咨询与建议

限定检索结果

文献类型

  • 113 篇 期刊文献
  • 66 篇 会议
  • 4 篇 学位论文

馆藏范围

  • 183 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 174 篇 工学
    • 138 篇 计算机科学与技术...
    • 109 篇 电气工程
    • 22 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 仪器科学与技术
    • 9 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 48 篇 理学
    • 26 篇 生物学
    • 22 篇 物理学
    • 13 篇 化学
  • 25 篇 医学
    • 23 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 4 篇 法学
    • 4 篇 法学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 1 篇 农学
    • 1 篇 水产

主题

  • 183 篇 presentation att...
  • 50 篇 biometrics
  • 34 篇 face recognition
  • 22 篇 anti-spoofing
  • 21 篇 spoofing
  • 17 篇 fingerprint
  • 16 篇 deep learning
  • 16 篇 liveness detecti...
  • 16 篇 feature extracti...
  • 12 篇 iris recognition
  • 9 篇 convolutional ne...
  • 7 篇 fingerprint reco...
  • 7 篇 face
  • 6 篇 automatic speake...
  • 6 篇 face anti-spoofi...
  • 6 篇 three-dimensiona...
  • 6 篇 optical coherenc...
  • 6 篇 databases
  • 6 篇 countermeasure
  • 6 篇 biometrics (acce...

机构

  • 7 篇 hsch darmstadt d...
  • 7 篇 hsch darmstadt d...
  • 5 篇 eurecom sophia a...
  • 4 篇 michigan state u...
  • 4 篇 idiap res inst c...
  • 4 篇 idiap res inst m...
  • 3 篇 north carolina a...
  • 3 篇 univ lorraine cn...
  • 3 篇 univ oulu ctr ma...
  • 3 篇 dongguk univ div...
  • 3 篇 eurecom biot
  • 3 篇 natl inst inform...
  • 3 篇 univ eastern fin...
  • 3 篇 hsch ansbach ans...
  • 3 篇 shenzhen univ co...
  • 3 篇 shenzhen inst ar...
  • 3 篇 hunan univ coll ...
  • 2 篇 hsch darmstadt d...
  • 2 篇 king saud univ c...
  • 2 篇 eurecom f-06410 ...

作者

  • 31 篇 busch christoph
  • 12 篇 evans nicholas
  • 12 篇 todisco massimil...
  • 11 篇 ramachandra ragh...
  • 11 篇 gomez-barrero ma...
  • 9 篇 marcel sebastien
  • 8 篇 nautsch andreas
  • 7 篇 yamagishi junich...
  • 7 篇 delgado hector
  • 7 篇 sanchez-reillo r...
  • 7 篇 sahidullah md
  • 7 篇 wang xin
  • 7 篇 kinnunen tomi
  • 6 篇 czajka adam
  • 6 篇 goicoechea-telle...
  • 6 篇 kolberg jascha
  • 5 篇 liu-jimenez judi...
  • 5 篇 bowyer kevin w.
  • 5 篇 park kang ryoung
  • 5 篇 peng fei

语言

  • 179 篇 英文
  • 3 篇 其他
  • 1 篇 俄文
检索条件"主题词=Presentation Attack Detection"
183 条 记 录,以下是41-50 订阅
排序:
presentation attack detection on Limited-Resource Devices Using Deep Neural Classifiers Trained on Consistent Spectrogram Fragments
收藏 引用
SENSORS 2021年 第22期21卷 7728页
作者: Kubicki, Kacper Kapusta, Pawel Slot, Krzysztof Lodz Univ Technol Inst Appl Comp Sci Stefanowskiego 18-22 PL-90001 Lodz Poland
The presented paper is concerned with detection of presentation attacks against unsupervised remote biometric speaker verification, using a well-known challenge-response scheme. We propose a novel approach to convolut... 详细信息
来源: 评论
presentation attack detection based on two-stream vision transformers with self-attention fusion
收藏 引用
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REpresentation 2022年 85卷
作者: Peng, Fei Meng, Shao-hua Long, Min Hunan Univ Sch Comp Sci & Elect Engn Changsha 410082 Peoples R China Changsha Univ Sci & Technol Sch Comp & Commun Engn Changsha 410114 Peoples R China
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two compl... 详细信息
来源: 评论
Prototype-Guided Autoencoder for OCT-Based Fingerprint presentation attack detection
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 3461-3475页
作者: Liu, Yi-Peng Zuo, Wangyang Liang, Ronghua Sun, Haohao Li, Zhanqing Zhejiang Univ Technol Coll Comp Sci & Technol Hangzhou 310023 Peoples R China
Anti-spoofing ability is vital for fingerprint identification systems. Conventional fingerprint scanning devices can only obtain information from the fingertip surfaces, and their performance is susceptible to skin co... 详细信息
来源: 评论
Audio-Visual Biometric Recognition and presentation attack detection: A Comprehensive Survey
收藏 引用
IEEE ACCESS 2021年 9卷 37431-37455页
作者: Mandalapu, Hareesh Reddy, Aravinda P. N. Ramachandra, Raghavendra Rao, Krothapalli Sreenivasa Mitra, Pabitra Prasanna, S. R. Mahadeva Busch, Christoph Norwegian Univ Sci & Technol NTNU Dept Informat Secur & Commun Technol N-2815 Gjovik Norway Indian Inst Technol Kharagpur Adv Technol Dev Ctr Kharagpur 721302 W Bengal India Indian Inst Technol Kharagpur Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Indian Inst Technol Dharwad Dept Elect Engn Dharwad 580011 Karnataka India
Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. Amidst the classically used biometrics, voice and face attributes are the ... 详细信息
来源: 评论
Fully supervised contrastive learning in latent space for face presentation attack detection
收藏 引用
APPLIED INTELLIGENCE 2023年 第19期53卷 21770-21787页
作者: Alassafi, Madini O. Ibrahim, Muhammad Sohail Naseem, Imran AlGhamdi, Rayed Alotaibi, Reem Kateb, Faris A. Oqaibi, Hadi Mohsen Alshdadi, Abdulrahman A. Yusuf, Syed Adnan King Abdulaziz Univ Fac Comp & Informat Technol Jeddah Saudi Arabia Zhejiang Univ Coll Elect Engn Hangzhou Peoples R China Love Data Res & Dev Karachi Pakistan Univ Western Australia Sch Elect Elect & Comp Engn Perth Australia Karachi Inst Econ & Technol Coll Engn Karachi Pakistan Univ Jeddah Coll Comp Sci & Engn Dept Informat Syst & Technol Jeddah Saudi Arabia Intelex Pvt Ltd Res & Innovat Dept Southampton England
The vulnerability of conventional face recognition systems to face presentation or face spoofing attacks has attracted a great deal of attention from information security, forensic, and biometric communities during th... 详细信息
来源: 评论
Quality Matters: Boosting Face presentation attack detection With Image Quality Metrics
收藏 引用
IEEE ACCESS 2024年 12卷 94654-94672页
作者: Liu, Xinwei Wang, Renfang Liu, Wen Zhang, Liangbin Wang, Xiaoxia Zhejiang Wanli Univ Coll Big Data & Software Engn Dept Comp Sci Ningbo 315104 Peoples R China Zhejiang Wanli Univ Coll Informat & Intelligent Engn Ningbo 315104 Peoples R China Zhejiang Wanli Univ ZWU Lib & Learning Resource Ctr Ningbo 315104 Zhejiang Peoples R China
Face presentation attack detection (PAD) is critical for enhancing the security of facial recognition systems against sophisticated attacks. This study explores the use of general Image Quality Assessment (IQA) method... 详细信息
来源: 评论
Mobile Contactless Fingerprint presentation attack detection: Generalizability and Explainability
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIE...
收藏 引用
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE 2024年 第4期6卷 561-574页
作者: Priesnitz, Jannis Casula, Roberto Kolberg, Jascha Fang, Meiling Madhu, Akhila Rathgeb, Christian Marcialis, Gian Luca Damer, Naser Busch, Christoph Hsch Darmstadt da sec Biometr & Secur Res Grp D-64295 Darmstadt Germany Univ Cagliari PRA Lab I-09123 Cagliari Italy Fraunhofer Inst Comp G Res IGD D-64283 Darmstadt Germany Yangzhou Univ Coll Informat Engn Yangzhou 225127 Peoples R China Fraunhofer Inst Comp G Res IGD D-64283 Darmstadt Germany Tech Univ Darmstadt Dept Comp Sci D-64289 Darmstadt Germany
Contactless fingerprint recognition is an emerging biometric technology that has several advantages over contact-based schemes, such as improved user acceptance and fewer hygienic concerns. Like for most other biometr... 详细信息
来源: 评论
Internal Structure Attention Network for Fingerprint presentation attack detection From Optical Coherence Tomography
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIE...
收藏 引用
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE 2023年 第4期5卷 524-537页
作者: Sun, Haohao Zhang, Yilong Chen, Peng Wang, Haixia Liang, Ronghua Zhejiang Univ Technol Coll Informat & Engn Hangzhou 310023 Peoples R China Zhejiang Univ Technol Coll Comp Sci Hangzhou 310023 Peoples R China Zhejiang Univ Technol Coll Software Hangzhou 310023 Peoples R China
As a non-invasive optical imaging technique, optical coherence tomography (OCT) has proven promising for automatic fingerprint recognition system (AFRS) applications. Diverse approaches have been proposed for OCT-base... 详细信息
来源: 评论
A study on vulnerability and presentation attack detection in palmprint verification system
收藏 引用
PATTERN ANALYSIS AND APPLICATIONS 2018年 第3期21卷 769-782页
作者: Bhilare, Shruti Kanhangad, Vivek Chaudhari, Narendra Indian Inst Technol Indore Discipline Comp Sci & Engn Indore Madhya Pradesh India Indian Inst Technol Indore Discipline Elect Engn Indore Madhya Pradesh India
As biometric systems become ubiquitous in the domain of personal authentication, it is of utmost importance that these systems are secured against attacks. Among various types of attacks on biometric systems, the pres... 详细信息
来源: 评论
Fingerprint presentation attack detection by Region Decomposition
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 3974-3985页
作者: Fei, Hongyan Huang, Chuanwei Wu, Song Wang, Zheng Jia, Zexi Feng, Jufu Peking Univ Sch Intelligence Sci & Technol Minist Educ Key Lab Machine PerceptNatl Key Lab Gen Artificia Beijing 100871 Peoples R China
Fingerprint presentation attack detection (PAD) is a crucial step in automatic fingerprint identification systems, which safeguards users from unauthorized malicious access. However, current presentation attack (i.e. ... 详细信息
来源: 评论