Application-Oriented Retinal Image Models for Computer Vision. | 0 | 0.34 | 2020 |
Leveraging Shape, Reflectance And Albedo From Shading For Face Presentation Attack Detection | 1 | 0.35 | 2020 |
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection. | 3 | 0.39 | 2019 |
FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning. | 0 | 0.34 | 2019 |
Image Provenance Analysis at Scale. | 0 | 0.34 | 2018 |
Image Provenance Analysis at Scale. | 6 | 0.48 | 2018 |
U-Phylogeny: Undirected Provenance Graph Construction In The Wild | 2 | 0.36 | 2017 |
Spotting The Difference: Context Retrieval And Analysis For Improved Forgery Detection And Localization | 3 | 0.37 | 2017 |
Provenance Filtering For Multimedia Phylogeny | 2 | 0.36 | 2017 |
Deep Representations for Iris, Face, and Fingerprint Spoofing Detection | 31 | 0.83 | 2015 |
Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks | 23 | 0.72 | 2015 |
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes | 38 | 1.00 | 2015 |
Deep Representations for Iris, Face, and Fingerprint Spoofing Attack Detection. | 0 | 0.34 | 2014 |
Video-Based Face Spoofing Detection through Visual Rhythm Analysis | 21 | 0.79 | 2012 |