A Stacking Ensemble for Anomaly Based Client-Specific Face Spoofing Detection
暂无分享,去创建一个
[1] Muhammad Awais,et al. Spoofing Attack Detection by Anomaly Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[2] Vitomir Struc,et al. Photometric Normalization Techniques for Illumination Invariance , 2011 .
[3] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[4] Josef Kittler,et al. Combining Multiple one-class Classifiers for Anomaly based Face Spoofing Attack Detection , 2019, 2019 International Conference on Biometrics (ICB).
[5] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Sébastien Marcel,et al. The Replay-Mobile Face Presentation-Attack Database , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).
[7] Sébastien Marcel,et al. On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing , 2018, 2018 International Conference on Biometrics (ICB).
[8] David Windridge,et al. Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.
[9] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[10] Daniela M. Witten,et al. An Introduction to Statistical Learning: with Applications in R , 2013 .
[11] David H. Wolpert,et al. Stacked generalization , 1992, Neural Networks.
[12] Yaowu Chen,et al. Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection , 2020, IEEE Transactions on Information Forensics and Security.
[13] Aleksandr Parkin,et al. Recognizing Multi-Modal Face Spoofing With Face Recognition Networks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[14] Ivana Chingovska,et al. Trustworthy Biometric Verication under Spoong Attacks: Application to the Face Mode , 2015 .
[15] Sébastien Marcel,et al. Pulse-based Features for Face Presentation Attack Detection , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[16] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[17] Josef Kittler,et al. Novel Fusion Methods for Pattern Recognition , 2011, ECML/PKDD.
[18] Anil K. Jain,et al. Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier , 2019, 2019 International Conference on Biometrics (ICB).
[19] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[20] Chandan Srivastava,et al. Support Vector Data Description , 2011 .
[21] William J. Christmas,et al. An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[22] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[23] Ramachandra Raghavendra,et al. Presentation Attack Detection Methods for Face Recognition Systems , 2017, ACM Comput. Surv..
[24] Xu Zhao,et al. Discriminative Representation Combinations for Accurate Face Spoofing Detection , 2018, Pattern Recognit..
[25] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).