Keywords:
- 2-D Face
- 2D attacks
- adaptive optics
- Analog x-ray
- analysis biometrics python tool
- Anti-spoofing
- artificial neural network
- Attack
- authentication
- automatic grading
- BEAT
- behavioral recognition
- bias
- binary segmentation
- Biomedical engineering
- biometric recognition
- Biometric Verification
- Biometrics
- Bob toolbox
- C++
- chest radiology
- clinical data science
- Comparison studies
- Competition
- Computer science
- computer vision
- computer-aided detection
- Computer-aided diagnosis
- Convolutional neural network
- Counter-Measures
- Counter-Spoofing
- Decompensation
- deep learning
- Diabetes Mellitus
- Diabetic foot
- disease grading
- Disguise
- Dishonest Acts
- evaluation
- Face Recognition
- face spoofing
- Fairness
- Finger vein
- fluorescein angiography
- Forgery
- Foundation Model
- Fusion
- generalization
- GPTs
- healthy
- human assisted learning
- ICU
- Image analysis
- Interpretability
- Kaldi toolkit
- Keystroke
- Label balancing
- laser doppler velocimetry
- Lifelong learning
- Liveness Detection
- Local Binary Patterns
- Lung Segmentation
- machine learning
- machine-learning software
- Medical Image
- Mult-channel sensors.
- neural network
- online
- Online Platform
- open science
- Open Source
- pad eps epsc anti-spoofing fusion
- palm vein
- pattern recognition
- Performance Evaluation
- personalized medicine
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pulmonary disease
- python
- real-world data
- recognition
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Reproducibility Criteria
- Reproducible research
- retina fundus images
- retina vessel segmentation
- retinal blood flow
- retinal vasculitis
- RETINAL VEIN OCCLUSION
- risk prediction
- rotation invariant cross-correlation
- Saliency Mapping
- security
- signal processing
- software
- Software Frameworks
- Speaker Diarization
- speaker verification
- Spoofing
- Spoofing Attacks
- temporal pattern extraction
- test
- Texture Analysis
- tool
- Trick
- trustworthy
- tuberculosis
- Tuberculosis Detection
- U-Net
- Uveitis
- vein segmentation
- verification
- Vital Signs
- Vital signs monitoring
- vulnerability
- web- biometrics
- Wrist biometrics
- wrist vein recognition
Publications of André Anjos sorted by first author
A
Fully Automatic Grading of Retinal Vasculitis on Fluorescein Angiography Time-lapse from Real-world Data in Clinical Settings, , , , , , , and , in: 2023 IEEE 36th International Symposium on Computer-Based Medical Systems (CBMS), L'Aquila, Italy, 2023, pages 689-693, 2023 |
[DOI] [URL] |
Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
BEAT: An Open-Source Web-Based Open-Science Platform, , and , Idiap-RR-14-2017 |
|
BEAT: An Open-Science Web Platform, , and , in: Thirty-fourth International Conference on Machine Learning, Sydney, Australia, 2017 |
[URL] |
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , Idiap-RR-25-2012 |
|
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
ScoreToolKit Documentation, and , Idiap-Com-02-2012 |
|
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
An Introduction to Vein Presentation Attacks and Detection, , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
B
Recent Advances in Face Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer, 2019 |
[URL] |
Idiap Scientific Report 2022, , , , , , , , , , , , , , , , , and , Idiap-RR-05-2023 |
|
C
Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
D
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |