people. Much research has studied …
ironically, could elicit a surge of negative reactions from people. Much research has studied …
Enhancing security and privacy in biometrics-based authentication systems
NK Ratha, JH Connell, RM Bolle - IBM systems Journal, 2001 - ieeexplore.ieee.org
Because biometrics-based authentication offers several advantages over other
authentication methods, there has been a significant surge in the use of biometrics for user …
authentication methods, there has been a significant surge in the use of biometrics for user …
Mechanisms of face perception
DY Tsao, MS Livingstone - Annu. Rev. Neurosci., 2008 - annualreviews.org
Faces are among the most informative stimuli we ever perceive: Even a split-second glimpse
of a person's face tells us his identity, sex, mood, age, race, and direction of attention. The …
of a person's face tells us his identity, sex, mood, age, race, and direction of attention. The …