Empowering things with intelligence: a survey of the progress, challenges, and opportunities in artificial intelligence of things
In the Internet-of-Things (IoT) era, billions of sensors and devices collect and process data
from the environment, transmit them to cloud centers, and receive feedback via the Internet …
from the environment, transmit them to cloud centers, and receive feedback via the Internet …
Trustworthy AI: From principles to practices
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …
of various systems based on it. However, many current AI systems are found vulnerable to …
Deep learning for face anti-spoofing: A survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …
securing face recognition systems from presentation attacks (PAs). As more and more …
Deep face recognition: A survey
Deep learning applies multiple processing layers to learn representations of data with
multiple levels of feature extraction. This emerging technique has reshaped the research …
multiple levels of feature extraction. This emerging technique has reshaped the research …
Face recognition: Past, present and future (a review)
Biometric systems have the goal of measuring and analyzing the unique physical or
behavioral characteristics of an individual. The main feature of biometric systems is the use …
behavioral characteristics of an individual. The main feature of biometric systems is the use …
Biometric face presentation attack detection with multi-channel convolutional neural network
Face recognition is a mainstream biometric authentication method. However, the
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
vulnerability to presentation attacks (aka spoofing) limits its usability in unsupervised …
Deep pixel-wise binary supervision for face presentation attack detection
Face recognition has evolved as a prominent biometric authentication modality. However,
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …
vulnerability to presentation attacks curtails its reliable deployment. Automatic detection of …
A comprehensive overview of biometric fusion
The performance of a biometric system that relies on a single biometric modality (eg,
fingerprints only) is often stymied by various factors such as poor data quality or limited …
fingerprints only) is often stymied by various factors such as poor data quality or limited …
Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Recent advancements in finger vein recognition technology: methodology, challenges and opportunities
Finger vein recognition biometric trait is a significant biometric modality that is considered
more secure, reliable, and emerging. This article presents a review to focus on the recent …
more secure, reliable, and emerging. This article presents a review to focus on the recent …