Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Client-specific anomaly detection for face presentation attack detection
Fatemifar, Soroush, Arashloo, Shervin Rahimzadeh, Awais, Muhammad, Kittler, Josef
Published in Pattern recognition (01.04.2021)
Published in Pattern recognition (01.04.2021)
Get full text
Journal Article
Presentation Attack Detection for Face Recognition Using Light Field Camera
Raghavendra, R., Raja, Kiran B., Busch, Christoph
Published in IEEE transactions on image processing (01.03.2015)
Published in IEEE transactions on image processing (01.03.2015)
Get full text
Journal Article
Zero-day attack detection: a systematic literature review
Ahmad, Rasheed, Alsmadi, Izzat, Alhamdani, Wasim, Tawalbeh, Lo’ai
Published in The Artificial intelligence review (01.10.2023)
Published in The Artificial intelligence review (01.10.2023)
Get full text
Journal Article
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Raja, Kiran, Ferrara, Matteo, Franco, Annalisa, Spreeuwers, Luuk, Batskos, Ilias, de Wit, Florens, Gomez-Barrero, Marta, Scherhag, Ulrich, Fischer, Daniel, Venkatesh, Sushma Krupa, Singh, Jag Mohan, Li, Guoqiang, Bergeron, Loic, Isadskiy, Sergey, Ramachandra, Raghavendra, Rathgeb, Christian, Frings, Dinusha, Seidel, Uwe, Knopjes, Fons, Veldhuis, Raymond, Maltoni, Davide, Busch, Christoph
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection
Liu, Ajian, Zhao, Chenxu, Yu, Zitong, Wan, Jun, Su, Anyang, Liu, Xing, Tan, Zichang, Escalera, Sergio, Xing, Junliang, Liang, Yanyan, Guo, Guodong, Lei, Zhen, Li, Stan Z., Zhang, Du
Published in IEEE transactions on information forensics and security (2022)
Published in IEEE transactions on information forensics and security (2022)
Get full text
Journal Article
Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning
Wang, Guoqing, Han, Hu, Shan, Shiguang, Chen, Xilin
Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (01.06.2020)
Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (01.06.2020)
Get full text
Conference Proceeding
Resource-Efficient and Resilient SOC/SOH Co-Monitoring of EV Batteries With Attack Detection
Xiao, Shunyuan, Ding, Lei, Ye, Maojiao, Yue, Dong, Ge, Hui
Published in IEEE transactions on smart grid (01.05.2025)
Published in IEEE transactions on smart grid (01.05.2025)
Get full text
Journal Article
Real masks and spoof faces: On the masked face presentation attack detection
Fang, Meiling, Damer, Naser, Kirchbuchner, Florian, Kuijper, Arjan
Published in Pattern recognition (01.03.2022)
Published in Pattern recognition (01.03.2022)
Get full text
Journal Article
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information
Fang, Zhaoyuan, Czajka, Adam, Bowyer, Kevin W.
Published in IEEE transactions on information forensics and security (01.01.2021)
Published in IEEE transactions on information forensics and security (01.01.2021)
Get full text
Journal Article
Encryption-Based Attack Detection Scheme for Multisensor Secure Fusion Estimation
Li, Tongxiang, Weng, Pindi, Chen, Bo, Zhang, Dongping, Yu, Li
Published in IEEE transactions on aerospace and electronic systems (01.10.2024)
Published in IEEE transactions on aerospace and electronic systems (01.10.2024)
Get full text
Journal Article
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
Hanif, Maria, Ashraf, Humaira, Jalil, Zakia, Jhanjhi, Noor Zaman, Humayun, Mamoona, Saeed, Saqib, Almuhaideb, Abdullah M.
Published in Electronics (Basel) (01.08.2022)
Published in Electronics (Basel) (01.08.2022)
Get full text
Journal Article
Towards generalized morphing attack detection by learning residuals
Raja, Kiran, Gupta, Gourav, Venkatesh, Sushma, Ramachandra, Raghavendra, Busch, Christoph
Published in Image and vision computing (01.10.2022)
Published in Image and vision computing (01.10.2022)
Get full text
Journal Article
Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
Ding, Derui, Han, Qing-Long, Wang, Zidong, Ge, Xiaohua
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2021)
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2021)
Get full text
Journal Article