4.7 Article

Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing

Rizhao Cai et al.

Summary: Inspired by human philosophy, a novel framework based on CNN and RNN is proposed for face anti-spoofing, leveraging deep reinforcement learning to explore spoofing-related information from image sub-patches. By sequentially learning local representations with an RNN and fusing them with global information, the method achieves state-of-the-art performance in various scenarios, as demonstrated by extensive experiments.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks

Anjith George et al.

Summary: Face recognition is widely used but vulnerable to presentation attacks. This study proposes a new PAD framework using MCCNN and one-class classifier. The novel approach learns a robust PAD system by focusing on bonafide and known attack classes, showing superior performance in unseen attack protocols.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Dynamic Face Video Segmentation via Reinforcement Learning

Yujiang Wang et al.

2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Predicting Goal-directed Human Attention Using Inverse Reinforcement Learning

Zhibo Yang et al.

2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2020)

Article Computer Science, Theory & Methods

Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection

Haonan Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network

Anjith George et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection

Allan Pinto et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Replayed Video Attack Detection Based on Motion Blur Analysis

Lei Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Proceedings Paper Computer Science, Artificial Intelligence

SME-Net: Sparse Motion Estimation for Parametric Video Prediction through Reinforcement Learning

Yung-Han Ho et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Multi-adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection

Rui Shao et al.

2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Automatic Face Aging in Videos via Deep Reinforcement Learning

Chi Nhan Duong et al.

2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Face Anti-Spoofing: Model Matters, So Does Data

Xiao Yang et al.

2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019) (2019)

Article Computer Science, Theory & Methods

A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning

Liang Xiao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Review Computer Science, Theory & Methods

Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further

Alireza Sepas-Moghaddam et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Face Liveness Detection Using a Flash Against 2D Spoofing Attack

Patrick P. K. Chan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection

Xiaochao Zhao et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision

Yaojie Liu et al.

2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2018)

Article Engineering, Electrical & Electronic

Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding

Zinelabidine Boulkenafet et al.

IEEE SIGNAL PROCESSING LETTERS (2017)

Article Engineering, Electrical & Electronic

Deep Reinforcement Learning A brief survey

Kai Arulkumaran et al.

IEEE SIGNAL PROCESSING MAGAZINE (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Attention-Aware Face Hallucination via Deep Reinforcement Learning

Qingxing Cao et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Article Computer Science, Theory & Methods

Face Spoofing Detection Using Colour Texture Analysis

Zinelabidine Boulkenafet et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Secure Face Unlock: Spoof Detection on Smartphones

Keyurkumar Patel et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Multidisciplinary Sciences

Mastering the game of Go with deep neural networks and tree search

David Silver et al.

NATURE (2016)

Proceedings Paper Computer Science, Artificial Intelligence

3D Mask Face Anti-spoofing with Remote Photoplethysmography

Siqi Liu et al.

COMPUTER VISION - ECCV 2016, PT VII (2016)

Article Computer Science, Artificial Intelligence

Face Liveness Detection From a Single Image via Diffusion Speed Model

Wonjun Kim et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Artificial Intelligence

Presentation Attack Detection for Face Recognition Using Light Field Camera

R. Raghavendra et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Artificial Intelligence

Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes

Allan Pinto et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Theory & Methods

On the Use of Client Identity Information for Face Antispoofing

Ivana Chingovska et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks

Allan Pinto et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Person-Specific Face Antispoofing With Subject Domain Adaptation

Jianwei Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Face Spoofing Detection Based on Multiple Descriptor Fusion Using Multiscale Dynamic Binarized Statistical Image Features

Shervin Rahimzadeh Arashloo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Face-Spoofing 2D-Detection Based on Moire-Pattern Analysis

Diogo Caetano Garcia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

David Menotti et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Multidisciplinary Sciences

Human-level control through deep reinforcement learning

Volodymyr Mnih et al.

NATURE (2015)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Computationally Efficient Face Spoofing Detection with Motion Magnification

Samarth Bharadwaj et al.

2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2013)