Results 141 to 150 of about 10,620 (187)
Utterance-Style-Dependent Speaker Verification Using Emotional Embedding with Pretrained Models. [PDF]
Pham Hoang L +4 more
europepmc +1 more source
Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture. [PDF]
Ahmed W +3 more
europepmc +1 more source
CTDNN-Spoof: compact tiny deep learning architecture for detection and multi-label classification of GPS spoofing attacks in small UAVs. [PDF]
Almadhor A +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Detection of Spoofing Medium Contours for Face Anti-Spoofing
IEEE Transactions on Circuits and Systems for Video Technology, 2021Face anti-spoofing is an important step for secure face recognition. In this paper, we target on building a general classifier to detect the face images with spoofing medium contours (termed as SMCs for simplicity). To this end, we consider the task of face anti-spoofing as the detection of SMCs from the image.
Xun Zhu, Sheng Li, Xinpeng Zhang
exaly +2 more sources
Face spoofing detection with local binary pattern network
Journal of Visual Communication and Image Representation, 2018Abstract Nowadays, face biometric based access control systems are becoming ubiquitous in our daily life while they are still vulnerable to spoofing attacks. So developing robust and reliable methods to prevent such frauds is unavoidable. As deep learning techniques have achieved satisfactory performances in computer vision, they have also been ...
Lei Li, Xiaoyi Feng, Zhaoqiang Xia
exaly +2 more sources
Face Spoofing Detection Using Colour Texture Analysis
IEEE Transactions on Information Forensics and Security, 2016Research on non-intrusive software-based face spoofing detection schemes has been mainly focused on the analysis of the luminance information of the face images, hence discarding the chroma component, which can be very useful for discriminating fake faces from genuine ones.
Zinelabidine Boulkenafet +2 more
exaly +2 more sources
Texture and quality analysis for face spoofing detection
Computers & Electrical Engineering, 2021Abstract Due to the increasing importance of security and access restrictions, the urge for implementing face recognition systems is increasing at an unprecedented rate. However, the vulnerability towards spoofing attacks limits the further progress of face recognition systems.
Neenu Daniel, A. Anitha
openaire +1 more source
Face Spoofing Detection Using DenseNet
2021Today, face recognition is the most widely used biometric recognition technology. However, face recognition is a biometric method that is vulnerable to spoofing. Types of spoofing attack include print, replay, and 3D mask. Methods based on hand-crafted features such as local binary patterns which use high-frequency features of images, are therefore ...
Su-Gyeong Yu +3 more
openaire +1 more source

