咨询与建议

限定检索结果

文献类型

  • 113 篇 期刊文献
  • 66 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 183 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 138 篇 计算机科学与技术...
    • 109 篇 电气工程
    • 22 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 仪器科学与技术
    • 9 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 48 篇 理学
    • 26 篇 生物学
    • 22 篇 物理学
    • 13 篇 化学
  • 25 篇 医学
    • 23 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 4 篇 法学
    • 4 篇 法学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 农学
    • 1 篇 水产

主题

  • 183 篇 presentation att...
  • 50 篇 biometrics
  • 34 篇 face recognition
  • 22 篇 anti-spoofing
  • 21 篇 spoofing
  • 17 篇 fingerprint
  • 16 篇 deep learning
  • 16 篇 liveness detecti...
  • 16 篇 feature extracti...
  • 12 篇 iris recognition
  • 9 篇 convolutional ne...
  • 7 篇 fingerprint reco...
  • 7 篇 face
  • 6 篇 automatic speake...
  • 6 篇 face anti-spoofi...
  • 6 篇 three-dimensiona...
  • 6 篇 optical coherenc...
  • 6 篇 databases
  • 6 篇 countermeasure
  • 6 篇 biometrics (acce...

机构

  • 7 篇 hsch darmstadt d...
  • 7 篇 hsch darmstadt d...
  • 5 篇 eurecom sophia a...
  • 4 篇 michigan state u...
  • 4 篇 idiap res inst c...
  • 4 篇 idiap res inst m...
  • 3 篇 north carolina a...
  • 3 篇 univ lorraine cn...
  • 3 篇 univ oulu ctr ma...
  • 3 篇 dongguk univ div...
  • 3 篇 eurecom biot
  • 3 篇 natl inst inform...
  • 3 篇 univ eastern fin...
  • 3 篇 hsch ansbach ans...
  • 3 篇 shenzhen univ co...
  • 3 篇 shenzhen inst ar...
  • 3 篇 hunan univ coll ...
  • 2 篇 hsch darmstadt d...
  • 2 篇 king saud univ c...
  • 2 篇 eurecom f-06410 ...

作者

  • 31 篇 busch christoph
  • 12 篇 evans nicholas
  • 12 篇 todisco massimil...
  • 11 篇 ramachandra ragh...
  • 11 篇 gomez-barrero ma...
  • 9 篇 marcel sebastien
  • 8 篇 nautsch andreas
  • 7 篇 yamagishi junich...
  • 7 篇 delgado hector
  • 7 篇 sanchez-reillo r...
  • 7 篇 sahidullah md
  • 7 篇 wang xin
  • 7 篇 kinnunen tomi
  • 6 篇 czajka adam
  • 6 篇 goicoechea-telle...
  • 6 篇 kolberg jascha
  • 5 篇 liu-jimenez judi...
  • 5 篇 bowyer kevin w.
  • 5 篇 park kang ryoung
  • 5 篇 peng fei

语言

  • 179 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
检索条件"主题词=Presentation Attack Detection"
183 条 记 录,以下是1-10 订阅
排序:
Improving Face presentation attack detection Through Deformable Convolution and Transfer Learning
收藏 引用
IEEE ACCESS 2025年 13卷 31228-31238页
作者: Muhammad Ibrahim, Shakeel Sohail Ibrahim, Muhammad Khan, Shujaat Ko, Young-Woong Lee, Jeong-Gun Hallym Univ Dept Comp Engn Chuncheon Si 24252 South Korea GEOMEXSOFT Co Ltd Chuncheon Si 24461 South Korea Kumoh Natl Inst Technol Dept Mech Syst Engn Gumi Si 39177 South Korea King Fahd Univ Petr & Minerals SDAIA KFUPM Joint Res Ctr Artificial Intelligence Dhahran 31261 Saudi Arabia King Fahd Univ Petr & Minerals Coll Comp & Math Dept Comp Engn Dhahran 31261 Saudi Arabia
Face presentation attack detection (PAD) is essential for ensuring the security and reliability of face recognition systems by preventing unauthorized access through spoofing attempts. attackers can exploit various me... 详细信息
来源: 评论
MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection
收藏 引用
COMPUTERS & SECURITY 2025年 148卷
作者: Rai, Anuj Dey, Somnath Patidar, Pradeep Rai, Prakhar Indian Inst Technol Indore Dept Comp Sci & Engn Indore 453552 Madhya Pradesh India
Automatic fingerprint recognition systems are the most extensively used systems for person authentication although they are vulnerable to presentation attacks. Artificial artifacts created with the help of various mat... 详细信息
来源: 评论
presentation attack detection for Iris Recognition: An Assessment of the State-of-the-Art
收藏 引用
ACM COMPUTING SURVEYS 2018年 第4期51卷 1–35页
作者: Czajka, Adam Bowyer, Kevin W. Res & Acad Comp Network NASK Kolska 12 PL-01045 Warsaw Poland Univ Notre Dame 384 Fitzpatrick Hall Notre Dame IN 46556 USA
Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on... 详细信息
来源: 评论
presentation attack detection for Face Recognition Using Light Field Camera
收藏 引用
IEEE TRANSACTIONS ON IMAGE PROCESSING 2015年 第3期24卷 1060-1075页
作者: Raghavendra, R. Raja, Kiran B. Busch, Christoph Gjovik Univ Coll Norwegian Biometr Lab N-2815 Gjovik Norway
The vulnerability of face recognition systems is a growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detecti... 详细信息
来源: 评论
presentation attack detection system for fake Iris: a review
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第10期80卷 15193-15214页
作者: Agarwal, Rohit Jalal, Anand Singh GLA Univ Dept Comp Engn & Applicat Mathura 281406 India
The real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric traits used for person identification.... 详细信息
来源: 评论
presentation attack detection based on score level fusion and challenge-response technique
收藏 引用
JOURNAL OF SUPERCOMPUTING 2021年 第5期77卷 4681-4697页
作者: Chou, Chao-Lung Natl Def Univ Chung Cheng Inst Technol Dept Comp Sci & Informat Engn Taoyuan Taoyuan County Taiwan
Biometrics is the state of the art in dealing with identity identification and verification based on the physical and behavioral characteristics and widely used in the fields of Fintech, such as mobile payment and onl... 详细信息
来源: 评论
presentation attack detection and biometric recognition in a challenge-response formalism
收藏 引用
EURASIP JOURNAL ON INFORMATION SECURITY 2022年 第1期2022卷 1-15页
作者: Haasnoot, Erwin Spreeuwers, Luuk J. Veldhuis, Raymond N. J. Univ Twente Fac EEMCS Data Sci Grp Enschede Netherlands
presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong... 详细信息
来源: 评论
presentation attack detection for Smartphone Based Fingerphoto Recognition Using Second Order Local Structures  14
Presentation Attack Detection for Smartphone Based Fingerpho...
收藏 引用
14th International Conference on Signal Image Technology & Internet Based Systems (SITIS)
作者: Wasnik, Pankaj Ramachandra, Raghavendra Raja, Kiran Busch, Christoph NTNU Norwegian Biometr Lab Gjovik Norway
Fingerprint recognition on smartphone provides a good alternative over traditional security measures such as lock patterns and pin. However, such fingerprint systems have some inherent problems such as the fact that u... 详细信息
来源: 评论
presentation attack detection for Mobile Device-Based Iris Recognition
Presentation Attack Detection for Mobile Device-Based Iris R...
收藏 引用
11th International Image Processing and Communications Conference (IP and C)
作者: Bartuzi, Ewelina Trokielewicz, Mateusz Res & Acad Comp Network NASK Kolska 12 PL-01045 Warsaw Poland
Apart from ensuring high recognition accuracy, one of the main challenges associated with mobile iris recognition is reliable presentation attack detection (PAD). This paper proposes a method of detecting presentation... 详细信息
来源: 评论
presentation attack detection in Face Biometric Systems Using Raw Sensor Data from Smartphones  12
Presentation Attack Detection in Face Biometric Systems Usin...
收藏 引用
12th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS)
作者: Wasnik, Pankaj Raja, Kiran B. Raghavendra, R. Busch, Christoph NTNU Gjovik Norwegian Biometr Lab Gjovik Norway
Applicability of the face recognition for smartphone-based authentication applications is increasing for different domains such as banking and e-commerce. The unsupervised data capture of face characteristics in biome... 详细信息
来源: 评论