Results 11 to 20 of about 4,892 (195)

Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [PDF]

open access: yesCoRR, 2019
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods formulate face anti-spoofing as a supervised learning problem to detect various predefined presentation attacks, which need large scale training data to ...
Fu, Tianyu   +8 more
core   +3 more sources

Meta-Teacher For Face Anti-Spoofing [PDF]

open access: yesIEEE Transactions on Pattern Analysis and Machine Intelligence, 2022
Accepted by IEEE TPAMI ...
Yunxiao Qin   +5 more
openaire   +4 more sources

Performance analysis of repeater spoofing suppression based on GNSS multi-beam receiver

open access: yesFrontiers in Physics, 2022
In order to analyze the anti-spoofing performance of the Global Navigation Satellite System (GNSS) multi-beam anti-jamming receiver in the presence of direct repeater spoofing, this paper deduces the theoretical formulas of the output real signal and the
Binbin Ren   +5 more
doaj   +1 more source

Speaker-Aware Anti-spoofing

open access: yesINTERSPEECH 2023, 2023
We address speaker-aware anti-spoofing, where prior knowledge of the target speaker is incorporated into a voice spoofing countermeasure (CM). In contrast to the frequently used speaker-independent solutions, we train the CM in a speaker-conditioned way.
Xuechen Liu   +3 more
openaire   +2 more sources

End-to-End anti-spoofing with RawNet2 [PDF]

open access: yesICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021
Accepted to ICASSP ...
Hemlata Tak   +5 more
openaire   +2 more sources

Out of Domain Face Anti-spoofing: A Survey [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
Face anti-spoofing (FAS), as an important means to protect face recognition models, can ensure that the system remains secure and reliable in the face of various presentation attacks.
SHI Yichen, FENG Jun, XIAO Lixuan, HE Jingjing, HU Jingjing
doaj   +1 more source

Graph Attention Networks for Anti-Spoofing [PDF]

open access: yesInterspeech 2021, 2021
Submitted to INTERSPEECH ...
Hemlata Tak   +4 more
openaire   +2 more sources

Hyperbolic Face Anti-Spoofing

open access: yesCoRR, 2023
Learning generalized face anti-spoofing (FAS) models against presentation attacks is essential for the security of face recognition systems. Previous FAS methods usually encourage models to extract discriminative features, of which the distances within the same class (bonafide or attack) are pushed close while those between bonafide and attack are ...
Shuangpeng Han   +5 more
openaire   +2 more sources

Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers

open access: yesInternational Journal of Electronics and Communications System, 2022
Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing ...
Khairan Marzuki   +2 more
doaj   +1 more source

Cross‐ethnicity face anti‐spoofing recognition challenge: A review

open access: yesIET Biometrics, 2021
Face anti‐spoofing is critical to prevent face recognition systems from a security breach. The biometrics community has achieved impressive progress recently due to the excellent performance of deep neural networks and the availability of large datasets.
Ajian Liu   +15 more
doaj   +1 more source

Home - About - Disclaimer - Privacy