Results 11 to 20 of about 4,892 (195)
Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [PDF]
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods formulate face anti-spoofing as a supervised learning problem to detect various predefined presentation attacks, which need large scale training data to ...
Fu, Tianyu +8 more
core +3 more sources
Meta-Teacher For Face Anti-Spoofing [PDF]
Accepted by IEEE TPAMI ...
Yunxiao Qin +5 more
openaire +4 more sources
Performance analysis of repeater spoofing suppression based on GNSS multi-beam receiver
In order to analyze the anti-spoofing performance of the Global Navigation Satellite System (GNSS) multi-beam anti-jamming receiver in the presence of direct repeater spoofing, this paper deduces the theoretical formulas of the output real signal and the
Binbin Ren +5 more
doaj +1 more source
We address speaker-aware anti-spoofing, where prior knowledge of the target speaker is incorporated into a voice spoofing countermeasure (CM). In contrast to the frequently used speaker-independent solutions, we train the CM in a speaker-conditioned way.
Xuechen Liu +3 more
openaire +2 more sources
End-to-End anti-spoofing with RawNet2 [PDF]
Accepted to ICASSP ...
Hemlata Tak +5 more
openaire +2 more sources
Out of Domain Face Anti-spoofing: A Survey [PDF]
Face anti-spoofing (FAS), as an important means to protect face recognition models, can ensure that the system remains secure and reliable in the face of various presentation attacks.
SHI Yichen, FENG Jun, XIAO Lixuan, HE Jingjing, HU Jingjing
doaj +1 more source
Graph Attention Networks for Anti-Spoofing [PDF]
Submitted to INTERSPEECH ...
Hemlata Tak +4 more
openaire +2 more sources
Learning generalized face anti-spoofing (FAS) models against presentation attacks is essential for the security of face recognition systems. Previous FAS methods usually encourage models to extract discriminative features, of which the distances within the same class (bonafide or attack) are pushed close while those between bonafide and attack are ...
Shuangpeng Han +5 more
openaire +2 more sources
Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing ...
Khairan Marzuki +2 more
doaj +1 more source
Cross‐ethnicity face anti‐spoofing recognition challenge: A review
Face anti‐spoofing is critical to prevent face recognition systems from a security breach. The biometrics community has achieved impressive progress recently due to the excellent performance of deep neural networks and the availability of large datasets.
Ajian Liu +15 more
doaj +1 more source

