_ | anti | _ |
3D Face | anti | -Spoofing With Factorized Bilinear Coding |
3D Face Mask | anti | -spoofing via Deep Fusion of Dynamic Texture and Shape Clues |
3D Facial Geometric Attributes Based | anti | -Spoofing Approach against Mask Attacks |
3D Mask Face | anti | -Spoofing Database with Real World Variations, A |
3D Mask Face | anti | -spoofing with Remote Photoplethysmography |
A-DeepPixBis: Attentional Angular Margin for Face | anti | -Spoofing |
ACE-An Effective | anti | -forensic Contrast Enhancement Technique |
ACPL: | anti | -curriculum Pseudo-labelling for Semi-supervised Medical Image Classification |
AD-SiamRPN: | anti | -Deformation Object Tracking via an Improved Siamese Region Proposal Network on Hyperspectral Videos |
Adaptive | anti | -spam filtering for agglutinative languages: A special case for Turkish |
Adaptive Estimation of Vehicle Velocity From Updated Dynamic Model for Control of | anti | -Lock Braking System |
adaptive index smoothing loss for face | anti | -spoofing, An |
Adaptive Transformers for Robust Few-shot Cross-domain Face | anti | -spoofing |
adjustable combination of linear regression and modified probabilistic neural network for | anti | -spam filtering, An |
Adversarial Domain Generalization for Surveillance Face | anti | -Spoofing |
Adversarial examples for replay attacks against CNN-based face recognition with | anti | -spoofing capability |
Adversarial learning and decomposition-based domain generalization for face | anti | -spoofing |
Adversarial Learning Domain-Invariant Conditional Features for Robust Face | anti | -spoofing |
Adversarial Training of | anti | -Distilled Neural Network with Semantic Regulation of Class Confidence |
AdvFAS: A robust face | anti | -spoofing framework against adversarial examples |
Algorithms for Drawing | anti | -Aliased Circles and Ellipses |
Aliasing, | anti | -Aliasing |
Alternative | anti | -Forensics Method for Contrast Enhancement |
Analysis of multiframe super-resolution reconstruction for image | anti | -aliasing and deblurring |
Analysis on the Spectrum of a Stereoscopic 3-D Image and Disparity-Adaptive | anti | -Aliasing Filter |
| anti | -Adversarially Manipulated Attributions for Weakly and Semi-Supervised Semantic Segmentation |
| anti | -Adversarially Manipulated Attributions for Weakly Supervised Semantic Segmentation and Object Localization |
| anti | -Air-Weapon-Oriented Knowledge Graph Construction Method, An |
| anti | -aliased Euclidean distance transform |
| anti | -Aliased Euclidean Distance Transform on 3D Sampling Lattices |
| anti | -aliased three-dimensional cone-beam reconstruction of low-contrast objects with algebraic methods |
| anti | -Aliasing Add-On for Deep Prior Seismic Data Interpolation |
| anti | -aliasing filtering of 2D images for multi-view auto-stereoscopic displays |
| anti | -aliasing Semantic Reconstruction for Few-Shot Semantic Segmentation |
| anti | -aliasing Technique for Voxel-Based Massive Model Visualization Strategies, An |
| anti | -aliasing weighting functions for single-slice helical CT |
| anti | -Bandit for Neural Architecture Search |
| anti | -Bandit Neural Architecture Search for Model Defense |
| anti | -Bayesian parametric pattern classification using order statistics criteria for some members of the exponential family |
| anti | -collusion codes: multi-user and multimedia perspectives |
| anti | -Collusion Forensics of Multimedia Fingerprinting Using Orthogonal Modulation |
| anti | -Compression Contrastive Facial Forgery Detection |
| anti | -Distractor Active Object Tracking in 3D Environments |
| anti | -Disturbance Adaptive Control Approach for Automated Vehicles in Mixed Connected Traffic Environment, An |
| anti | -Doze Device for Automobile Drivers |
| anti | -DreamBooth: Protecting users from personalized text-to-image synthesis |
| anti | -Eavesdropping Scheme Based on OFDM-IM Using Artificial Noise, An |
| anti | -epidemic Delivery Trolley based on YOLOv5 Image Recognition of Room Numbers and QR Codes, An |
| anti | -Faces for Detection |
| anti | -Forensics for Face Swapping Videos via Adversarial Training |
| anti | -Forensics of Double JPEG Compression Detection |
| anti | -forensics of Image Sharpening Using Generative Adversarial Network |
| anti | -forensics of JPEG Detectors via Adaptive Quantization Table Replacement |
| anti | -Forensics of Lossy Predictive Image Compression |
| anti | -forensics of median filtering and contrast enhancement |
| anti | -Geometric Diffusion for Adaptive Thresholding and Fast Segmentation |
| anti | -geometric Diffusion for Adaptive Thresholding and Segmentation |
| anti | -ghost of differently exposed images with moving objects |
| anti | -Glare: Tightly Constrained Optimization for Eyeglass Reflection Removal |
| anti | -Impulse-Noise Edge Detection via Anisotropic Morphological Directional Derivatives |
| anti | -Interference Bottom Detection Method of Multibeam Echosounders Based on Deep Learning Models |
| anti | -Interference From Noisy Labels: Mean-Teacher-Assisted Confident Learning for Medical Image Segmentation |
| anti | -Intermittent Sampling Jamming Technique Utilizing the OTSU Algorithm of Random Orthogonal Sub-Pulses, An |
| anti | -Jamming GNSS Antenna Array Receiver with Reduced Phase Distortions Using a Robust Phase Compensation Technique |
| anti | -Jamming GPS Receiver With Reduced Phase Distortions |
| anti | -Jamming Heart Rate Estimation Using a Spatial-Temporal Fusion Network |
| anti | -Jamming Method and Implementation for GNSS Receiver Based on Array Antenna Rotation |
| anti | -Neuron Watermarking: Protecting Personal Data Against Unauthorized Neural Networks |
| anti | -noise Fusion Method for the Infrared and the Visible Image Based upon Sparse Representation, An |
| anti | -Noise Performance and Parameter Estimation Accuracy of FFT and FT Discrete Spectrum Correction |
| anti | -occlusion object tracking based on correlation filter |
| anti | -Occlusion Particle Filter Object-Tracking Method Based on Feature Fusion |
| anti | -occlusion person re-identification via body topology information restoration and similarity evaluation |
| anti | -occlusion tracking algorithm of video target based on prediction and re-matching strategy |
| anti | -personnel Mine Detection and Classification Using GPR Image |
| anti | -phishing model based on relative content mining |
| anti | -phishing model based on similarity measurement, An |
| anti | -phishing technique based on dynamic image captcha using multi secret sharing scheme |
| anti | -retroactive Interference for Lifelong Learning |
| anti | -Rounding Image Steganography With Separable Fine-Tuned Network |
| anti | -Sequences: Event Detection by Frame Stacking |
| anti | -spoofing enabled face recognition based on aggregated local weighted gradient orientation |
| anti | -spoofing in Action: Joint Operation with a Verification System |
| anti | -steganalysis adaptive steganography for HEVC video based on PU partition modes, An |
| anti | -UAV410: A Thermal Infrared Benchmark and Customized Scheme for Tracking Drones in the Wild |
| anti | -UAV: A Large-Scale Benchmark for Vision-Based UAV Tracking |
approach to detect video frame deletion under | anti | -forensics, An |
approach to detecting JPEG down-recompression and seam carving forgery under recompression | anti | -forensics, An |
Assessment of | anti | -tumor Immune Response in Colorectal Carcinomas from Whole Slide Images |
Attack-Agnostic Deep Face | anti | -Spoofing |
Attended-auxiliary Supervision Representation for Face | anti | -spoofing |
Automated Nuclear Segmentation of Coherent | anti | -Stokes Raman Scattering Microscopy Images by Coupling Superpixel Context Information with Artificial Neural Networks |
Automatic emergency braking/ | anti | -lock braking system coordinated control with road adhesion coefficient estimation for heavy vehicle |
Bandpass Filter Based Dual-stream Network for Face | anti | -spoofing |
BASN: Enriching Feature Representation Using Bipartite Auxiliary Supervisions for Face | anti | -Spoofing |
Bayesian Approach for | anti | -Scatter Grid Extraction in x-ray Imaging, A |
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for | anti | -Forensics |
Beyond the Lambertian assumption: A generative model for Apparent BRDF fields of faces using | anti | -symmetric tensor splines |
Bibliography of digital image | anti | -forensics and anti-anti-forensics techniques |
Bibliography of digital image | anti | -forensics and anti-anti-forensics techniques |
Bibliography of digital image | anti | -forensics and anti-anti-forensics techniques |
Bit2CV: A Novel Bitcoin | anti | -Fraud Deposit Scheme for Connected Vehicles |
CASIA-SURF CeFA: A Benchmark for Multi-modal Cross-Ethnicity Face | anti | -spoofing |
Causal Property Based | anti | -conflict Modeling with Hybrid Data Augmentation for Unbiased Scene Graph Generation |
Celeba-Spoof: Large-scale Face | anti | -spoofing Dataset with Rich Annotations |
Chaff Jamming Recognition for | anti | -Vessel End-Guidance Radars |
ChaLearn Face | anti | -Spoofing |
Classifying | anti | -nuclear Antibodies HEp-2 Images: A Benchmarking Platform |
Closer Look at Geometric Temporal Dynamics for Face | anti | -Spoofing, A |
CNN based spatio-temporal feature extraction for face | anti | -spoofing |
CNN-based | anti | -spoofing two-tier multi-factor authentication system |
Coflex: Flexible Bracelet | anti | Covid-19 to Protect Construction Workers |
Composite Adaptive | anti | -Disturbance Fault Tolerant Control of High-Speed Trains With Multiple Disturbances |
Computer Aided Diagnosis for | anti | -Nuclear Antibodies HEp-2 images: Progress and challenges |
Construction of | anti | -Symmetrical Wavelet and Building Extraction from Remote Sensing Imagery, The |
Content-Dependent | anti | -disclosure Image Watermark |
Corrigendum to three papers that deal with ' | anti | '-Bayesian Pattern Recognition [Pattern Recognition] |
Countering | anti | -forensics of image resampling |
Countering | anti | -forensics of SIFT-based Copy-Move Detection |
Countering | anti | -forensics to wavelet-based compression |
Countering | anti | -JPEG compression forensics |
Countering JPEG | anti | -forensics |
Covered Style Mining via Generative Adversarial Networks for Face | anti | -spoofing |
Cross Domain Multi-modal Dataset for Robust Face | anti | -spoofing, A |
Cross Modal Focal Loss for RGBD Face | anti | -Spoofing |
Cross-ethnicity face | anti | -spoofing recognition challenge: A review |
Curvelet-based fingerprint | anti | -spoofing |
DANet: Dynamic Attention to Spoof Patterns for Face | anti | -Spoofing |
Dataset and Benchmark for Large-Scale Multi-Modal Face | anti | -Spoofing, A |
Deep feature representation for | anti | -fraud system |
Deep Learning for Face | anti | -Spoofing: A Survey |
Deep Salient Feature Based | anti | -Noise Transfer Network for Scene Classification of Remote Sensing Imagery |
Deep Spatial Gradient and Temporal Depth Learning for Face | anti | -Spoofing |
Deep Tree Learning for Zero-Shot Face | anti | -Spoofing |
DeepDIST: A Black-Box | anti | -Collusion Framework for Secure Distribution of Deep Models |
Delving Deeper into | anti | -Aliasing in ConvNets |
Demo: DLP based | anti | -piracy display system |
Demosaicking Using a Spatial Reference Image for an | anti | -Aliasing Multispectral Filter Array |
design of embedded vehicle-mounted | anti | -collision system, The |
Design of variable bandwidth symmetric/ | anti | -symmetric FIR single-band PCLS lowpass and highpass filters |
Detecting | anti | -forensic attacks on demosaicing-based camera model identification |
Detecting Maritime Infrared Targets in Harsh Environment by Improved Visual Attention Model Preselector and | anti | -Jitter Spatiotemporal Filter Discriminator |
Detection of Information Hiding at | anti | -Copying 2D Barcodes |
Detection of Spoofing Medium Contours for Face | anti | -Spoofing |
determination of the optimal strip-thickness of | anti | -scatter grids for a given grid ratio and strip height, The |
Digital | anti | -aging in face images |
Digital Watermarking Scheme Based on Arnold and | anti | -Arnold Transforms |
Dimensioning of optical birefringent | anti | -alias filters for digital cameras |
Discriminative Frequency Information Learning for End-to-End Speech | anti | -Spoofing |
Disentangled Representation based Face | anti | -Spoofing |
Disentangled Representation with Dual-stage Feature Learning for Face | anti | -spoofing |
Disentangling Facial Pose and Appearance Information for Face | anti | -spoofing |
Disparity Adaptive Filter for | anti | -Aliasing of Stereoscopic 3D Images |
dissimilarity representation for finding universals from particulars by an | anti | -essentialist approach, The |
Distortionless 1/2 Overlap Windowing in Frequency Domain | anti | -Jamming of Satellite Navigation Receivers |
DLP based | anti | -piracy display system |
Domain Adversarial Disentanglement Network With Cross-Domain Synthesis for Generalized Face | anti | -Spoofing |
Domain Agnostic Feature Learning for Image and Video Based Face | anti | -spoofing |
Domain Generalization via Shuffled Style Assembly for Face | anti | -Spoofing |
Domain Invariant Vision Transformer Learning for Face | anti | -spoofing |
Domain-Generalized Face | anti | -Spoofing with Unknown Attacks |
Dual Spoof Disentanglement Generation for Face | anti | -Spoofing With Depth Uncertainty Learning |
Dual-Domain Generative Adversarial Network for Digital Image Operation | anti | -Forensics |
Dual-stream correlation exploration for face | anti | -Spoofing |
Dynamic Attention based Domain Generalization for Face | anti | -Spoofing |
Dynamic Feature Queue for Surveillance Face | anti | -spoofing via Progressive Training |
Ear | anti | -spoofing against print attacks using three-level fusion of image quality measures |
Edge Preserving Locally Adaptive | anti | -aliasing Zooming Algorithm with Diffused Interpolation, An |
Effective Face | anti | -Spoofing Method via Stereo Matching, An |
end-to-end | anti | -shaking multi-focus image fusion approach, An |
Evaluation of an | anti | -Regularization Technique in Neural Networks |
Exploring the Effectiveness of Lightweight Architectures for Face | anti | -Spoofing |
Exposing Fine-Grained Adversarial Vulnerability of Face | anti | -Spoofing Models |
ExS-GAN: Synthesizing | anti | -Forensics Images via Extra Supervised GAN |
Eyeblink-based | anti | -Spoofing in Face Recognition from a Generic Webcamera |
Face | anti | -spoofing based on color texture analysis |
Face | anti | -Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern |
Face | anti | -spoofing Based on General Image Quality Assessment |
Face | anti | -spoofing detection based on DWT-LBP-DCT features |
Face | anti | -spoofing detection based on multi-scale image quality assessment |
Face | anti | -spoofing using feature distilling and global attention learning |
Face | anti | -Spoofing Using Spatial Pyramid Pooling |
Face | anti | -spoofing via deep local binary patterns |
Face | anti | -spoofing via Disentangled Representation Learning |
Face | anti | -spoofing with Human Material Perception |
Face | anti | -Spoofing with Multi-Scale Information |
Face | anti | -spoofing with multifeature videolet aggregation |
Face | anti | -Spoofing: Model Matters, so Does Data |
Face De-spoofing: | anti | -spoofing via Noise Modeling |
fast | anti | -noise fuzzy C-means algorithm for image segmentation, A |
fast region segmentation algorithm on compressed gray images using Non-symmetry and | anti | -packing Model and Extended Shading representation, A |
FGDNet: Fine-Grained Detection Network Towards Face | anti | -Spoofing |
Fine-Grained Multilevel Fusion for | anti | -Occlusion Monocular 3D Object Detection |
Fingerprint | anti | -Spoofing Using Ridgelet Transform |
Fixed-Time Slip Control With Extended-State Observer Using Only Wheel Speed for | anti | -Lock Braking Systems of Electric Vehicles |
Flexible-Modal Face | anti | -Spoofing: A Benchmark |
FLIP: Cross-domain Face | anti | -spoofing with Language Guidance |
Forensic and | anti | -forensic techniques for video shot editing in H.264/AVC |
Framework of Enhancing Image Steganography With Picture Quality Optimization and | anti | -Steganalysis Based on Simulated Annealing Algorithm, A |
Frequency Agile | anti | -Interference Technology Based on Reinforcement Learning Using Long Short-Term Memory and Multi-Layer Historical Information Observation |
Frequency-domain analysis of discrete wavelet transform coefficients and their adaptive shrinkage for | anti | -aliasing |
fundamental theory of optimal | anti | -Bayesian parametric pattern classification using order statistics criteria, The |
Gabor Filter-Based Fingerprint | anti | -spoofing |
Generalized face | anti | -spoofing by detecting pulse from face videos |
Generalized Face | anti | -Spoofing via Multi-Task Learning and One-Side Meta Triplet Loss |
Generative Domain Adaptation for Face | anti | -Spoofing |
Global-Local Tracking Framework Driven by Both Motion and Appearance for Infrared | anti | -UAV, A |
Graph-Based Implementation of the | anti | -aliased Euclidean Distance Transform, A |
GraSens: A Gabor Residual | anti | -Aliasing Sensing Framework for Action Recognition using WiFi |
Guest Editorial Introduction to the Special Issue on Pattern Recognition Technologies for | anti | -Terrorism Applications |
hierarchical | anti | -occlusion tracking algorithm based on DMPF and ORB, A |
Hierarchical Image Segmentation Based on Nonsymmetry and | anti | -Packing Pattern Representation Model |
hierarchical multi-modal cross-attention model for face | anti | -spoofing, A |
HMM-Based Approach to Recognize Ultra Low Resolution | anti | -Aliased Words, A |
Image-Based Classification Module for Data Fusion | anti | -Drone System, An |
Improved line spectral frequency estimation through | anti | -aliasing filtering |
Instance-Aware Domain Generalization for Face | anti | -Spoofing |
Integration of image quality and motion cues for face | anti | -spoofing: A neural network approach |
Interrupted-Sampling Repeater Jamming-Suppression Method Based on a Multi-Stages Multi-Domains Joint | anti | -Jamming Depth Network |
Knowledge Transferred Fine-Tuning for | anti | -Aliased Convolutional Neural Network in Data-Limited Situation |
lateral trajectory tracking control method for intelligent commercial vehicles considering active | anti | -roll decision based on Stackelberg equilibrium, A |
LDCformer: Incorporating Learnable Descriptive Convolution to Vision Transformer for Face | anti | -Spoofing |
Learning Deep Models for Face | anti | -Spoofing: Binary or Auxiliary Supervision |
Lifelong Unsupervised Domain Adaptive Person Re-identification with Coordinated | anti | -forgetting and Adaptation |
Light-Guided and Cross-Fusion U-Net for | anti | -Illumination Image Super-Resolution |
Live Demonstration: PINK: Polarity-based | anti | -flicker for Event Cameras |
Local Perturbation Generation Method for GAN-Generated Face | anti | -Forensics, A |
Low-Cost | anti | -Copying 2D Barcode by Exploiting Channel Noise Characteristics |
Machine Learning Algorithms for Automatic Lithological Mapping Using Remote Sensing Data: A Case Study from Souk Arbaa Sahel, Sidi Ifni Inlier, Western | anti | -Atlas, Morocco |
Median Filtered Image Restoration and | anti | -Forensics Using Adversarial Networks |
Meta-Teacher For Face | anti | -Spoofing |
Method for Designated Target | anti | -Interference Tracking Combining YOLOv5 and SiamRPN for UAV Tracking and Landing Control, A |
Method for Long-Term Target | anti | -Interference Tracking Combining Deep Learning and CKF for LARS Tracking and Capturing, A |
Method of Fast and Simultaneous Calibration of Many Mobile FMCW Radars Operating in a Network | anti | -Drone System, A |
method of fingermark | anti | -counterfeiting for forensic document identification, A |
Mip-NeRF 360: Unbounded | anti | -Aliased Neural Radiance Fields |
Mip-NeRF: A Multiscale Representation for | anti | -Aliasing Neural Radiance Fields |
Mislgan: An | anti | -Forensic Camera Model Falsification Framework Using A Generative Adversarial Network |
mToFNet: Object | anti | -Spoofing with Mobile Time-of-Flight Data |
Multi-domain Learning for Updating Face | anti | -spoofing Models |
Multi-Modal Face | anti | -Spoofing Based on Central Difference Networks |
Multi-Perspective Features Learning for Face | anti | -Spoofing |
Multi-purpose Image Counter- | anti | -forensic Method Using Convolutional Neural Networks, A |
Multi-Relay Cognitive Network With | anti | -Fragile Relay Communication for Intelligent Transportation System Under Aggregated Interference |
multi-view camera-based | anti | -fraud system and its applications, A |
Multilevel fusing paired visible light and near-infrared spectral images for face | anti | -spoofing |
Multiscale Representation for Real-Time | anti | -Aliasing Neural Rendering |
Multiscale residual gradient attention for face | anti | -spoofing |
NAS-FAS: Static-Dynamic Central Difference Network Search for Face | anti | -Spoofing |
Network-based stabilization of time-delay systems with actuator saturation via | anti | -windup design |
New | anti | -aliasing Algorithm for Computer Graphics Images, A |
NLS Based Hierarchical | anti | -Disturbance Controller for Vehicle Platoons With Time-Varying Parameter Uncertainties |
Noise Modeling, Synthesis and Classification for Generic Object | anti | -Spoofing |
Noise Reduction of VQ Encoded Images Through | anti | -Gray Coding |
Novel | anti | -Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing, A |
Novel | anti | -Drift Visual Object Tracking Algorithm Based on Sparse Response and Adaptive Spatial-Temporal Context-Aware, A |
Novel Border Identification Algorithm Based on an | anti | -Bayesian Paradigm, A |
On Achieving Near-Optimal | anti | -Bayesian Order Statistics-Based Classification for Asymmetric Exponential Distributions |
On Disentangling Spoof Trace for Generic Face | anti | -spoofing |
On the classification of dynamical data streams using novel | anti | -Bayesian techniques |
On the generalization of color texture-based face | anti | -spoofing |
Online Adaptive Personalization for Face | anti | -Spoofing |
Optimal | anti | -Bayesian Parametric Pattern Classification for the Exponential Family Using Order Statistics Criteria |
Optimal | anti | -bayesian Parametric Pattern Classification Using Order Statistics Criteria |
Optimal Order of Time-Domain Adaptive Filter for | anti | -Jamming Navigation Receiver |
Optimization Method for Radar | anti | -Jamming Strategy via Key Time Nodes, An |
original face | anti | -spoofing approach using partial convolutional neural network, An |
Overview of Multiview Video Coding and | anti | -Aliasing for 3D Displays |
Palmprint | anti | -Spoofing Based on Domain-Adversarial Training and Online Triplet Mining |
Parameter Estimation and | anti | -Sideslip Line-of-Sight Method-Based Adaptive Path-Following Controller for a Multijoint Snake Robot |
PatchNet: A Simple Face | anti | -Spoofing Framework via Fine-Grained Patch Recognition |
Perception matters: Exploring imperceptible and transferable | anti | -forensics for GAN-generated fake face imagery detection |
Personalized Benchmark for Face | anti | -spoofing, A |
Physical | anti | -copying Semi-robust Random Watermarking for QR Code |
PIAP-DF: Pixel-Interested and | anti | Person-Specific Facial Action Unit Detection Net with Discrete Feedback Learning |
PipeNet: Selective Modal Pipeline of Fusion Network for Multi-Modal Face | anti | -Spoofing |
Prediction Method of | anti | -Electricity Stealing Based on Big Data of Electric Power, A |
Progressive Transfer Learning for Face | anti | -Spoofing |
Race Bias Analysis of Bona Fide Errors in Face | anti | -spoofing |
Radar | anti | -Jamming Decision-Making Method Based on DDPG-MADDPG Algorithm |
Radio Map Assisted Path Planning for UAV | anti | -Jamming Communications |
Rapid Estimation of Road Friction for | anti | -Skid Autonomous Driving |
Real-time | anti | -distractor Infrared UAV Tracker with Channel Feature Refinement Module, A |
Rehearsal-Free Domain Continual Face | anti | -Spoofing: Generalize More and Forget Less |
Research on Dual | anti | Duplication and Anti-counterfeiting Technology of QR Code Based on Metamerism Characteristics |
Research on Dual | anti | Duplication and Anti-counterfeiting Technology of QR Code Based on Metamerism Characteristics |
Residual spatiotemporal convolutional networks for face | anti | -spoofing |
Rethinking Domain Generalization for Face | anti | -spoofing: Separability and Alignment |
Review on | anti | -Spoofing: Face Manipulation and Liveness Detection, A |
Revisiting Light Field Rendering With Deep | anti | -Aliasing Neural Network |
RFID-Integrated Framework for Tag | anti | -Collision in UAV-Aided VANETs, A |
robust and fast | anti | -ghosting algorithm for high dynamic range imaging, A |
Robust Approach for | anti | -jamming Target Tracking in Forward Looking Infrared Imagery, A |
Robust Face | anti | -Spoofing Framework with Convolutional Vision Transformer |
Robust face | anti | -spoofing using CNN with LBP and WLD |
Robust shifting control of a motor-transmission integrated system considering | anti | -jerking and speed regulation for electric vehicles |
Robust watermarking using extended | anti | -collusion codes |
Searching Central Difference Convolutional Networks for Face | anti | -Spoofing |
Segmental DCT Coefficient Reversal Based | anti | -Collusion Audio Fingerprinting Mechanism |
Sensor fusion in | anti | -personnel mine detection using a two-level belief function model |
Sidelobes Suppression for Time Domain | anti | -Jamming of Satellite Navigation Receivers |
simple and effective patch-Based method for frame-level face | anti | -spoofing, A |
Simulation Tool for RFID | anti | -Collision Algorithms Based on ALOHA, A |
Single Patch Based 3D High-Fidelity Mask Face | anti | -Spoofing |
Single-Side Domain Generalization for Face | anti | -Spoofing |
SMORE: A Self-Supervised | anti | -Aliasing and Super-Resolution Algorithm for MRI Using Deep Learning |
Source-Free Domain Adaptation with Contrastive Domain Alignment and Self-supervised Exploration for Face | anti | -spoofing |
Spatial Agent-Based Model to Assess the Spread of Malaria in Relation to | anti | -Malaria Interventions in Southeast Iran, A |
Spoof Trace Disentanglement for Generic Face | anti | -Spoofing |
State Prediction and | anti | -Interference-Based Flight Path-Following for UAVs |
State-Aware | anti | -Drift Object Tracking |
Subsampling Models and | anti | -Alias Filters for 3-D Automultiscopic Displays |
Subset Selection Strategies Based on Target Positioning Characteristics for | anti | -Jamming Technology |
Survey of GNSS Spoofing and | anti | -Spoofing Technology, A |
Time Analysis of Pulse-Based Face | anti | -Spoofing in Visible and NIR |
Towards Improving the | anti | -Attack Capability of the Rangenet++ |
Towards Unsupervised Domain Generalization for Face | anti | -Spoofing |
Transfer Learning Using Convolutional Neural Networks for Face | anti | -spoofing |
Tri-MipRF: Tri-Mip Representation for Efficient | anti | -Aliasing Neural Radiance Fields |
UAV | anti | -collision visual detection algorithm |
Undetectable image tampering through JPEG compression | anti | -forensics |
Unicode Analogies: An | anti | -Objectivist Visual Reasoning Challenge |
Unified Transformer-based Tracker for | anti | -UAV Tracking, A |
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face | anti | -spoofing |
Unsupervised Compound Domain Adaptation for Face | anti | -Spoofing |
Using One-Class Classification Techniques in the | anti | -phoneme Problem |
Using Supervised Learning and Comparing General and | anti | -HIV Drug Databases Using Chemoinformatics |
Using Visual Features for | anti | -Spam Filtering |
Video surveillance and human activity recognition for | anti | -terrorism and force protection |
Vision based | anti | -collision system for rail track maintenance vehicles |
Vision-Based | anti | -UAV Detection and Tracking |
Wavelet-based image compression | anti | -forensics |
Wild Face | anti | -Spoofing Challenge 2023: Benchmark and Results |
YOLO- | anti | : YOLO-based counterattack model for unseen congested object detection |
Zip-NeRF: | anti | -Aliased Grid-Based Neural Radiance Fields |
335 for anti