Keywords:
- Biometrics
- Bob toolbox
- CNN
- cross-dataset evaluation
- Custom 3D Silicon masks
- database
- deep-networks
- dnn
- domain adaptation
- domain generalization
- face presentation-attacks
- Face Recognition
- feature selection
- Kaldi toolkit
- machine learning
- mobile biometrics
- MOBIO database
- MSU-MFSD
- open science
- pad eps epsc anti-spoofing fusion
- pattern recognition
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pruning
- Replay-Attack
- Replay-Mobile
- Reproducibility Criteria
- Reproducible research
- Smartphones
- Software Frameworks
- speaker verification
- Spoofing
- VGG-Face
- vulnerability
Publications of Amir Mohammadi
2022
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
2021
Face Liveness Detection Competition (LivDet-Face) - 2021, , , , , , , , , and , in: International Joint Conference on Biometrics, 2021 |
2020
DOMAIN ADAPTATION FOR GENERALIZATION OF FACE PRESENTATION ATTACK DETECTION IN MOBILE SETTINGS WITH MINIMAL INFORMATION, , and , in: 45th International Conference on Acoustics, Speech, and Signal Processing, Barcelona, Spain, IEEE, 2020 |
[URL] |
IMPROVING CROSS-DATASET PERFORMANCE OF FACE PRESENTATION ATTACK DETECTION SYSTEMS USING FACE RECOGNITION DATASETS, , and , in: 45th International Conference on Acoustics, Speech, and Signal Processing, IEEE, 2020 |
[URL] |
Iris Liveness Detection Competition (LivDet-Iris) – The 2020 Edition, , , , , , , , , , , , , and , in: INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020), 2020 |
[URL] |
Smartphone Multi-modal Biometric Authentication: Database and Evaluation, , , , , , , , and , Idiap-RR-17-2020 |
[URL] |
Trustworthy Face Recognition: Improving Generalization of Deep Face Presentation Attack Detection, , École polytechnique fédérale de Lausanne, 2020 |
|
2019
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
Recent Advances in Face Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer, 2019 |
[URL] |
2018
On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing, , , and , in: The 11th IAPR International Conference on Biometrics (ICB 2018), 2018 |
|
Spoofing Deep Face Recognition With Custom Silicone Masks, , and , in: Proceedings of BTAS2018, 2018 |
|
2017
A Competition on Generalized Software-based Face Presentation Attack Detection in Mobile Scenarios, , , , , , , , , and , in: Proceedings of the International Joint Conference on Biometrics, 2017, 2017 |
|
Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Deeply Vulnerable -- a study of the robustness of face recognition to presentation attacks, , and , in: IET (The Institution of Engineering and Technology) -- Biometrics:1--13, 2017 |
[DOI] |