Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Myocardial infarction detection based on deep neural network on imbalanced data

M Hammad, MH Alkinani, BB Gupta, AA Abd El-Latif - Multimedia Systems, 2022 - Springer
Myocardial infarction (MI) is an acute interruption of blood flow to the heart, which causes the
heart to suffer from a deficiency of blood and ischemia, so the heart muscle is damaged, and …

A comprehensive review of face morph generation and detection of fraudulent identities

M Hamza, S Tehsin, M Humayun, MF Almufareh… - Applied Sciences, 2022 - mdpi.com
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Contactless technologies for smart cities: big data, IoT, and cloud infrastructures

A Manimuthu, V Dharshini, I Zografopoulos… - SN computer …, 2021 - Springer
Intelligent systems are enhancing city environments and improving their overall performance
in all possible aspects. Innovations in the field of information and communication …

Adversarial attacks against face recognition: A comprehensive study

F Vakhshiteh, A Nickabadi, R Ramachandra - IEEE Access, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …

Face de-morphing based on diffusion autoencoders

M Long, Q Yao, LB Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face morphing attacks pose a significant threat to society as they disrupt the one-to-one
map** between facial images and identity features in face recognition systems. Despite …

Face morphing attack detection and localization based on feature-wise supervision

L Qin, F Peng, M Long - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …

AI-based vehicular network toward 6G and IoT: Deep learning approaches

MY Chen, MH Fan, LX Huang - ACM Transactions on Management …, 2021 - dl.acm.org
In recent years, vehicular networks have become increasingly large, heterogeneous, and
dynamic, making it difficult to meet strict requirements of ultralow latency, high reliability …

Face recognition for automatic border control: a systematic literature review

F Hidayat, U Elviani, GB Situmorang… - IEEE …, 2024 - ieeexplore.ieee.org
Context: Facial recognition is one aspect of research that still has broad potential for
research and development, especially as a security system for automatic border control …