595 Result(s)
-
Chapter
Face Detection
Face detection is the first step of most face-related applications such as face recognition, face tracking, facial expression recognition, facial landmarks detection, and so on.
-
Chapter
Face Recognition with Synthetic Data
In the last few years, face recognition has achieved extraordinary progress in a wide range of challenging problems including pose-robust face recognition [5, 24, 63], matching faces across ages [15, 17, 56, 60],...
-
Chapter and Conference Paper
Alpha Local Difference Loss Function for Deep Image Matting
In recent years, deep learning-based matting methods have received increasing attention due to their superior performance. The design of the loss function plays a important role in the performance of matting m...
-
Chapter and Conference Paper
Human Identification Using Tooth Based on PointNet++
Human identification using tooth plays a crucial role in disaster victim identification. Traditional tooth recognition methods like iterative closest point (ICP) require laborious pairwise registration, so in ...
-
Chapter and Conference Paper
Frame Correlation Knowledge Distillation for Gait Recognition in the Wild
Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...
-
Chapter and Conference Paper
Generative AI Enables the Detection of Autism Using EEG Signals
In disease detection, generative models for data augmentation offer a potential solution to the challenges posed by limited high-quality electroencephalogram (EEG) data. The study proposes a temporal-spatial f...
-
Chapter
Face Anti-spoofing Progress Driven by Academic Challenges
With the ubiquity of facial authentication systems and the prevalence of security cameras around the world, the impact that facial presentation attack techniques may have is huge. However, research progress in...
-
Chapter and Conference Paper
Less-than-One Shot 3D Segmentation Hijacking a Pre-trained Space-Time Memory Network
In this paper, we propose a semi-supervised setting for semantic segmentation of a whole volume from only a tiny portion of one slice annotated using a memory-aware network pre-trained on video object segmenta...
-
Chapter
Conclusions and Future Work
Through the release of three large-scale datasets and the successful holding of three competitions, we have promoted the development of the face anti-spoofing community. In this chapter, we will summarize our ...
-
Chapter and Conference Paper
Facial Adversarial Sample Augmentation for Robust Low-Quality 3D Face Recognition
Compared with traditional 3D face recognition tasks using high precision 3D face scans, 3D face recognition based on low-quality data captured by consumer depth cameras is more practicable for real-world appli...
-
Chapter and Conference Paper
Dynamic Graph-Guided Transferable Regression for Cross-Domain Speech Emotion Recognition
To deal with the problem of cross-domain speech emotion recognition (SER), in this paper, we propose a novel dynamic graph-guided transferable regression (DGTR) method. Specifically, a retargeted discriminant ...
-
Chapter and Conference Paper
Few-Shot Person Re-identification Based on Hybrid Pooling Fusion and Gaussian Relation Metric
In practical scenarios, person re-identification tasks often face the problem of insufficient available pedestrian images. In response to this problem, a few-shot person re-identification method based on hybri...
-
Chapter and Conference Paper
Multiple Temporal Aggregation Embedding for Gait Recognition in the Wild
Gait recognition in the wild is a cutting-edge topic in biometrics and computer vision. Since people is less cooperative in the wild scenario, view angles, walking direction and pace cannot be controlled. It l...
-
Chapter and Conference Paper
Finger Vein Recognition Based on Unsupervised Spiking Neural Network
At present, although the deep learning models represented by convolutional neural networks and Transformers have achieved promising recognition accuracies in finger vein (FV) recognition, there still remain so...
-
Chapter
Best Solutions Proposed in the Context of the Face Anti-spoofing Challenge Series
The PAD competitions we organized attracted more than 835 teams from home and abroad, most of them from the industry, which shows that the topic of face anti-spoofing is closely related to daily life, and ther...
-
Chapter
Review of Face Presentation Attack Detection Competitions
Face presentation attack detection (PAD) has received increasing attention ever since the vulnerabilities to spoofing have been widely recognized. The state of the art in unimodal and multi-modal face anti-spo...
-
Chapter
A One-class Model for Voice Replay Attack Detection
Replay attack poses a serious security concern for automatic speaker verification systems. Most of the existing replay detection methods cast the task to a binary classification problem. In this article, by an...
-
Chapter
Face Presentation Attack Detection (PAD) Challenges
In recent years, the security of face recognition systems has been increasingly threatened. Face Anti-spoofing (FAS) is essential to secure face recognition systems primarily from various attacks. In order to ...
-
Chapter
Performance Evaluation
In this chapter, we first report the results obtained by each team that has participated in the face anti-spoofing challenge series, including ablation study results when available. Then, we analyze the advant...
-
Chapter and Conference Paper
Gait Recognition with Various Data Modalities: A Review
Gait recognition aims to recognize one subject by the way she/he walks without alerting the subject, which has drawn increasing attention. Recently, gait recognition can be represented using various data modal...