The role of muscle synergies in myoelectric control: trends and challenges for simultaneous multifunction control

M Ison, P Artemiadis - Journal of neural engineering, 2014 - iopscience.iop.org
Myoelectric control is filled with potential to significantly change human–robot interaction
due to the ability to non-invasively measure human motion intent. However, current control …

Spoofing face recognition with 3D masks

N Erdogmus, S Marcel - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Spoofing is the act of masquerading as a valid user by falsifying data to gain an illegitimate
access. Vulnerability of recognition systems to spoofing attacks (presentation attacks) is still …

Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect

N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …

Audio-visual biometric recognition and presentation attack detection: A comprehensive survey

H Mandalapu, AR PN, R Ramachandra, KS Rao… - IEEE …, 2021 - ieeexplore.ieee.org
Biometric recognition is a trending technology that uses unique characteristics data to
identify or verify/authenticate security applications. Amidst the classically used biometrics …

Are GAN-based morphs threatening face recognition?

E Sarkar, P Korshunov, L Colbois… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …

Face recognition systems under spoofing attacks

I Chingovska, N Erdogmus, A Anjos… - Face Recognition Across …, 2016 - Springer
In this chapter, we give an overview of spoofing attacks and spoofing countermeasures for
face recognition systems, with a focus on visual spectrum systems (VIS) in 2D and 3D, as …

Biometrics evaluation under spoofing attacks

I Chingovska, AR Dos Anjos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
While more accurate and reliable than ever, the trustworthiness of biometric verification
systems is compromised by the emergence of spoofing attacks. Responding to this threat …

Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks

E Sarkar, P Korshunov, L Colbois, S Marcel - arxiv preprint arxiv …, 2020 - arxiv.org
Morphing attacks is a threat to biometric systems where the biometric reference in an identity
document can be altered. This form of attack presents an important issue in applications …

Continuously reproducing toolchains in pattern recognition and machine learning experiments

A Anjos, M Günther, T de Freitas Pereira, P Korshunov… - 2017 - openreview.net
Pattern recognition and machine learning research work often contains experimental results
on real-world data, which corroborates hypotheses and provides a canvas for the …

Deeply vulnerable: a study of the robustness of face recognition to presentation attacks

A Mohammadi, S Bhattacharjee, S Marcel - Iet Biometrics, 2018 - Wiley Online Library
The vulnerability of deep‐learning‐based face‐recognition (FR) methods, to presentation
attacks (PA), is studied in this study. Recently, proposed FR methods based on deep neural …