_ | spoofing | _ |
3D Face Anti- | spoofing | With Factorized Bilinear Coding |
3D Face Mask Anti- | spoofing | via Deep Fusion of Dynamic Texture and Shape Clues |
3D Facial Geometric Attributes Based Anti- | spoofing | Approach against Mask Attacks |
3D Mask Face Anti- | spoofing | Database with Real World Variations, A |
3D Mask Face Anti- | spoofing | with Remote Photoplethysmography |
A-DeepPixBis: Attentional Angular Margin for Face Anti- | spoofing | |
adaptive index smoothing loss for face anti- | spoofing | , An |
Adaptive Transformers for Robust Few-shot Cross-domain Face Anti- | spoofing | |
Adversarial Domain Generalization for Surveillance Face Anti- | spoofing | |
Adversarial examples for replay attacks against CNN-based face recognition with anti- | spoofing | capability |
Adversarial learning and decomposition-based domain generalization for face anti- | spoofing | |
Adversarial Learning Domain-Invariant Conditional Features for Robust Face Anti- | spoofing | |
AdvFAS: A robust face anti- | spoofing | framework against adversarial examples |
Anomaly Detection Against GPS | spoofing | Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration |
Anti- | spoofing | enabled face recognition based on aggregated local weighted gradient orientation |
Anti- | spoofing | in Action: Joint Operation with a Verification System |
Attack-Agnostic Deep Face Anti- | spoofing | |
Attended-auxiliary Supervision Representation for Face Anti- | spoofing | |
Bandpass Filter Based Dual-stream Network for Face Anti- | spoofing | |
BASN: Enriching Feature Representation Using Bipartite Auxiliary Supervisions for Face Anti- | spoofing | |
Biometric Counter- | spoofing | for Mobile Devices Using Gaze Information |
Biometrics Systems Under | spoofing | Attack: An evaluation methodology and lessons learned |
CASIA-SURF CeFA: A Benchmark for Multi-modal Cross-Ethnicity Face Anti- | spoofing | |
Celeba-Spoof: Large-scale Face Anti- | spoofing | Dataset with Rich Annotations |
ChaLearn Face Anti- | spoofing | |
Closer Look at Geometric Temporal Dynamics for Face Anti- | spoofing | , A |
CNN based spatio-temporal feature extraction for face anti- | spoofing | |
CNN-based anti- | spoofing | two-tier multi-factor authentication system |
Comparative Analysis of ASV | spoofing | Countermeasures: Evaluating Res2Net-Based Approaches |
Computationally Efficient Face | spoofing | Detection with Motion Magnification |
ConstDet: Control Semantics-Based Detection for GPS | spoofing | Attacks on UAVs |
Context based face | spoofing | detection using active near-infrared images |
Cosmetic Contact Lenses and Iris Recognition | spoofing | |
Covered Style Mining via Generative Adversarial Networks for Face Anti- | spoofing | |
Cross Domain Multi-modal Dataset for Robust Face Anti- | spoofing | , A |
Cross Modal Focal Loss for RGBD Face Anti- | spoofing | |
Cross-ethnicity face anti- | spoofing | recognition challenge: A review |
Curvelet-based fingerprint anti- | spoofing | |
DANet: Dynamic Attention to Spoof Patterns for Face Anti- | spoofing | |
Dataset and Benchmark for Large-Scale Multi-Modal Face Anti- | spoofing | , A |
Deep Learning for Face Anti- | spoofing | : A Survey |
Deep Spatial Gradient and Temporal Depth Learning for Face Anti- | spoofing | |
Deep Tree Learning for Zero-Shot Face Anti- | spoofing | |
Detect Visual | spoofing | in Unicode-Based Text |
Detection of AIS Closing Behavior and MMSI | spoofing | Behavior of Ships Based on Spatiotemporal Data |
Detection of | spoofing | Medium Contours for Face Anti-Spoofing |
Detection of | spoofing | Medium Contours for Face Anti-Spoofing |
Detection of Video-Based Face | spoofing | Using LBP and Multiscale DCT |
Discriminative Frequency Information Learning for End-to-End Speech Anti- | spoofing | |
Discriminative representation combinations for accurate face | spoofing | detection |
Disentangled Representation based Face Anti- | spoofing | |
Disentangled Representation with Dual-stage Feature Learning for Face Anti- | spoofing | |
Disentangling Facial Pose and Appearance Information for Face Anti- | spoofing | |
DOA Estimation under GNSS | spoofing | Attacks Using a Coprime Array: From a Sparse Reconstruction Viewpoint |
Domain Adversarial Disentanglement Network With Cross-Domain Synthesis for Generalized Face Anti- | spoofing | |
Domain Agnostic Feature Learning for Image and Video Based Face Anti- | spoofing | |
Domain Generalization via Shuffled Style Assembly for Face Anti- | spoofing | |
Domain Invariant Vision Transformer Learning for Face Anti- | spoofing | |
Domain-Generalized Face Anti- | spoofing | with Unknown Attacks |
Dual Spoof Disentanglement Generation for Face Anti- | spoofing | With Depth Uncertainty Learning |
Dual-stream correlation exploration for face anti- | spoofing | |
Dynamic Attention based Domain Generalization for Face Anti- | spoofing | |
Dynamic Feature Queue for Surveillance Face Anti- | spoofing | via Progressive Training |
Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face | spoofing | Detection |
Ear anti- | spoofing | against print attacks using three-level fusion of image quality measures |
Effective Face Anti- | spoofing | Method via Stereo Matching, An |
Efficient Transfer Learning for Robust Face | spoofing | Detection |
Evaluating the effects of image compression in Moire-pattern-based face- | spoofing | detection |
Exploring the Effectiveness of Lightweight Architectures for Face Anti- | spoofing | |
Exposing Fine-Grained Adversarial Vulnerability of Face Anti- | spoofing | Models |
Eyeblink-based Anti- | spoofing | in Face Recognition from a Generic Webcamera |
Face anti- | spoofing | based on color texture analysis |
Face Anti- | spoofing | Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern |
Face Anti- | spoofing | Based on General Image Quality Assessment |
Face anti- | spoofing | detection based on DWT-LBP-DCT features |
Face anti- | spoofing | detection based on multi-scale image quality assessment |
Face anti- | spoofing | using feature distilling and global attention learning |
Face Anti- | spoofing | Using Spatial Pyramid Pooling |
Face anti- | spoofing | via deep local binary patterns |
Face Anti- | spoofing | via Disentangled Representation Learning |
Face Anti- | spoofing | with Human Material Perception |
Face Anti- | spoofing | with Multi-Scale Information |
Face anti- | spoofing | with multifeature videolet aggregation |
Face Anti- | spoofing | : Model Matters, so Does Data |
Face Biometrics Under | spoofing | Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions |
Face De- | spoofing | : Anti-spoofing via Noise Modeling |
Face De- | spoofing | : Anti-spoofing via Noise Modeling |
Face liveness detection for combating the | spoofing | attack in face recognition |
Face recognition under | spoofing | attacks: countermeasures and research directions |
Face | spoofing | detection based on 3D lighting environment analysis of image pair |
Face | spoofing | detection based on color texture Markov feature and support vector machine recursive feature elimination |
Face | spoofing | detection based on colour distortions |
Face | spoofing | detection by fusing binocular depth and spatial pyramid coding micro-texture features |
Face | spoofing | detection ensemble via multistage optimisation and pruning |
Face | spoofing | detection from single images using texture and local shape analysis |
Face | spoofing | Detection Through Visual Codebooks of Spectral Temporal Cubes |
Face | spoofing | detection under super-realistic 3D wax face attacks |
Face | spoofing | detection using a light field imaging framework |
Face | spoofing | Detection Using Dynamic Texture |
FACE | spoofing | detection using LDP-TOP |
Face | spoofing | detection with image quality regression |
Face | spoofing | detection with local binary pattern network |
FGDNet: Fine-Grained Detection Network Towards Face Anti- | spoofing | |
Fingerprint Anti- | spoofing | Using Ridgelet Transform |
Flexible-Modal Face Anti- | spoofing | : A Benchmark |
FLIP: Cross-domain Face Anti- | spoofing | with Language Guidance |
Gabor Filter-Based Fingerprint Anti- | spoofing | |
Generalized face anti- | spoofing | by detecting pulse from face videos |
Generalized Face Anti- | spoofing | via Multi-Task Learning and One-Side Meta Triplet Loss |
Generative Domain Adaptation for Face Anti- | spoofing | |
Geographical position | spoofing | detection based on camera sensor fingerprint |
GNSS | spoofing | and Detection |
GNSS | spoofing | Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components, A |
GNSS | spoofing | Detection Using Q Channel Energy |
GPS, GNSS Deal with | spoofing | , Jamming, Interference |
Guest Editorial: Face Recognition and | spoofing | Attacks |
hierarchical multi-modal cross-attention model for face anti- | spoofing | , A |
Improving Gait Biometrics under | spoofing | Attacks |
Infrastructure-Enabled GPS | spoofing | Detection and Correction |
Instance-Aware Domain Generalization for Face Anti- | spoofing | |
Integration of image quality and motion cues for face anti- | spoofing | : A neural network approach |
Iris Recognition Systems, | spoofing | , Liveness, Presentation Attack, Contact Lenses |
LBP-TOP Based Countermeasure against Face | spoofing | Attacks |
LDCformer: Incorporating Learnable Descriptive Convolution to Vision Transformer for Face Anti- | spoofing | |
Learning Deep Models for Face Anti- | spoofing | : Binary or Auxiliary Supervision |
Light-weight Frequency Information Aware Neural Network Architecture for Voice | spoofing | Detection |
Lightweight Voice | spoofing | Detection Using Improved One-Class Learning and Knowledge Distillation |
Liveness Detection, | spoofing | , Fingerprint Recognition |
Liveness Detection, | spoofing | , Presentation Attack, Faces, Other Biometrics |
Localization of GNSS | spoofing | Interference Source Based on a Moving Array Antenna |
Mask | spoofing | in face recognition and countermeasures |
Meta-Teacher For Face Anti- | spoofing | |
Motion-based countermeasure against photo and video | spoofing | attacks in face recognition |
mToFNet: Object Anti- | spoofing | with Mobile Time-of-Flight Data |
Multi-domain Learning for Updating Face Anti- | spoofing | Models |
Multi-Modal Face Anti- | spoofing | Based on Central Difference Networks |
Multi-Perspective Features Learning for Face Anti- | spoofing | |
Multilevel fusing paired visible light and near-infrared spectral images for face anti- | spoofing | |
Multimodal Face | spoofing | Detection via RGB-D Images |
Multiscale residual gradient attention for face anti- | spoofing | |
NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti- | spoofing | |
Noise Modeling, Synthesis and Classification for Generic Object Anti- | spoofing | |
Non-reference image quality assessment and natural scene statistics to counter biometric sensor | spoofing | |
Novel Face | spoofing | Detection Method Based on Gaze Estimation, A |
On Disentangling Spoof Trace for Generic Face Anti- | spoofing | |
On Iris | spoofing | Using Print Attack |
On the generalization of color texture-based face anti- | spoofing | |
One-Class Learning Towards Synthetic Voice | spoofing | Detection |
Online Adaptive Personalization for Face Anti- | spoofing | |
original face anti- | spoofing | approach using partial convolutional neural network, An |
Palmprint Anti- | spoofing | Based on Domain-Adversarial Training and Online Triplet Mining |
PatchNet: A Simple Face Anti- | spoofing | Framework via Fine-Grained Patch Recognition |
PerDet: Machine-Learning-Based UAV GPS | spoofing | Detection Using Perception Data |
Person-Specific Face | spoofing | Detection Based on a Siamese Network |
Personalized Benchmark for Face Anti- | spoofing | , A |
PipeNet: Selective Modal Pipeline of Fusion Network for Multi-Modal Face Anti- | spoofing | |
PNU | spoofing | : a menace for biometrics authentication systems? |
Progressive Transfer Learning for Face Anti- | spoofing | |
Race Bias Analysis of Bona Fide Errors in Face Anti- | spoofing | |
Rehearsal-Free Domain Continual Face Anti- | spoofing | : Generalize More and Forget Less |
Research on Detection Technology of | spoofing | under the Mixed Narrowband and Spoofing Interference |
Research on Detection Technology of | spoofing | under the Mixed Narrowband and Spoofing Interference |
Residual spatiotemporal convolutional networks for face anti- | spoofing | |
ResMax: Detecting Voice | spoofing | Attacks with Residual Network and Max Feature Map |
Rethinking Domain Generalization for Face Anti- | spoofing | : Separability and Alignment |
Rethinking Shape From Shading for | spoofing | Detection |
Review on Anti- | spoofing | : Face Manipulation and Liveness Detection, A |
Robust Face Anti- | spoofing | Framework with Convolutional Vision Transformer |
Robust face anti- | spoofing | using CNN with LBP and WLD |
Robust multimodal face and fingerprint fusion in the presence of | spoofing | attacks |
rPPG-Based | spoofing | Detection for Face Mask Attack using Efficientnet on Weighted Spatial-Temporal Representation |
Searching Central Difference Convolutional Networks for Face Anti- | spoofing | |
Security evaluation of biometric authentication systems under real | spoofing | attacks |
Sensor Fusion-Based GNSS | spoofing | Attack Detection Framework for Autonomous Vehicles, A |
simple and effective patch-Based method for frame-level face anti- | spoofing | , A |
Single Patch Based 3D High-Fidelity Mask Face Anti- | spoofing | |
Single-Side Domain Generalization for Face Anti- | spoofing | |
Source-Free Domain Adaptation with Contrastive Domain Alignment and Self-supervised Exploration for Face Anti- | spoofing | |
SpoC: | spoofing | Camera Fingerprints |
Spoof Trace Disentanglement for Generic Face Anti- | spoofing | |
| spoofing | detection for embedded face recognition system using a low cost stereo camera |
| spoofing | Detection of Civilian UAVs Using Visual Odometry |
| spoofing | detection on adaptive authentication System-A survey |
| spoofing | protection for fingerprint scanner by fusing ridge signal and valley noise |
| spoofing | Traction Strategy Based on the Generation of Traction Code |
| spoofing | , Faces, Other Biometrics |
Stacking Ensemble for Anomaly Based Client-Specific Face | spoofing | Detection, A |
Study on using individual differences in facial expressions for a face recognition system immune to | spoofing | attacks |
Survey and Analysis of the GNSS | spoofing | Threat and Countermeasures, A |
Survey of GNSS | spoofing | and Anti-Spoofing Technology, A |
Survey of GNSS | spoofing | and Anti-Spoofing Technology, A |
Three-dimensional and two-and-a-half-dimensional face recognition | spoofing | using three-dimensional printed models |
Time Analysis of Pulse-Based Face Anti- | spoofing | in Visible and NIR |
Towards Unsupervised Domain Generalization for Face Anti- | spoofing | |
Transfer Learning Using Convolutional Neural Networks for Face Anti- | spoofing | |
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti- | spoofing | |
Unsupervised Compound Domain Adaptation for Face Anti- | spoofing | |
Using LDP-TOP in Video-Based | spoofing | Detection |
Visual/Inertial/GNSS Integrated Navigation System under GNSS | spoofing | Attack |
Wild Face Anti- | spoofing | Challenge 2023: Benchmark and Results |
200 for spoofing