暂无分享,去创建一个
Pong C. Yuen | Anil K. Jain | Kai Cao | Guangcan Mai | P. Yuen | Kai Cao | Guangcan Mai
[1] Oscar Déniz-Suárez,et al. Face recognition using Histograms of Oriented Gradients , 2011, Pattern Recognit. Lett..
[2] Anil K. Jain,et al. Clustering Millions of Faces by Identity , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[4] Jian Sun,et al. Blessing of Dimensionality: High-Dimensional Feature and Its Efficient Compression for Face Verification , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[5] Pong C. Yuen,et al. Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..
[6] Sébastien Marcel,et al. Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments , 2017, ICML 2017.
[7] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[8] Anil K. Jain,et al. Face Search at Scale , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Pong C. Yuen,et al. Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection , 2016, Pattern Recognit..
[10] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[11] Honglak Lee,et al. Attribute2Image: Conditional Image Generation from Visual Attributes , 2015, ECCV.
[12] Mário Marques Fernandes,et al. ADVANCES IN FACE DETECTION AND FACIAL IMAGE ANALYSIS , 2018 .
[13] Honglak Lee,et al. Learning to Align from Scratch , 2012, NIPS.
[14] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[15] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[16] Antonio Torralba,et al. Visualizing Object Detection Features , 2015, International Journal of Computer Vision.
[17] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Zheng Zhang,et al. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.
[19] Sébastien Marcel,et al. Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.
[20] Pong C. Yuen,et al. Binary feature fusion for discriminative and secure multi-biometric cryptosystems , 2017, Image Vis. Comput..
[21] Jian-Huang Lai,et al. Face representation using independent component analysis , 2002, Pattern Recognit..
[22] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[23] Gang Hua,et al. Labeled Faces in the Wild: A Survey , 2016 .
[24] Mahadev Satyanarayanan,et al. OpenFace: A general-purpose face recognition library with mobile applications , 2016 .
[25] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[26] Graham W. Taylor,et al. Deconvolutional networks , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[27] Pong C. Yuen,et al. Fusing binary templates for multi-biometric cryptosystems , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[28] Xiaogang Wang,et al. Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.
[29] N. Dokuchaev. Probability Theory: A Complete One-Semester Course , 2015 .
[30] Roger M. Cooke,et al. Generating "dependent" quasi-random numbers , 2000, 2000 Winter Simulation Conference Proceedings (Cat. No.00CH37165).
[31] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[32] Shengcai Liao,et al. A benchmark study of large-scale unconstrained face recognition , 2014, IEEE International Joint Conference on Biometrics.
[33] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[34] Alex Pentland,et al. Beyond eigenfaces: probabilistic matching for face recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.
[35] Julian Fiérrez,et al. Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[36] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[37] Shengcai Liao,et al. Learning Face Representation from Scratch , 2014, ArXiv.
[38] Fabio Roli,et al. Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective , 2015, IEEE Signal Processing Magazine.
[39] Frédéric Jurie,et al. Reconstructing faces from their signatures using RBF regression , 2013, BMVC.
[40] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[41] Sudeep Sarkar,et al. From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[43] Anil K. Jain,et al. Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[44] Guillermo Sapiro,et al. Online dictionary learning for sparse coding , 2009, ICML '09.
[45] Shane G. Henderson,et al. Behavior of the NORTA method for correlated random vector generation as the dimension increases , 2003, TOMC.
[46] Zhenan Sun,et al. A Lightened CNN for Deep Face Representation , 2015, ArXiv.
[47] Graham W. Taylor,et al. Adaptive deconvolutional networks for mid and high level feature learning , 2011, 2011 International Conference on Computer Vision.
[48] Frédéric Jurie,et al. Face Recognition using Local Quantized Patterns , 2012, BMVC.
[49] Anil K. Jain,et al. Secure Face Unlock: Spoof Detection on Smartphones , 2016, IEEE Transactions on Information Forensics and Security.
[50] Xiaogang Wang,et al. Deeply learned face representations are sparse, selective, and robust , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Anil K. Jain,et al. Pushing the frontiers of unconstrained face detection and recognition: IARPA Janus Benchmark A , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[52] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[53] Ole Winther,et al. Autoencoding beyond pixels using a learned similarity metric , 2015, ICML.
[54] Guoying Zhao,et al. 3D Mask Face Anti-spoofing with Remote Photoplethysmography , 2016, ECCV.
[55] V. Kshirsagar,et al. Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.
[56] Tal Hassner,et al. Face recognition in unconstrained videos with matched background similarity , 2011, CVPR 2011.