A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Double Siamese Framework for Differential Morphing Attack Detection
2021
Sensors
In this paper, we proposed a framework based on a double Siamese architecture to tackle the morphing attack detection task in the differential scenario, in which two images, a trusted live acquired image ...
Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field. ...
In this paper, we proposed an MAD framework based on a double Siamese architecture. ...
doi:10.3390/s21103466
pmid:34065699
fatcat:k73kt33emncvdj3wyp4f74ux6y
Face Morphing Attack Generation & Detection: A Comprehensive Survey
2021
IEEE Transactions on Technology and Society
The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community. ...
Differential Morph Attack Detection and Single Image Morph Attack Detection [96] . ...
Fig. 7 : 7 Example illustrating differential image-based morphing attack detection (D-MAD) in a passport control scenario B. ...
doi:10.1109/tts.2021.3066254
fatcat:iyo5a6ofefewthz2kmiioocyg4
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15
2020
IEEE Transactions on Information Forensics and Security
., +, TIFS 2020
2241-2252
Deep Face Representations for Differential Morphing Attack Detection. ...
Alipour-Fanid, A., +, TIFS
2020 2346-2360
Demand side management
Towards Differential Privacy-Based Online Double Auction for Smart Grid. ...
doi:10.1109/tifs.2021.3053735
fatcat:eforexmnczeqzdj3sc2j4yoige
Table of contents
2019
ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
: A NEW DATASET FOR SPOOFING ATTACK DETECTION IN ........................................ 2572 TELEPHONE CHANNEL Galina Lavrentyeva, Sergey Novoselov, STC-innovations, Russia; Marina Volkova, STC Ltd., ...
DIFFERENTIAL-GEOMETRIC APPROACH FOR GLOBALLY SOLVING ..................................... 2267 A NON-CONVEX, DISCONTINUOUS DEPTH ESTIMATION PROBLEM FOR PLENOPTIC CAMERA IMAGES Isaac Sledge, Naval Surface ...
SPOKEN QUESTION ANSWERING BY ADVERSARIAL DOMAIN ADAPTATION
Chia-Hsuan Lee, Yun-Nung Chen, Hung-Yi Lee, National Taiwan University, Taiwan
HLT-P2.5: A HIERARCHICAL DECODING MODEL FOR SPOKEN LANGUAGE ...
doi:10.1109/icassp.2019.8682209
fatcat:fnau5zhouzf2feywojlbqwxuoe
Deep Learning in Information Security
[article]
2018
arXiv
pre-print
However, information security is a domain with unique requirements and challenges. ...
We systematically reviewed 77 papers and presented them from a data-centric perspective. ...
Menotti et al. propose a DL-based framework for detecting spoofed biometrics [91]. ...
arXiv:1809.04332v1
fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi
Privacy–Enhancing Face Biometrics: A Comprehensive Survey
2021
IEEE Transactions on Information Forensics and Security
These efforts have resulted in a multitude of privacy-enhancing techniques that aim at addressing privacy risks originating from biometric systems and providing technological solutions for legislative ...
For example, the ability to automatically extract age, gender, race, and health cues from biometric data has heightened concerns about privacy leakage. ...
For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited. ...
doi:10.1109/tifs.2021.3096024
fatcat:z5kvij6g7vgx3b24narxdyp2py
Modulation of aggressive behaviour by fighting experience: mechanisms and contest outcomes
2005
Biological Reviews
We propose a simple additive model for this integration of multiple experiences into an individual's expected fighting ability. ...
This review discusses evidence for, variations in, and consequences of such effects. ...
Behavioural changes include a lowered probability of engaging in a contest or reacting with an attack after a loss and a greater probability of attacking after a win. (5) Contest outcome changes as a result ...
doi:10.1017/s146479310500686x
pmid:16460581
fatcat:lc4omv6hnzatfahkppzrp3py6e
State of the Art of Audio- and Video-Based Solutions for AAL
2022
Zenodo
In addition, a single [...] ...
The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. ...
The examples of attacks that may take place in the network layer are: the man-in-the-middle attack, the sniffing attack, the DoS/DDos attack, the hello flood attack, the wormhole attack, the Sybil attack ...
doi:10.5281/zenodo.6390708
fatcat:6qfwqd2v2rhe5iuu5zgz77ay4i
Poster Abstracts
2017
Integrative and Comparative Biology
To remedy this issue, we used eDNA to estimate population biomass for the painted turtle (Chrysemys picta) as a model for endangered freshwater turtle species. ...
This flexibility would be dependent on the tapering spanwise profile of the fluke, internal fiber direction, and its differential composition density. ...
cognitive framework for learning biology. ...
doi:10.1093/icb/icx001
fatcat:tnwx27gpsjddjd4qvecg7ip5ma
Learning to see across Domains and Modalities
[article]
2019
arXiv
pre-print
Deep learning has raised hopes and expectations as a general solution for many applications; indeed it has proven effective, but it also showed a strong dependence on large quantities of data. ...
Thus, developing techniques for transfer learning, in its broadest definition, is a crucial element towards the deployment of effective and accurate intelligent systems. ...
Conclusions This section presented a framework for learning deep colorization mappings. ...
arXiv:1902.04992v1
fatcat:p54w7mzkavdedhy5d56hisdl7u
Book Reviews
2000
Bijdragen tot de Taal-, Land- en Volkenkunde
A special chapter on Islam, ethnicity and separatism emphasizes the double role of Islam as a belief system and as a focus of identity. ...
economy, with its extraordinary profits and markers of differential status and prestige, forced the demand for additional labour up [...] . ...
doi:10.1163/22134379-90003831
fatcat:ujrcmnpuivavxeyebgcm5od76q
Poster Abstracts
2009
Integrative and Comparative Biology
Parents defend their young by attacking intruders and mouthing their fry to move them to the nest site. ...
Hence, the black goby provides a good model for investigating the neurogenetic basis for different mating phenotypes. ...
Two hypotheses, the reproductive ground plan hypothesis (RGPH) and the double-repressor hypothesis (DRH), provide potential frameworks for explaining the role of vitellogenin in the regulation of honey ...
doi:10.1093/icb/icp003
fatcat:ogzq66svibfcjnht5szojhqk3q
Fabricating Freakery: The Display of Exceptional Bodies in Nineteenth-Century London
2016
The five agents explored in this thesis are Daniel Lambert (1770-1809), who displayed as a Fat Man; Chang and Eng, The Siamese Twins (1811-1874); Charles Stratton (1838-1883), a little person known as ...
The hitherto entrenched historiographical dichotomy between the 'offstage' and 'onstage' life of a 'freak' is substituted for the claim of interdependency between performer and performance, reality and ...
Acknowledgements 100 For the social context of madness see, for example, Michel Foucault, Madness and Civilization: A History of Insanity in the Age of Reason, trans. by Richard Howard (London: Routledge ...
doi:10.25602/gold.00018890
fatcat:lu3obvgnr5hgzkkbact376hdwi
OASIcs, Volume 70, LDK'19, Complete Volume
[article]
2019
Acknowledgements We gratefully acknowledge the support of NVIDIA Corporation through a donation of GPUs that were used for this research. ...
Guiseppe Cosenza for his collaboration on FDS knowledge acquisition.
Acknowledgements We would like to thank the reviewers for helpful comments and insightful feedback. ...
for a novel theoretical framework. ...
doi:10.4230/oasics.ldk.2019
fatcat:gdzvkfimsrd27jq6xuon4vafn4
Clarifying tetrapod embryogenesis, a physicist's point of view
2009
European Physical Journal : Applied physics
+e Liquid thin films 7 Transport by convection, without active feedback forces. 8 A long tradition of german embryology has established the word "bauplan" or "blueprint" for the body plans. ...
For some, this word is dangerous because it gives the impression of an architect predetermining body shapes. ...
Especially, the Siamese twins are generally a consequence of two embryos progressively fusing. ...
doi:10.1051/epjap/2009033
fatcat:6diqrr4k6vgazcvfooecmx235m
« Previous
Showing results 1 — 15 out of 38 results