We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity

    The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As...

    Alexandra Giannopoulou in Digital Society
    Article Open access 11 May 2023
  2. The identity-level angular triplet loss for cross-age face recognition

    Despite promising progress has been achieved on face recognition problems, cross-age face recognition remains a challenging task due to its age...

    **aoyu Chen, Henry Y. K. Lau in Applied Intelligence
    Article 07 September 2021
  3. Hairstyle-and-identity-aware facial image style transfer with region-guiding masks

    Face style transfer aims to transfer parts of appearance features from a reference to a source face and to keep the important characteristics of the...

    Hsin-Ying Wang, Chiu-Wei Chien, ... I-Chen Lin in Multimedia Tools and Applications
    Article 15 November 2023
  4. Joint reconstruction and deidentification for mobile identity anonymization

    The growing use of deep learning methods in various applications has raised concerns about privacy, as these methods heavily rely on large-scale...

    Hyeongbok Kim, Lingling Zhao, ... ** Suk Lee in Multimedia Tools and Applications
    Article 05 October 2023
  5. Facial mask attention network for identity-aware face super-resolution

    Face Super-Resolution (FSR) is a crucial research topic in image restoration field, which is a fundamental task for subsequent face applications,...

    Zhengzheng Sun, Lianfang Tian, ... Zhaolin Wang in Neural Computing and Applications
    Article 13 December 2022
  6. Identity-Preserving Adversarial Training for Robust Network Embedding

    Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g.,...

    Ke-Ting Cen, Hua-Wei Shen, ... Xue-Qi Cheng in Journal of Computer Science and Technology
    Article 30 January 2024
  7. Semantic-aware deidentification generative adversarial networks for identity anonymization

    Privacy protection in the computer vision field has attracted increasing attention. Generative adversarial network-based methods have been explored...

    Hyeongbok Kim, Zhiqi Pang, ... ** Suk Lee in Multimedia Tools and Applications
    Article Open access 07 October 2022
  8. RA Loss: Relation-Aware Loss for Robust Person Re-identification

    Previous relation-based losses in person re-identification (ReID) typically comprise two sequential steps: they firstly sample both positive pair and...
    Kan Wang, Shu** Hu, ... Huan Tan in Computer Vision – ACCV 2022
    Conference paper 2023
  9. High similarity controllable face anonymization based on dynamic identity perception

    In the meta-universe scenario, with the development of personalized social networks, interactive behaviors such as uploading and sharing personal and...

    Jiayi Xu, Xuan Tan, ... Shanqing Zhang in The Visual Computer
    Article 18 June 2024
  10. Age-invariant face recognition based on identity-age shared features

    Decoupling the mixed face features to obtain identity features that are not disturbed by age information is the key to achieving cross-age face...

    Zikang Zhang, Songfeng Yin, Liangcai Cao in The Visual Computer
    Article 08 October 2023
  11. MMUIL: enhancing multi-platform user identity linkage with multi-information

    User identity linkage (UIL) aims to link identities belonging to the same individual across various platforms. While numerous methods have been...

    Qian Zhou, Yihan Hei, ... Lei Zhao in Knowledge and Information Systems
    Article 28 March 2024
  12. Self-Sovereign Identity Model: Ethics and Legal Principles

    The emergence of Self-Sovereign Identity (SSI) as a new digital identity paradigm has gained significant attention due to its potential to...

    Luca Mattei, Francesca Morpurgo, ... Tetiana Vasylieva in Digital Society
    Article 07 June 2024
  13. Decentralized Digital Identity

    The importance of secure and private identity management cannot be overstated. Identity data breaches have had far-reaching consequences, impacting...
    Shivakumar R. Goniwada in Introduction to One Digital Identity
    Chapter 2024
  14. Manipulable, reversible and diversified de-identification via face identity disentanglement

    Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...

    Di **ao, **gdong **a, ... Maolan Zhang in Multimedia Tools and Applications
    Article 19 February 2024
  15. Time Loss Aversion

    The present paper introduces “Time Loss Aversion” - people’s tendency to fear previous misallocations of time, which then motivates people to change...
    Conference paper 2023
  16. IPFR: Identity-Preserving Face Reenactment with Enhanced Domain Adversarial Training and Multi-level Identity Priors

    In the face reenactment task, identity preservation is challenging due to the leakage of driving identity and the complexity of source identity. In...
    Lei Zhu, Ge Li, ... Thomas H. Li in Pattern Recognition and Computer Vision
    Conference paper 2024
  17. L3AM: Linear Adaptive Additive Angular Margin Loss for Video-Based Hand Gesture Authentication

    Feature extractors significantly impact the performance of biometric systems. In the field of hand gesture authentication, existing studies focus on...

    Wenwei Song, Wenxiong Kang, ... Yitao Qiao in International Journal of Computer Vision
    Article 06 May 2024
  18. Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks

    The Internet of Things (IoT) devices spawn growing diverse social platforms and online data at the network edge, propelling the development of...

    Rui Huang, Tinghuai Ma, ... Tao Du in Journal of Cloud Computing
    Article Open access 21 May 2024
  19. Evolving Identity Security Threats

    By executing well on the preceding steps, you will address most of your identity security needs, eliminate or mitigate many identity attack vectors,...
    Morey J. Haber, Darran Rolls in Identity Attack Vectors
    Chapter 2024
  20. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
Did you find what you were looking for? Share feedback.