Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Presentation attack detection methods for face recognition systems: A comprehensive survey
The vulnerability of face recognition systems to presentation attacks (also known as direct
attacks or spoof attacks) has received a great deal of interest from the biometric community …
attacks or spoof attacks) has received a great deal of interest from the biometric community …
A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices
The widespread deployment of facial recognition-based biometric systems has made facial
presentation attack detection (face anti-spoofing) an increasingly critical issue. This survey …
presentation attack detection (face anti-spoofing) an increasingly critical issue. This survey …
Deep learning for face anti-spoofing: A survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …
securing face recognition systems from presentation attacks (PAs). As more and more …
Secure face unlock: Spoof detection on smartphones
With the wide deployment of the face recognition systems in applications from deduplication
to mobile device unlocking, security against the face spoofing attacks requires increased …
to mobile device unlocking, security against the face spoofing attacks requires increased …
Learning and the unknown: Surveying steps toward open world recognition
As science attempts to close the gap between man and machine by building systems
capable of learning, we must embrace the importance of the unknown. The ability to …
capable of learning, we must embrace the importance of the unknown. The ability to …
Face spoofing detection through visual codebooks of spectral temporal cubes
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks
is still an open problem. Spoof attacks occur when impostor users present synthetic …
is still an open problem. Spoof attacks occur when impostor users present synthetic …
A competition on generalized software-based face presentation attack detection in mobile scenarios
In recent years, software-based face presentation attack detection (PAD) methods have
seen a great progress. However, most existing schemes are not able to generalize well in …
seen a great progress. However, most existing schemes are not able to generalize well in …
Detecting silicone mask-based presentation attack via deep dictionary learning
In movies, film stars portray another identity or obfuscate their identity with the help of
silicone/latex masks. Such realistic masks are now easily available and are used for …
silicone/latex masks. Such realistic masks are now easily available and are used for …
FaceBagNet: Bag-of-local-features model for multi-modal face anti-spoofing
T Shen, Y Huang, Z Tong - … of the IEEE/CVF conference on …, 2019 - openaccess.thecvf.com
Face anti-spoofing detection is a crucial procedure in biometric face recognition systems.
State-of-the-art approaches, based on Convolutional Neural Networks (CNNs), present …
State-of-the-art approaches, based on Convolutional Neural Networks (CNNs), present …
Client-specific anomaly detection for face presentation attack detection
One-class anomaly detection approaches are particularly appealing for use in face
presentation attack detection (PAD), especially in an unseen attack scenario, where the …
presentation attack detection (PAD), especially in an unseen attack scenario, where the …