Filters








38 Hits in 4.8 sec

A Double Siamese Framework for Differential Morphing Attack Detection

Guido Borghi, Emanuele Pancisi, Matteo Ferrara, Davide Maltoni
2021 Sensors  
In this paper, we proposed a framework based on a double Siamese architecture to tackle the morphing attack detection task in the differential scenario, in which two images, a trusted live acquired image  ...  Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field.  ...  In this paper, we proposed an MAD framework based on a double Siamese architecture.  ... 
doi:10.3390/s21103466 pmid:34065699 fatcat:k73kt33emncvdj3wyp4f74ux6y

Face Morphing Attack Generation & Detection: A Comprehensive Survey

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2021 IEEE Transactions on Technology and Society  
The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community.  ...  Differential Morph Attack Detection and Single Image Morph Attack Detection [96] .  ...  Fig. 7 : 7 Example illustrating differential image-based morphing attack detection (D-MAD) in a passport control scenario B.  ... 
doi:10.1109/tts.2021.3066254 fatcat:iyo5a6ofefewthz2kmiioocyg4

2020 Index IEEE Transactions on Information Forensics and Security Vol. 15

2020 IEEE Transactions on Information Forensics and Security  
., +, TIFS 2020 2241-2252 Deep Face Representations for Differential Morphing Attack Detection.  ...  Alipour-Fanid, A., +, TIFS 2020 2346-2360 Demand side management Towards Differential Privacy-Based Online Double Auction for Smart Grid.  ... 
doi:10.1109/tifs.2021.3053735 fatcat:eforexmnczeqzdj3sc2j4yoige

Table of contents

2019 ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
: A NEW DATASET FOR SPOOFING ATTACK DETECTION IN ........................................ 2572 TELEPHONE CHANNEL Galina Lavrentyeva, Sergey Novoselov, STC-innovations, Russia; Marina Volkova, STC Ltd.,  ...  DIFFERENTIAL-GEOMETRIC APPROACH FOR GLOBALLY SOLVING ..................................... 2267 A NON-CONVEX, DISCONTINUOUS DEPTH ESTIMATION PROBLEM FOR PLENOPTIC CAMERA IMAGES Isaac Sledge, Naval Surface  ...  SPOKEN QUESTION ANSWERING BY ADVERSARIAL DOMAIN ADAPTATION Chia-Hsuan Lee, Yun-Nung Chen, Hung-Yi Lee, National Taiwan University, Taiwan HLT-P2.5: A HIERARCHICAL DECODING MODEL FOR SPOKEN LANGUAGE  ... 
doi:10.1109/icassp.2019.8682209 fatcat:fnau5zhouzf2feywojlbqwxuoe

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
2018 arXiv   pre-print
However, information security is a domain with unique requirements and challenges.  ...  We systematically reviewed 77 papers and presented them from a data-centric perspective.  ...  Menotti et al. propose a DL-based framework for detecting spoofed biometrics [91].  ... 
arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi

Privacy–Enhancing Face Biometrics: A Comprehensive Survey

Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc
2021 IEEE Transactions on Information Forensics and Security  
These efforts have resulted in a multitude of privacy-enhancing techniques that aim at addressing privacy risks originating from biometric systems and providing technological solutions for legislative  ...  For example, the ability to automatically extract age, gender, race, and health cues from biometric data has heightened concerns about privacy leakage.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ... 
doi:10.1109/tifs.2021.3096024 fatcat:z5kvij6g7vgx3b24narxdyp2py

Modulation of aggressive behaviour by fighting experience: mechanisms and contest outcomes

Yuying Hsu, Ryan L. Earley, Larry L. Wolf
2005 Biological Reviews  
We propose a simple additive model for this integration of multiple experiences into an individual's expected fighting ability.  ...  This review discusses evidence for, variations in, and consequences of such effects.  ...  Behavioural changes include a lowered probability of engaging in a contest or reacting with an attack after a loss and a greater probability of attacking after a win. (5) Contest outcome changes as a result  ... 
doi:10.1017/s146479310500686x pmid:16460581 fatcat:lc4omv6hnzatfahkppzrp3py6e

State of the Art of Audio- and Video-Based Solutions for AAL

Slavisa ALeksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Čartolovni, Pau Climent-Pérez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazım Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta (+27 others)
2022 Zenodo  
In addition, a single [...]  ...  The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action.  ...  The examples of attacks that may take place in the network layer are: the man-in-the-middle attack, the sniffing attack, the DoS/DDos attack, the hello flood attack, the wormhole attack, the Sybil attack  ... 
doi:10.5281/zenodo.6390708 fatcat:6qfwqd2v2rhe5iuu5zgz77ay4i

Poster Abstracts

2017 Integrative and Comparative Biology  
To remedy this issue, we used eDNA to estimate population biomass for the painted turtle (Chrysemys picta) as a model for endangered freshwater turtle species.  ...  This flexibility would be dependent on the tapering spanwise profile of the fluke, internal fiber direction, and its differential composition density.  ...  cognitive framework for learning biology.  ... 
doi:10.1093/icb/icx001 fatcat:tnwx27gpsjddjd4qvecg7ip5ma

Learning to see across Domains and Modalities [article]

Fabio Maria Carlucci
2019 arXiv   pre-print
Deep learning has raised hopes and expectations as a general solution for many applications; indeed it has proven effective, but it also showed a strong dependence on large quantities of data.  ...  Thus, developing techniques for transfer learning, in its broadest definition, is a crucial element towards the deployment of effective and accurate intelligent systems.  ...  Conclusions This section presented a framework for learning deep colorization mappings.  ... 
arXiv:1902.04992v1 fatcat:p54w7mzkavdedhy5d56hisdl7u

Book Reviews

Tim Behrend, Patrick Tuck, David Henley, Andrew Beatty, Sylvia Tiwon, Matthew Isaac Cohen, Victor T. King, James F. Warren, Laurence Husson, Mark R. Woodward, H.J.M. Claessen, Robert J. Foster (+38 others)
2000 Bijdragen tot de Taal-, Land- en Volkenkunde  
A special chapter on Islam, ethnicity and separatism emphasizes the double role of Islam as a belief system and as a focus of identity.  ...  economy, with its extraordinary profits and markers of differential status and prestige, forced the demand for additional labour up [...] .  ... 
doi:10.1163/22134379-90003831 fatcat:ujrcmnpuivavxeyebgcm5od76q

Poster Abstracts

2009 Integrative and Comparative Biology  
Parents defend their young by attacking intruders and mouthing their fry to move them to the nest site.  ...  Hence, the black goby provides a good model for investigating the neurogenetic basis for different mating phenotypes.  ...  Two hypotheses, the reproductive ground plan hypothesis (RGPH) and the double-repressor hypothesis (DRH), provide potential frameworks for explaining the role of vitellogenin in the regulation of honey  ... 
doi:10.1093/icb/icp003 fatcat:ogzq66svibfcjnht5szojhqk3q

Fabricating Freakery: The Display of Exceptional Bodies in Nineteenth-Century London

John Jacob Woolf
2016
The five agents explored in this thesis are Daniel Lambert (1770-1809), who displayed as a Fat Man; Chang and Eng, The Siamese Twins (1811-1874); Charles Stratton (1838-1883), a little person known as  ...  The hitherto entrenched historiographical dichotomy between the 'offstage' and 'onstage' life of a 'freak' is substituted for the claim of interdependency between performer and performance, reality and  ...  Acknowledgements 100 For the social context of madness see, for example, Michel Foucault, Madness and Civilization: A History of Insanity in the Age of Reason, trans. by Richard Howard (London: Routledge  ... 
doi:10.25602/gold.00018890 fatcat:lu3obvgnr5hgzkkbact376hdwi

OASIcs, Volume 70, LDK'19, Complete Volume [article]

Maria Eskevich, Gerard de Melo, Christian Fäth, John P. McCrae, Paul Buitelaar, Christian Chiarcos, Bettina Klimek, Milan Dojchinovski
2019
Acknowledgements We gratefully acknowledge the support of NVIDIA Corporation through a donation of GPUs that were used for this research.  ...  Guiseppe Cosenza for his collaboration on FDS knowledge acquisition. Acknowledgements We would like to thank the reviewers for helpful comments and insightful feedback.  ...  for a novel theoretical framework.  ... 
doi:10.4230/oasics.ldk.2019 fatcat:gdzvkfimsrd27jq6xuon4vafn4

Clarifying tetrapod embryogenesis, a physicist's point of view

V. Fleury
2009 European Physical Journal : Applied physics  
+e Liquid thin films 7 Transport by convection, without active feedback forces. 8 A long tradition of german embryology has established the word "bauplan" or "blueprint" for the body plans.  ...  For some, this word is dangerous because it gives the impression of an architect predetermining body shapes.  ...  Especially, the Siamese twins are generally a consequence of two embryos progressively fusing.  ... 
doi:10.1051/epjap/2009033 fatcat:6diqrr4k6vgazcvfooecmx235m
« Previous Showing results 1 — 15 out of 38 results