Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely
used to enhance security in various devices. In the past decade, significant progress has …
used to enhance security in various devices. In the past decade, significant progress has …
Detecting and mitigating adversarial perturbations for robust face recognition
Deep neural network (DNN) architecture based models have high expressive power and
learning capacity. However, they are essentially a black box method since it is not easy to …
learning capacity. However, they are essentially a black box method since it is not easy to …
[HTML][HTML] Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors
Although face recognition systems have wide application, they are vulnerable to
presentation attack samples (fake samples). Therefore, a presentation attack detection …
presentation attack samples (fake samples). Therefore, a presentation attack detection …
Discriminative representation combinations for accurate face spoofing detection
Three discriminative representations for face presentation attack detection are introduced in
this paper. Firstly we design a descriptor called spatial pyramid coding micro-texture (SPMT) …
this paper. Firstly we design a descriptor called spatial pyramid coding micro-texture (SPMT) …
An automated online proctoring system using attentive-net to assess student mischievous behavior
In recent years, the pandemic situation has forced the education system to shift from
traditional teaching to online teaching or blended learning. The ability to monitor remote …
traditional teaching to online teaching or blended learning. The ability to monitor remote …
[HTML][HTML] Optimization of CNN through novel training strategy for visual classification problems
The convolution neural network (CNN) has achieved state-of-the-art performance in many
computer vision applications eg, classification, recognition, detection, etc. However, the …
computer vision applications eg, classification, recognition, detection, etc. However, the …
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …
need for even more accurate systems to detect face spoofing attacks. In this paper, an …
Face spoofing detection using improved SegNet architecture with a blur estimation technique
Biometrics has been increasingly used as the well-known technology for the identification
and verification of a person. Among the different biometric traits, the face has been …
and verification of a person. Among the different biometric traits, the face has been …
A contemporary survey of unimodal liveness detection techniques: Challenges & opportunities
Biometric recognition is an extensive and energizing field of research but spoofing attacks,"
a deceiver pretense as an authorized user by reproducing the biometrics of the original …
a deceiver pretense as an authorized user by reproducing the biometrics of the original …
LBP and CNN feature fusion for face anti-spoofing
Face anti-spoofing has been attracting attention because of its prominent role in the security
of face recognition systems. A face spoofing attack is launched on the authentication system …
of face recognition systems. A face spoofing attack is launched on the authentication system …