Loading…
Loading…
Loading…
Loading…
Client-specific anomaly detection for face presentation attack detection
Fatemifar, Soroush, Arashloo, Shervin Rahimzadeh, Awais, Muhammad, Kittler, Josef
Published in Pattern recognition (01.04.2021)
Published in Pattern recognition (01.04.2021)
Get full text
Journal Article
Loading…
Loading…
Presentation Attack Detection for Face Recognition Using Light Field Camera
Raghavendra, R., Raja, Kiran B., Busch, Christoph
Published in IEEE transactions on image processing (01.03.2015)
Published in IEEE transactions on image processing (01.03.2015)
Get full text
Journal Article
Loading…
Zero-day attack detection: a systematic literature review
Ahmad, Rasheed, Alsmadi, Izzat, Alhamdani, Wasim, Tawalbeh, Lo’ai
Published in The Artificial intelligence review (01.10.2023)
Published in The Artificial intelligence review (01.10.2023)
Get full text
Journal Article
Loading…
Loading…
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
Raja, Kiran, Ferrara, Matteo, Franco, Annalisa, Spreeuwers, Luuk, Batskos, Ilias, de Wit, Florens, Gomez-Barrero, Marta, Scherhag, Ulrich, Fischer, Daniel, Venkatesh, Sushma Krupa, Singh, Jag Mohan, Li, Guoqiang, Bergeron, Loic, Isadskiy, Sergey, Ramachandra, Raghavendra, Rathgeb, Christian, Frings, Dinusha, Seidel, Uwe, Knopjes, Fons, Veldhuis, Raymond, Maltoni, Davide, Busch, Christoph
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Loading…
Contrastive Context-Aware Learning for 3D High-Fidelity Mask Face Presentation Attack Detection
Liu, Ajian, Zhao, Chenxu, Yu, Zitong, Wan, Jun, Su, Anyang, Liu, Xing, Tan, Zichang, Escalera, Sergio, Xing, Junliang, Liang, Yanyan, Guo, Guodong, Lei, Zhen, Li, Stan Z., Zhang, Du
Published in IEEE transactions on information forensics and security (2022)
Published in IEEE transactions on information forensics and security (2022)
Get full text
Journal Article
Loading…
Resource-Efficient and Resilient SOC/SOH Co-Monitoring of EV Batteries With Attack Detection
Xiao, Shunyuan, Ding, Lei, Ye, Maojiao, Yue, Dong, Ge, Hui
Published in IEEE transactions on smart grid (01.05.2025)
Published in IEEE transactions on smart grid (01.05.2025)
Get full text
Journal Article
Loading…
Real masks and spoof faces: On the masked face presentation attack detection
Fang, Meiling, Damer, Naser, Kirchbuchner, Florian, Kuijper, Arjan
Published in Pattern recognition (01.03.2022)
Published in Pattern recognition (01.03.2022)
Get full text
Journal Article
Loading…
Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning
Wang, Guoqing, Han, Hu, Shan, Shiguang, Chen, Xilin
Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (01.06.2020)
Published in Proceedings (IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Online) (01.06.2020)
Get full text
Conference Proceeding
Loading…
Encryption-Based Attack Detection Scheme for Multisensor Secure Fusion Estimation
Li, Tongxiang, Weng, Pindi, Chen, Bo, Zhang, Dongping, Yu, Li
Published in IEEE transactions on aerospace and electronic systems (01.10.2024)
Published in IEEE transactions on aerospace and electronic systems (01.10.2024)
Get full text
Journal Article
Loading…
Loading…
Towards generalized morphing attack detection by learning residuals
Raja, Kiran, Gupta, Gourav, Venkatesh, Sushma, Ramachandra, Raghavendra, Busch, Christoph
Published in Image and vision computing (01.10.2022)
Published in Image and vision computing (01.10.2022)
Get full text
Journal Article
Loading…
Loading…
Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
Ding, Derui, Han, Qing-Long, Wang, Zidong, Ge, Xiaohua
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2021)
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2021)
Get full text
Journal Article
Loading…
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information
Fang, Zhaoyuan, Czajka, Adam, Bowyer, Kevin W.
Published in IEEE transactions on information forensics and security (01.01.2021)
Published in IEEE transactions on information forensics and security (01.01.2021)
Get full text
Journal Article
Loading…
Attack Detection Based on Encoding-Decoding Approach for Cyber-Physical Systems
Ren, Gaofeng, Liu, Hao, Zhang, Yewei, Li, Yuzhe
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2023)
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.10.2023)
Get full text
Journal Article