Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Mitigating dataset harms requires stewardship: Lessons from 1000 papers
Machine learning datasets have elicited concerns about privacy, bias, and unethical
applications, leading to the retraction of prominent datasets such as DukeMTMC, MS-Celeb …
applications, leading to the retraction of prominent datasets such as DukeMTMC, MS-Celeb …
A new benchmark on american sign language recognition using convolutional neural network
The listening or hearing impaired (deaf/dumb) people use a set of signs, called sign
language instead of speech for communication among them. However, it is very challenging …
language instead of speech for communication among them. However, it is very challenging …
A fast and accurate system for face detection, identification, and verification
The availability of large annotated datasets and affordable computation power have led to
impressive improvements in the performance of convolutional neural networks (CNNs) on …
impressive improvements in the performance of convolutional neural networks (CNNs) on …
Pass: protected attribute suppression system for mitigating bias in face recognition
Face recognition networks encode information about sensitive attributes while being trained
for identity classification. Such encoding has two major issues:(a) it makes the face …
for identity classification. Such encoding has two major issues:(a) it makes the face …
Disguised faces in the wild
Existing research in the field of face recognition with variations due to disguises focuses
primarily on images captured in controlled settings. Limited research has been performed on …
primarily on images captured in controlled settings. Limited research has been performed on …
An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning
Face recognition is diversely used in modern biometric and security applications. Most of the
current face recognition techniques show good results in a constrained environment …
current face recognition techniques show good results in a constrained environment …
Recognizing disguised faces in the wild
Research in face recognition has seen tremendous growth over the past couple of decades.
Beginning from algorithms capable of performing recognition in constrained environments …
Beginning from algorithms capable of performing recognition in constrained environments …
How are attributes expressed in face DCNNs?
As deep networks become increasingly accurate at recognizing faces, it is vital to
understand how these networks process faces. While these networks are solely trained to …
understand how these networks process faces. While these networks are solely trained to …
Adversarial defenses for object detectors based on gabor convolutional layers
Despite their many advantages and positive features, the deep neural networks are
extremely vulnerable against adversarial attacks. This drawback has substantially reduced …
extremely vulnerable against adversarial attacks. This drawback has substantially reduced …
Masked face recognition with identification association
Q Hong, Z Wang, Z He, N Wang… - 2020 IEEE 32nd …, 2020 - ieeexplore.ieee.org
In the crime scene, criminals often consciously conceal their facial identity through face-
masked disguise, which poses a huge challenge to identity recognition. Existing disguised …
masked disguise, which poses a huge challenge to identity recognition. Existing disguised …