%Aigaion2 BibTeX export from Idiap Publications
%Friday 03 May 2024 03:08:06 AM

@INPROCEEDINGS{George_IJCB_2021,
         author = {George, Anjith and Marcel, S{\'{e}}bastien},
       projects = {Idiap, ODIN/BATL},
          title = {On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing},
      booktitle = {International Joint Conference on Biometrics (IJCB 2021)},
           year = {2021},
       crossref = {George_Idiap-RR-30-2020},
       abstract = {The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Although various methods have been suggested for detecting such attacks, most of them over-fit the training set and fail in generalizing to unseen attacks and environments. In this work, we use transfer learning from the vision transformer model for the zero-shot anti-spoofing task. The effectiveness of the proposed approach is demonstrated through experiments in publicly available datasets. The proposed approach outperforms the state-of-the-art methods in the zero-shot protocols in the HQ-WMCA and SiW-M datasets by a large margin. Besides, the model achieves a significant boost in cross-database performance as well.},
            pdf = {https://publications.idiap.ch/attachments/papers/2021/George_IJCB_2021.pdf}
}



crossreferenced publications: 
@TECHREPORT{George_Idiap-RR-30-2020,
         author = {George, Anjith and Marcel, S{\'{e}}bastien},
       projects = {Idiap, ODIN/BATL},
          month = {11},
          title = {On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing},
           type = {Idiap-RR},
         number = {Idiap-RR-30-2020},
           year = {2020},
    institution = {Idiap},
       abstract = {The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Although various methods have been suggested for detecting such attacks, most of them over-fit the training set and fail in generalizing to unseen attacks and environments. In this work, we use transfer learning from the vision transformer model for the zero-shot anti-spoofing task. The effectiveness of the proposed approach is demonstrated through experiments in publicly available datasets. The proposed approach outperforms the state of the art methods in the zero-shot protocols in the HQ-WMCA and SiW-M datasets by a large margin. Besides, the model achieves a significant boost in cross-database performance as well.},
            pdf = {https://publications.idiap.ch/attachments/reports/2020/George_Idiap-RR-30-2020.pdf}
}