Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Myocardial infarction detection based on deep neural network on imbalanced data
Myocardial infarction (MI) is an acute interruption of blood flow to the heart, which causes the
heart to suffer from a deficiency of blood and ischemia, so the heart muscle is damaged, and …
heart to suffer from a deficiency of blood and ischemia, so the heart muscle is damaged, and …
A comprehensive review of face morph generation and detection of fraudulent identities
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …
authorized control access to lawful resources. Due to the availability of modern image …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Contactless technologies for smart cities: big data, IoT, and cloud infrastructures
Intelligent systems are enhancing city environments and improving their overall performance
in all possible aspects. Innovations in the field of information and communication …
in all possible aspects. Innovations in the field of information and communication …
Adversarial attacks against face recognition: A comprehensive study
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …
suggesting suitability for real-world applications ranging from photo tagging in social media …
Face de-morphing based on diffusion autoencoders
M Long, Q Yao, LB Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face morphing attacks pose a significant threat to society as they disrupt the one-to-one
map** between facial images and identity features in face recognition systems. Despite …
map** between facial images and identity features in face recognition systems. Despite …
Face morphing attack detection and localization based on feature-wise supervision
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …
countermeasures were proposed. However, in the existing face morphing attack detection …
AI-based vehicular network toward 6G and IoT: Deep learning approaches
MY Chen, MH Fan, LX Huang - ACM Transactions on Management …, 2021 - dl.acm.org
In recent years, vehicular networks have become increasingly large, heterogeneous, and
dynamic, making it difficult to meet strict requirements of ultralow latency, high reliability …
dynamic, making it difficult to meet strict requirements of ultralow latency, high reliability …
Face recognition for automatic border control: a systematic literature review
Context: Facial recognition is one aspect of research that still has broad potential for
research and development, especially as a security system for automatic border control …
research and development, especially as a security system for automatic border control …