Keywords:
- 2-D Face
- 2D attacks
- adaptive optics
- Analog x-ray
- analysis biometrics python tool
- Anti-spoofing
- artificial neural network
- Attack
- authentication
- automatic grading
- BEAT
- behavioral recognition
- bias
- binary segmentation
- Biomedical engineering
- biometric recognition
- Biometric Verification
- Biometrics
- Bob toolbox
- C++
- chest radiology
- clinical data science
- Comparison studies
- Competition
- Computer science
- computer vision
- computer-aided detection
- Computer-aided diagnosis
- Convolutional neural network
- Counter-Measures
- Counter-Spoofing
- Decompensation
- deep learning
- Diabetes Mellitus
- Diabetic foot
- disease grading
- Disguise
- Dishonest Acts
- evaluation
- Face Recognition
- face spoofing
- Fairness
- Finger vein
- fluorescein angiography
- Forgery
- Foundation Model
- Fusion
- generalization
- GPTs
- healthy
- human assisted learning
- ICU
- Image analysis
- Interpretability
- Kaldi toolkit
- Keystroke
- Label balancing
- laser doppler velocimetry
- Lifelong learning
- Liveness Detection
- Local Binary Patterns
- Lung Segmentation
- machine learning
- machine-learning software
- Medical Image
- Mult-channel sensors.
- neural network
- online
- Online Platform
- open science
- Open Source
- pad eps epsc anti-spoofing fusion
- palm vein
- pattern recognition
- Performance Evaluation
- personalized medicine
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pulmonary disease
- python
- real-world data
- recognition
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Reproducibility Criteria
- Reproducible research
- retina fundus images
- retina vessel segmentation
- retinal blood flow
- retinal vasculitis
- RETINAL VEIN OCCLUSION
- risk prediction
- rotation invariant cross-correlation
- Saliency Mapping
- security
- signal processing
- software
- Software Frameworks
- Speaker Diarization
- speaker verification
- Spoofing
- Spoofing Attacks
- temporal pattern extraction
- test
- Texture Analysis
- tool
- Trick
- trustworthy
- tuberculosis
- Tuberculosis Detection
- U-Net
- Uveitis
- vein segmentation
- verification
- Vital Signs
- Vital signs monitoring
- vulnerability
- web- biometrics
- Wrist biometrics
- wrist vein recognition
Publications of André Anjos sorted by journal and type
Publications of type Idiap-RR
2020
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
2017
BEAT: An Open-Source Web-Based Open-Science Platform, , and , Idiap-RR-14-2017 |
|
2014
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
2013
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
2012
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , Idiap-RR-25-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
Publications of type Idiap-Com
2023
A Bayesian approach to machine learning model comparison, , Idiap-Com-01-2023 |
|
2012
ScoreToolKit Documentation, and , Idiap-Com-02-2012 |
|
arXiv
A reproducible study on remote heart rate measurement, , and , in: arXiv, 2017 |
[URL] |
Computer Speech & Language
Towards Lifelong Human Assisted Speaker Diarization, , , , , , , , , , , , and , in: Computer Speech & Language, 2022 |
[DOI] [URL] |
Computers in Biology and Medicine
Competitive Neural Layer-based Method to Identify People with High Risk for Diabetic Foot, , , , , and , in: Computers in Biology and Medicine, 120, 2020 |
[DOI] [URL] |
Cornell University Pre-print Server
The Little W-Net That Could: State-of-the-Art Retinal Vessel Segmentation with Minimalistic Models, , , , , and , in: Cornell University Pre-print Server, 2020 |
[URL] |
EURASIP Journal on Image and Video Processing
Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
IEEE Access
Keystroke Biometrics Ongoing Competition, , , , , , , and , in: IEEE Access, 4:7736-7746, 2016 |
[DOI] [URL] |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
IEEE Transactions on Information Forensics and Security
Heterogeneous Face Recognition Using Domain Specific Units, , and , in: IEEE Transactions on Information Forensics and Security:13, 2019 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
Institution of Engineering and Technology Journal on Biometrics
Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
Microvascular Research
Absolute retinal blood flow in healthy eyes and in eyes with retinal vein occlusion, , , , , , , and , in: Microvascular Research, 152, 2024 |
[DOI] |
Nature Scientific Reports
State-of-the-art retinal vessel segmentation with minimalistic models, , , , , and , in: Nature Scientific Reports, 12(6174), 2022 |
[DOI] |
The International Journal of Tuberculosis and Lung Disease
The rise of artificial intelligence reading of chest X-rays for enhanced TB diagnosis and elimination, , , , , , , , and , in: The International Journal of Tuberculosis and Lung Disease, 27(5):367--372, 2023 |
[DOI] [URL] |
Handbook of Biometric Anti-Spoofing (2019)
An Introduction to Vein Presentation Attacks and Detection, , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
Recent Advances in Face Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer, 2019 |
[URL] |
Face Recognition Systems Under Spoofing Attacks (2016)
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Encyclopedia of Biometrics (2014)
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
Handbook of Biometric Anti-Spoofing (2014)
Evaluation Databases, , , and , in: Handbook of Biometric Anti-Spoofing, pages 247-278, Springer-Verlag, 2014 |
[DOI] |
Handbook of Biometric Antispoofing (2014)
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Handbook of Biometric Anti-Spoofing (2014)
Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
Proceedings of the 12th European Workshop on Visual Information Processing (2024)
Comparing Stability and Discriminatory Power of Hand-crafted Versus Deep Radiomics: A 3D-Printed Anthropomorphic Phantom Study, , , , , , , , , , and , in: Proceedings of the 12th European Workshop on Visual Information Processing, 2024 |
|
Proceedings of the 18th European Conference on Computer Vision (2024)
Does Data-Efficient Generalization Exacerbate Bias in Foundation Models?, , , , , and , in: Proceedings of the 18th European Conference on Computer Vision, 2024 |
|
Proceedings of the 12th European Workshop on Visual Information Processing (2024)
Refining Tuberculosis Detection in CXR Imaging: Addressing Bias in Deep Neural Networks via Interpretability, , and , in: Proceedings of the 12th European Workshop on Visual Information Processing, 2024 |
|
Proceedings of the IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR) (2024)
Using Backbone Foundation Model for Evaluating Fairness in Chest Radiography Without Demographic Data, , and , in: Proceedings of the IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR), 2024 |
|
Union World Conference on Lung Health (2022)
Pulmonary Tuberculosis Screening from Radiological Signs on Chest X-Ray Images Using Deep Models, , and , in: Union World Conference on Lung Health, The Union, 2022 |
XV Brazilian Congress on Computational Intelligence (2021)
Development of a lung segmentation algorithm for analog imaged chest X-Ray: preliminary results, , , , and , in: XV Brazilian Congress on Computational Intelligence, Joinville, Brazil, 2021 |
[URL] |
Sixth International Workshop on Biometrics and Forensics (2018)
Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation, , , and , in: Sixth International Workshop on Biometrics and Forensics, 2018 |
|
The 11th IAPR International Conference on Biometrics (ICB 2018) (2018)
On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing, , , and , in: The 11th IAPR International Conference on Biometrics (ICB 2018), 2018 |
|
Thirty-fourth International Conference on Machine Learning (2017)
BEAT: An Open-Science Web Platform, , and , in: Thirty-fourth International Conference on Machine Learning, Sydney, Australia, 2017 |
[URL] |
Proc. of Interspeech (2017)
Bob Speaks Kaldi, , , , and , in: Proc. of Interspeech, 2017 |
|
Thirty-fourth International Conference on Machine Learning (2017)
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics (2013)
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
International Conference on Biometrics (2013)
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
International Conference of Biometrics 2013 (2013)
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV (2012)
LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|
Proceedings of the 11th International Conference of the Biometrics Special Interes Group (2012)
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|