Face Recognition
Publications for keyword "Face Recognition"
2024
FRCSyn-onGoing: Benchmarking and Comprehensive Evaluation of Real and Synthetic Data to Improve Face Recognition Systems, , , , and , in: Information Fusion, 107:102322, 2024 |
[DOI] |
On the Information in Deep Biometric Templates: from Vulnerability of Unprotected Templates to Leakage in Protected Templates, , EPFL, 2024 |
[DOI] [URL] |
Performing And Detecting Backdoor Attacks on Face Recognition Algorithms, , Ecole Polytechnique Fédérale de Lausanne, 2024 |
|
Unveiling Synthetic Faces: How Synthetic Datasets Can Expose Real Identities, and , in: NeurIPS Workshop on New Frontiers in Adversarial Machine Learning, 2024 |
|
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack, , and , in: IEEE Transactions on Information Forensics and Security, 19:4585-4600, 2024 |
[DOI] [URL] |
2023
Blackbox Face Reconstruction from Deep Facial Embeddings Using A Different Face Recognition Model, and , in: Proceedings of the IEEE International Conference on Image Processing (ICIP), Kuala Lumpur, Malaysia, pages 2435-2439, 2023 |
[DOI] [URL] |
MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron, , and , in: Proceedings of the 31st European Signal Processing Conference, Helsinki, Finland, 2023 |
[DOI] [URL] |
2022
An anomaly detection approach for backdoored neural networks: face recognition as a case study, and , Idiap-RR-08-2022 |
[URL] |
An anomaly detection approach for backdoored neural networks: face recognition as a case study, and , in: 21st International Conference of the Biometrics Special Interest Group (BIOSIG 2022), Darmstadt, Germany, 2022 |
|
Are GAN-based Morphs Threatening Face Recognition?, , , and , in: International Conference on Acoustics, Speech and Signal Processing, 2022 |
|
Eight Years of Face Recognition Research: Reproducibility, Achievements and Open Issues, , , , , and , Idiap-RR-09-2022 |
[URL] |
Face Reconstruction from Deep Facial Embeddings using a Convolutional Neural Network, , and , in: Proceedings of the 2022 IEEE International Conference on Image Processing (ICIP), Bordeaux, France, IEEE, 2022 |
[DOI] [URL] |
2021
On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models, , and , in: Proceedings of the 13th IEEE International Workshop on Information Forensics and Security (WIFS), Montpellier, France, IEEE, 2021 |
[DOI] [URL] |
2020
Face Recognition systems: performance evaluation and bias analysis, , Idiap-Com-04-2020 |
|
Generating Master Faces for Use in PerformingWolf Attacks on Face Recognition Systems, , , and , in: International Join Conference on Biometrics, 2020 |
|
Learning One Class Representations for Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , Idiap-RR-15-2020 |
|
Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks, , , and , Idiap-RR-38-2020 |
|
2019
Vulnerability assessment and detection of Deepfake videos, and , in: IAPR International Conference on Biometrics, 2019 |
|
2016
Face Recognition in Challenging Environments: An Experimental and Reproducible Research Survey, , and , in: Face Recognition Across the Imaging Spectrum, Springer, 2016 |
|
2015
Periocular Biometrics in Mobile Environment, and , in: IEEE Seventh International Conference on Biometrics: Theory, Applications and Systems, Arlington, USA, pages 1-7, IEEE, 2015 |
[DOI] |
Reconstruction of Images from Gabor Graphs with Applications in Facial Image Processing, , , and , in: Journal of Wavelets, Multiresolution and Information Processing, 13(4):25, 2015 |
[DOI] |
2014
Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
2013
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013 |
|
2012
An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms, , and , in: Computer Vision - ECCV 2012. Workshops and Demonstrations, Idiap Research Institute, Heidelberg, pages 547-556, Springer Berlin, 2012 |
[DOI] [URL] |
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
Face Verification using Gabor Filtering and Adapted Gaussian Mixture Models, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interest Group, Darmstadt, Germany, pages 397-408, GI-Edition, 2012 |
|
LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|
2011
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
Face Verification using Gabor Filtering and Adapted Gaussian Mixture Models, , and , Idiap-RR-37-2011 |
|
2010
Feature distribution modelling techniques for 3D face recognition, , and , in: Pattern Recognition Letters, 31:1324-1330, 2010 |
|