Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Presentation attack detection methods for face recognition systems: A comprehensive survey
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …
attacks or spoof attacks) has received a great deal of interest from the biometric community …
Attacks and defenses in user authentication systems: A survey
X Wang, Z Yan, R Zhang, P Zhang - Journal of Network and Computer …, 2021 - Elsevier
User authentication systems (in short authentication systems) have wide utilization in our
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
daily life. Unfortunately, existing authentication systems are prone to various attacks while …
Face spoofing detection using colour texture analysis
Research on non-intrusive software-based face spoofing detection schemes has been
mainly focused on the analysis of the luminance information of the face images, hence …
mainly focused on the analysis of the luminance information of the face images, hence …
Secure face unlock: Spoof detection on smartphones
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …
to mobile device unlocking, security against the face spoofing attacks requires increased …
Face spoof detection with image distortion analysis
Automatic face recognition is now widely used in applications ranging from deduplication of
identity to authentication of mobile payment. This popularity of face recognition has raised …
identity to authentication of mobile payment. This popularity of face recognition has raised …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Unsupervised domain adaptation for face anti-spoofing
Face anti-spoofing (aka presentation attack detection) has recently emerged as an active
topic with great significance for both academia and industry due to the rapidly increasing …
topic with great significance for both academia and industry due to the rapidly increasing …
A face antispoofing database with diverse attacks
Face antispoofing has now attracted intensive attention, aiming to assure the reliability of
face biometrics. We notice that currently most of face antispoofing databases focus on data …
face biometrics. We notice that currently most of face antispoofing databases focus on data …
Attention-based two-stream convolutional networks for face spoofing detection
Since the human face preserves the richest information for recognizing individuals, face
recognition has been widely investigated and achieved great success in various …
recognition has been widely investigated and achieved great success in various …