Keywords:
- 2-D Face
- 2D attacks
- adaptive optics
- Analog x-ray
- analysis biometrics python tool
- Anti-spoofing
- artificial neural network
- Attack
- authentication
- automatic grading
- BEAT
- behavioral recognition
- bias
- binary segmentation
- Biomedical engineering
- biometric recognition
- Biometric Verification
- Biometrics
- Bob toolbox
- C++
- chest radiology
- Comparison studies
- Competition
- Computer science
- computer vision
- computer-aided detection
- Computer-aided diagnosis
- Convolutional neural network
- Counter-Measures
- Counter-Spoofing
- Decompensation
- deep learning
- Diabetes Mellitus
- Diabetic foot
- Disguise
- Dishonest Acts
- evaluation
- Face Recognition
- face spoofing
- Fairness
- Finger vein
- fluorescein angiography
- Forgery
- Foundation Model
- Fusion
- generalization
- healthy
- human assisted learning
- ICU
- Image analysis
- Interpretability
- Kaldi toolkit
- Keystroke
- Label balancing
- laser doppler velocimetry
- Lifelong learning
- Liveness Detection
- Local Binary Patterns
- Lung Segmentation
- machine learning
- machine-learning software
- Medical Image
- Mult-channel sensors.
- neural network
- online
- Online Platform
- open science
- Open Source
- pad eps epsc anti-spoofing fusion
- palm vein
- pattern recognition
- Performance Evaluation
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pulmonary disease
- python
- real-world data
- recognition
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Reproducibility Criteria
- Reproducible research
- retina fundus images
- retina vessel segmentation
- retinal blood flow
- retinal vasculitis
- RETINAL VEIN OCCLUSION
- rotation invariant cross-correlation
- Saliency Mapping
- security
- signal processing
- software
- Software Frameworks
- Speaker Diarization
- speaker verification
- Spoofing
- Spoofing Attacks
- temporal pattern extraction
- test
- Texture Analysis
- tool
- Trick
- trustworthy
- tuberculosis
- Tuberculosis Detection
- U-Net
- Uveitis
- vein segmentation
- verification
- Vital Signs
- Vital signs monitoring
- vulnerability
- web- biometrics
- Wrist biometrics
- wrist vein recognition
Publications of André Anjos sorted by title
A
A Bayesian approach to machine learning model comparison, , Idiap-Com-01-2023 |
|
A reproducible study on remote heart rate measurement, , and , in: arXiv, 2017 |
[URL] |
Absolute retinal blood flow in healthy eyes and in eyes with retinal vein occlusion, , , , , , , and , in: Microvascular Research, 152, 2024 |
[DOI] |
An Introduction to Vein Presentation Attacks and Detection, , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
B
BEAT: An Open-Science Web Platform, , and , in: Thirty-fourth International Conference on Machine Learning, Sydney, Australia, 2017 |
[URL] |
BEAT: An Open-Source Web-Based Open-Science Platform, , and , Idiap-RR-14-2017 |
|
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , Idiap-RR-25-2012 |
|
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |
C
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Comparing Stability and Discriminatory Power of Hand-crafted Versus Deep Radiomics: A 3D-Printed Anthropomorphic Phantom Study, , , , , , , , , , and , Idiap-Internal-RR-40-2024 |
Comparing Stability and Discriminatory Power of Hand-crafted Versus Deep Radiomics: A 3D-Printed Anthropomorphic Phantom Study, , , , , , , , , , and , in: Proceedings of the 12th European Workshop on Visual Information Processing, 2024 |
|
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
Competitive Neural Layer-based Method to Identify People with High Risk for Diabetic Foot, , , , , and , in: Computers in Biology and Medicine, 120, 2020 |
[DOI] [URL] |
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
D
Development of a lung segmentation algorithm for analog imaged chest X-Ray: preliminary results, , , , and , in: XV Brazilian Congress on Computational Intelligence, Joinville, Brazil, 2021 |
[URL] |
Does Data-Efficient Generalization Exacerbate Bias in Foundation Models?, , , , , and , in: Proceedings of the 18th European Conference on Computer Vision, 2024 |
|
E
Evaluation Databases, , , and , in: Handbook of Biometric Anti-Spoofing, pages 247-278, Springer-Verlag, 2014 |
[DOI] |