Search
Search Results
-
Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity
The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As...
-
The identity-level angular triplet loss for cross-age face recognition
Despite promising progress has been achieved on face recognition problems, cross-age face recognition remains a challenging task due to its age...
-
Hairstyle-and-identity-aware facial image style transfer with region-guiding masks
Face style transfer aims to transfer parts of appearance features from a reference to a source face and to keep the important characteristics of the...
-
Joint reconstruction and deidentification for mobile identity anonymization
The growing use of deep learning methods in various applications has raised concerns about privacy, as these methods heavily rely on large-scale...
-
Facial mask attention network for identity-aware face super-resolution
Face Super-Resolution (FSR) is a crucial research topic in image restoration field, which is a fundamental task for subsequent face applications,...
-
Identity-Preserving Adversarial Training for Robust Network Embedding
Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g.,...
-
Semantic-aware deidentification generative adversarial networks for identity anonymization
Privacy protection in the computer vision field has attracted increasing attention. Generative adversarial network-based methods have been explored...
-
RA Loss: Relation-Aware Loss for Robust Person Re-identification
Previous relation-based losses in person re-identification (ReID) typically comprise two sequential steps: they firstly sample both positive pair and... -
High similarity controllable face anonymization based on dynamic identity perception
In the meta-universe scenario, with the development of personalized social networks, interactive behaviors such as uploading and sharing personal and...
-
Age-invariant face recognition based on identity-age shared features
Decoupling the mixed face features to obtain identity features that are not disturbed by age information is the key to achieving cross-age face...
-
MMUIL: enhancing multi-platform user identity linkage with multi-information
User identity linkage (UIL) aims to link identities belonging to the same individual across various platforms. While numerous methods have been...
-
Self-Sovereign Identity Model: Ethics and Legal Principles
The emergence of Self-Sovereign Identity (SSI) as a new digital identity paradigm has gained significant attention due to its potential to...
-
Decentralized Digital Identity
The importance of secure and private identity management cannot be overstated. Identity data breaches have had far-reaching consequences, impacting... -
Manipulable, reversible and diversified de-identification via face identity disentanglement
Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...
-
Time Loss Aversion
The present paper introduces “Time Loss Aversion” - people’s tendency to fear previous misallocations of time, which then motivates people to change... -
IPFR: Identity-Preserving Face Reenactment with Enhanced Domain Adversarial Training and Multi-level Identity Priors
In the face reenactment task, identity preservation is challenging due to the leakage of driving identity and the complexity of source identity. In... -
L3AM: Linear Adaptive Additive Angular Margin Loss for Video-Based Hand Gesture Authentication
Feature extractors significantly impact the performance of biometric systems. In the field of hand gesture authentication, existing studies focus on...
-
Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks
The Internet of Things (IoT) devices spawn growing diverse social platforms and online data at the network edge, propelling the development of...
-
Evolving Identity Security Threats
By executing well on the preceding steps, you will address most of your identity security needs, eliminate or mitigate many identity attack vectors,... -
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...