Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Face recognition: Past, present and future (a review)
Biometric systems have the goal of measuring and analyzing the unique physical or
behavioral characteristics of an individual. The main feature of biometric systems is the use …
behavioral characteristics of an individual. The main feature of biometric systems is the use …
Presentation attack detection methods for face recognition systems: A comprehensive survey
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …
attacks or spoof attacks) has received a great deal of interest from the biometric community …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
DeepFake detection for human face images and videos: A survey
Techniques for creating and manipulating multimedia information have progressed to the
point where they can now ensure a high degree of realism. DeepFake is a generative deep …
point where they can now ensure a high degree of realism. DeepFake is a generative deep …
Variational model inversion attacks
Given the ubiquity of deep neural networks, it is important that these models do not reveal
information about sensitive data that they have been trained on. In model inversion attacks …
information about sensitive data that they have been trained on. In model inversion attacks …
OULU-NPU: A mobile face presentation attack database with real-world variations
The vulnerabilities of face-based biometric systems to presentation attacks have been finally
recognized but yet we lack generalized software-based face presentation attack detection …
recognized but yet we lack generalized software-based face presentation attack detection …
Face spoofing detection using colour texture analysis
Research on non-intrusive software-based face spoofing detection schemes has been
mainly focused on the analysis of the luminance information of the face images, hence …
mainly focused on the analysis of the luminance information of the face images, hence …
Secure face unlock: Spoof detection on smartphones
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …
to mobile device unlocking, security against the face spoofing attacks requires increased …
Identification of deep network generated images using disparities in color components
With the powerful deep network architectures, such as generative adversarial networks, one
can easily generate photorealistic images. Although the generated images are not …
can easily generate photorealistic images. Although the generated images are not …
A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …