Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things

J Zhang, D Tao - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, billions of sensors and devices collect and process data
from the environment, transmit them to cloud centers, and receive feedback via the Internet …

Trustworthy AI: From principles to practices

B Li, P Qi, B Liu, S Di, J Liu, J Pei, J Yi… - ACM Computing Surveys, 2023 - dl.acm.org
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …

Deep learning for face anti-spoofing: A survey

Z Yu, Y Qin, X Li, C Zhao, Z Lei… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …

Deep face recognition: A survey

M Wang, W Deng - Neurocomputing, 2021 - Elsevier
Deep learning applies multiple processing layers to learn representations of data with
multiple levels of feature extraction. This emerging technique has reshaped the research …

Face recognition: Past, present and future (a review)

M Taskiran, N Kahraman, CE Erdem - Digital Signal Processing, 2020 - Elsevier
Biometric systems have the goal of measuring and analyzing the unique physical or
behavioral characteristics of an individual. The main feature of biometric systems is the use …

Biometric face presentation attack detection with multi-channel convolutional neural network

A George, Z Mostaani, D Geissenbuhler… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …

Deep pixel-wise binary supervision for face presentation attack detection

A George, S Marcel - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Face recognition has evolved as a prominent biometric authentication modality. However,
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …

A comprehensive overview of biometric fusion

M Singh, R Singh, A Ross - Information Fusion, 2019 - Elsevier
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …

Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Recent advancements in finger vein recognition technology: methodology, challenges and opportunities

K Shaheed, A Mao, I Qureshi, M Kumar, S Hussain… - Information …, 2022 - Elsevier
Finger vein recognition biometric trait is a significant biometric modality that is considered
more secure, reliable, and emerging. This article presents a review to focus on the recent …