Keywords:
- 2-D Face
- 2D attacks
- adaptive optics
- Analog x-ray
- analysis biometrics python tool
- Anti-spoofing
- artificial neural network
- Attack
- Attention analysis
- authentication
- automatic grading
- BEAT
- behavioral recognition
- bias
- binary segmentation
- Biomedical engineering
- biometric recognition
- Biometric Verification
- Biometrics
- Bob toolbox
- C++
- chest radiology
- clinical data science
- Comparison studies
- Competition
- Computer science
- computer vision
- computer-aided detection
- Computer-aided diagnosis
- Convolutional neural network
- Counter-Measures
- Counter-Spoofing
- Cross-Modality Transfer
- Decompensation
- deep learning
- Diabetes Mellitus
- Diabetic foot
- disease grading
- Disguise
- Dishonest Acts
- evaluation
- Face Recognition
- face spoofing
- Fairness
- Finger vein
- fluorescein angiography
- Forgery
- Foundation Model
- Foundation Models
- Fusion
- generalization
- GPTs
- healthy
- Hospital-Acquired Infections
- human assisted learning
- ICU
- Image analysis
- inter-grader agreement
- Interpretability
- Kaldi toolkit
- Keystroke
- Label balancing
- laser doppler velocimetry
- Lifelong learning
- Liveness Detection
- Local Binary Patterns
- Lung Segmentation
- machine learning
- machine-learning software
- Medical Image
- Mult-channel sensors.
- Multidrug Resistance Prediction
- neural network
- online
- Online Platform
- open science
- Open Source
- Optic disease grading
- pad eps epsc anti-spoofing fusion
- palm vein
- pattern recognition
- Performance Evaluation
- personalized medicine
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pulmonary disease
- python
- real-world data
- recognition
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Reproducibility Criteria
- Reproducible research
- retina fundus images
- retina vessel segmentation
- retinal blood flow
- Retinal Imaging
- retinal vasculitis
- RETINAL VEIN OCCLUSION
- risk prediction
- rotation invariant cross-correlation
- Saliency Mapping
- security
- self-supervised learning
- signal processing
- software
- Software Frameworks
- Sparse Clinical Data Integration
- Spatiotemporal Modeling
- Speaker Diarization
- speaker verification
- Spoofing
- Spoofing Attacks
- Temporal Graph Neural Networks
- temporal pattern extraction
- test
- Texture Analysis
- tool
- transformers
- Trick
- trustworthy
- tuberculosis
- Tuberculosis Detection
- U-Net
- Uveitis
- vasculitis
- vein segmentation
- verification
- Vital Signs
- Vital signs monitoring
- vulnerability
- web- biometrics
- Wrist biometrics
- wrist vein recognition
Publications of André Anjos sorted by recency
| Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation, , , and , in: Sixth International Workshop on Biometrics and Forensics, 2018 |
|
| On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing, , , and , in: The 11th IAPR International Conference on Biometrics (ICB 2018), 2018 |
|
| A reproducible study on remote heart rate measurement, , and , in: arXiv, 2017 |
[URL] |
| Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
| BEAT: An Open-Science Web Platform, , and , in: Thirty-fourth International Conference on Machine Learning, Sydney, Australia, 2017 |
[URL] |
| Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
| Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
| Keystroke Biometrics Ongoing Competition, , , , , , , and , in: IEEE Access, 4:7736-7746, 2016 |
[DOI] [URL] |
| BEAT: An Open-Source Web-Based Open-Science Platform, , and , Idiap-RR-14-2017 |
|
| Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
| On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
| Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
| Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
| Evaluation Databases, , , and , in: Handbook of Biometric Anti-Spoofing, pages 247-278, Springer-Verlag, 2014 |
[DOI] |
| Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
| Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
| Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
| Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
| Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
| Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
| Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
| The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
| The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
| Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
| Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |