暂无分享,去创建一个
Anna Hilsmann | Peter Eisert | Wojciech Samek | Clemens Seibold | W. Samek | P. Eisert | Clemens Seibold | A. Hilsmann
[1] Josephine Sullivan,et al. One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Kiran B. Raja,et al. Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[3] Anna Hilsmann,et al. Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.
[4] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[5] Jana Dittmann,et al. Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.
[6] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[7] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[8] Ahmad-Reza Sadeghi,et al. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , 2017, AsiaCCS.
[9] Nina Narodytska,et al. Simple Black-Box Adversarial Attacks on Deep Neural Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[10] Tom Neubert,et al. Face Morphing Detection: An Approach Based on Image Degradation Analysis , 2017, IWDW.
[11] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[12] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[13] Mislav Grgic,et al. SCface – surveillance cameras face database , 2011, Multimedia Tools and Applications.
[14] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[15] Davide Maltoni,et al. Face Demorphing , 2018, IEEE Transactions on Information Forensics and Security.
[16] Shinichi Nakajima,et al. Counterstrike: Defending Deep Learning Architectures Against Adversarial Samples by Langevin Dynamics with Supervised Denoising Autoencoder , 2018, ArXiv.
[17] Alexander Binder,et al. The LRP Toolbox for Artificial Neural Networks , 2016, J. Mach. Learn. Res..
[18] Hung Dang,et al. Evading Classifiers by Morphing in the Dark , 2017, CCS.
[19] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Davide Maltoni,et al. The magic passport , 2014, IEEE International Joint Conference on Biometrics.
[21] Adam Schmidt,et al. The put face database , 2008 .
[22] Lijun Yin,et al. A high-resolution 3D dynamic facial expression database , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.
[23] Joshua Correll,et al. The Chicago face database: A free stimulus set of faces and norming data , 2015, Behavior research methods.
[24] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[25] Shinichi Nakajima,et al. Robustifying models against adversarial attacks by Langevin dynamics , 2018, Neural Networks.
[26] Kiran B. Raja,et al. Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[27] C. Thomaz,et al. A new ranking method for principal components analysis and its application to face image analysis , 2010, Image Vis. Comput..
[28] Thaddeus Beier,et al. Feature-based image metamorphosis , 1998 .
[29] Klaus-Robert Müller,et al. Explainable Artificial Intelligence: Understanding, Visualizing and Interpreting Deep Learning Models , 2017, ArXiv.
[30] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..