Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Presentation attack detection methods for face recognition systems: A comprehensive survey
R Ramachandra, C Busch - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …
attacks or spoof attacks) has received a great deal of interest from the biometric community …
A survey on methods and challenges in EEG based authentication
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
Single-side domain generalization for face anti-spoofing
Existing domain generalization methods for face anti-spoofing endeavor to extract common
differentiation features to improve the generalization. However, due to large distribution …
differentiation features to improve the generalization. However, due to large distribution …
Biometric face presentation attack detection with multi-channel convolutional neural network
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network
Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-
physical system (CPS) provides a new era for industries especially in the healthcare sector …
physical system (CPS) provides a new era for industries especially in the healthcare sector …
Secure face unlock: Spoof detection on smartphones
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …
to mobile device unlocking, security against the face spoofing attacks requires increased …
Face spoof detection with image distortion analysis
Automatic face recognition is now widely used in applications ranging from deduplication of
identity to authentication of mobile payment. This popularity of face recognition has raised …
identity to authentication of mobile payment. This popularity of face recognition has raised …
Deep pixel-wise binary supervision for face presentation attack detection
Face recognition has evolved as a prominent biometric authentication modality. However,
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …
Deep representations for iris, face, and fingerprint spoofing detection
Biometrics systems have significantly improved person identification and authentication,
playing an important role in personal, national, and global security. However, these systems …
playing an important role in personal, national, and global security. However, these systems …