Publications of BEAT sorted by recency
Face Liveness Detection Competition (LivDet-Face) - 2021, , , , , , , , , and , in: International Joint Conference on Biometrics, 2021 |
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
BEAT: An Open-Science Web Platform, , and , in: Thirty-fourth International Conference on Machine Learning, Sydney, Australia, 2017 |
[URL] |
Keystroke Biometrics Ongoing Competition, , , , , , , and , in: IEEE Access, 4:7736-7746, 2016 |
[DOI] [URL] |
BEAT: An Open-Source Web-Based Open-Science Platform, , and , Idiap-RR-14-2017 |
|
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
Cross-database evaluation of audio-based spoofing detection systems, and , in: Interspeech, San Francisco, USA, 2016 |
[URL] |
Heterogeneous Face Recognition using Inter-Session Variability Modelling, and , in: IEEE Computer Society Workshop on Biometrics, Las Vegas - USA, IEEE, 2016 |
|
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , Idiap-RR-24-2016 |
[URL] |
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , Idiap-RR-25-2016 |
[URL] |
Cross-database evaluation of audio-based spoofing detection systems, and , Idiap-RR-23-2016 |
[URL] |
Face Recognition in Challenging Environments: An Experimental and Reproducible Research Survey, , and , in: Face Recognition Across the Imaging Spectrum, Springer, 2016 |
|
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, , , and , in: IEEE Signal Processing Magazine, 2015 |
|
Palm Vein Database and Experimental Framework for Reproducible Research, and , in: IEEE International Conference of the Biometrics Special Interest Group, pages 1-7, 2015 |
[DOI] [URL] |
On the Vulnerability of Speaker Verification to Realistic Voice Spoofing, , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, pages 1-8, IEEE, 2015 |
[DOI] [URL] |
Periocular Biometrics in Mobile Environment, and , in: IEEE Seventh International Conference on Biometrics: Theory, Applications and Systems, Arlington, USA, pages 1-7, IEEE, 2015 |
[DOI] |
Gender Classification by LUT based boosting of Overlapping Block Patterns, , and , in: Scandinavian Conference on Image Analysis, pages 530-542, Springer International Publishing, 2015 |
[DOI] [URL] |
On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 319 - 325, 2015 |
[DOI] [URL] |
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, , , , , , , , , and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 513 - 518, 2015 |
[DOI] [URL] |
Scalable Probabilistic Models: Applied to Face Identification in the Wild, and , in: 8th European Biometrics Research and Industry Awards, European Association for Biometrics, Darmstadt, Germany, 2014 |
[URL] |
Cross-Database Evaluation With an Open Finger Vein Sensor, , , and , in: IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), Rome, Italy, pages 30-35, IEEE, 2014 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
On the Vulnerability of Finger Vein Recognition to Spoofing, , and , in: IEEE International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germay, pages 1 - 10, IEEE, 2014 |
|
Audio-Visual Gender Recognition in Uncontrolled Environment Using Variability Modeling Techniques, , and , in: International Joint Conference on Biometrics, Clearwater, Florida, USA, pages 1 - 8, IEEE, 2014 |
[DOI] [URL] |
Hierarchical speaker clustering methods for the NIST i-vector Challenge, , , and , in: Odyssey: The Speaker and Language Recognition Workshop, 2014 |
|
SPEAR: An open source toolbox for speaker recognition based on Bob, , and , in: Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 1655 - 1659, 2014 |
[DOI] [URL] |
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , in: Image and Vision Computing:1147-1160, 2014 |
[DOI] [URL] |
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , Idiap-RR-30-2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
The 2013 Speaker Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: The 6th IAPR International Conference on Biometrics, 2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
The 2013 Face Recognition Evaluation in Mobile Environment, , , , , , , , , , , , , , , , , , , , , , , , , , , and , Idiap-RR-36-2013 |
|
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |