Keywords:
- Anti-spoofing
- Attack
- authentication task
- Biometrics
- biometrics (access control)
- Competition
- Counter-Measures
- Counter-Spoofing
- CPqD mobile biometric database
- Face Editing
- Face Recognition
- face recognition performance
- face spoofing
- Fusion
- Liveness Detection
- machine learning
- mobile computing
- mobile environment
- MOBIO database
- pattern recognition
- periocular biometrics
- person recognition
- presentation attack
- Replay
- Reproducibility Criteria
- Reproducible research
- security of data
- session variability
- Software Frameworks
- Spoofing
- StyleGAN 2
- Synthetic Data
- temporal pattern extraction
- Texture Analysis
Publications of Tiago de Freitas Pereira sorted by recency
Score Normalization for Demographic Fairness in Face Recognition, , , , and , in: IEEE International Joint Conference on Biometrics (IJCB 2024), 2024 |
|
Eight Years of Face Recognition Research: Reproducibility, Achievements and Open Issues, , , , , and , Idiap-RR-09-2022 |
[URL] |
Fairness in Biometrics: a figure of merit to assess biometric verification systems, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] |
On the use of automatically generated synthetic image datasets for benchmarking face recognition, , and , in: International Joint Conference on Biometrics (IJCB 2021), 2021 |
|
Fairness in Biometrics: a figure of merit to assess biometric verification systems, and , in: arXiv, 2020 |
|
A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings, , and , in: IEEE Transactions on Biometrics, Behavior and Identity Science, 2019 |
[DOI] [URL] |
A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings, , and , Idiap-RR-09-2019 |
|
Learning How To Recognize Faces in Heterogeneous Environments, , Ecole Polytechnique Federale de Lausanne, 2019 |
[DOI] [URL] |
Heterogeneous Face Recognition Using Domain Specific Units, , and , in: IEEE Transactions on Information Forensics and Security:13, 2019 |
[DOI] |
Cross-Eyed 2017: Cross-Spectral Iris/Periocular Recognition Competition., , , , , , , , , , , , , and , in: IEEE/IAPR International Joint Conference on Biometrics, Denver, Colorado, USA, IEEE, 2017 |
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Heterogeneous Face Recognition using Inter-Session Variability Modelling, and , in: IEEE Computer Society Workshop on Biometrics, Las Vegas - USA, IEEE, 2016 |
|
Periocular Biometrics in Mobile Environment, and , in: IEEE Seventh International Conference on Biometrics: Theory, Applications and Systems, Arlington, USA, pages 1-7, IEEE, 2015 |
[DOI] |
Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-32-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-36-2013 |
|
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|