Keywords:
- Biometrics
- Bob toolbox
- CNN
- cross-dataset evaluation
- Custom 3D Silicon masks
- database
- deep-networks
- Demographic bias
- dnn
- domain adaptation
- domain generalization
- face presentation-attacks
- Face Recognition
- Fairness
- feature selection
- Kaldi toolkit
- machine learning
- mobile biometrics
- MOBIO database
- MSU-MFSD
- open science
- pad eps epsc anti-spoofing fusion
- pattern recognition
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pruning
- Replay-Attack
- Replay-Mobile
- Reproducibility Criteria
- Reproducible research
- Smartphones
- Software Frameworks
- speaker verification
- Spoofing
- Synthetic Dataset
- VGG-Face
- vulnerability
Publications of Amir Mohammadi sorted by journal and type
Publications of type Idiap-RR
2025
| Adaptation of Speech and Bioacoustics Models, , and , Idiap-RR-05-2025 |
|
2020
| Smartphone Multi-modal Biometric Authentication: Database and Evaluation, , , , , , , , and , Idiap-RR-17-2020 |
[URL] |
IEEE Transactions on Information Forensics and Security
| Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
IET (The Institution of Engineering and Technology) -- Biometrics
| Deeply Vulnerable -- a study of the robustness of face recognition to presentation attacks, , and , in: IET (The Institution of Engineering and Technology) -- Biometrics:1--13, 2017 |
[DOI] |
Handbook of Biometric Anti-Spoofing (2019)
| Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
| Recent Advances in Face Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer, 2019 |
[URL] |
International Conference on Computer Vision (ICCV) (2025)
| DeepID Challenge of Detecting Synthetic Manipulations in ID Documents, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference on Computer Vision (ICCV), 2025 |
|
36th British Machine Vision Conference 2025 (2025)
| Detecting Text Manipulation in Images using Vision Language Models, , , , , and , in: 36th British Machine Vision Conference 2025, 2025 |
|
Proceedings of IEEE International Joint Conference on Biometrics (2025)
| FantasyID: A dataset for detecting digital manipulations of ID-documents, , , , and , in: Proceedings of IEEE International Joint Conference on Biometrics, 2025 |
|
| Investigation of accuracy and bias in face recognition trained with synthetic data, , , , , and , in: Proceedings of IEEE International Joint Conference on Biometrics, 2025 |
|
IEEE International Joint Conference on Biometrics (IJCB) (2025)
| Second Competition on Presentation Attack Detection on ID Card, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: IEEE International Joint Conference on Biometrics (IJCB), 2025 |
|
International Joint Conference on Biometrics (2021)
| Face Liveness Detection Competition (LivDet-Face) - 2021, , , , , , , , , and , in: International Joint Conference on Biometrics, 2021 |
45th International Conference on Acoustics, Speech, and Signal Processing (2020)
| DOMAIN ADAPTATION FOR GENERALIZATION OF FACE PRESENTATION ATTACK DETECTION IN MOBILE SETTINGS WITH MINIMAL INFORMATION, , and , in: 45th International Conference on Acoustics, Speech, and Signal Processing, Barcelona, Spain, IEEE, 2020 |
[URL] |
| IMPROVING CROSS-DATASET PERFORMANCE OF FACE PRESENTATION ATTACK DETECTION SYSTEMS USING FACE RECOGNITION DATASETS, , and , in: 45th International Conference on Acoustics, Speech, and Signal Processing, IEEE, 2020 |
[URL] |
INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020) (2020)
| Iris Liveness Detection Competition (LivDet-Iris) – The 2020 Edition, , , , , , , , , , , , , and , in: INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020), 2020 |
[URL] |
The 11th IAPR International Conference on Biometrics (ICB 2018) (2018)
| On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing, , , and , in: The 11th IAPR International Conference on Biometrics (ICB 2018), 2018 |
|
Proceedings of BTAS2018 (2018)
| Spoofing Deep Face Recognition With Custom Silicone Masks, , and , in: Proceedings of BTAS2018, 2018 |
|
Proceedings of the International Joint Conference on Biometrics, 2017 (2017)
| A Competition on Generalized Software-based Face Presentation Attack Detection in Mobile Scenarios, , , , , , , , , and , in: Proceedings of the International Joint Conference on Biometrics, 2017, 2017 |
|
Proc. of Interspeech (2017)
| Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
Thirty-fourth International Conference on Machine Learning (2017)
| Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Publications of type Phdthesis
2020
| Trustworthy Face Recognition: Improving Generalization of Deep Face Presentation Attack Detection, , École polytechnique fédérale de Lausanne, 2020 |
|