Trustworthy AI: From principles to practices

B Li, P Qi, B Liu, S Di, J Liu, J Pei, J Yi… - ACM Computing Surveys, 2023 - dl.acm.org
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …

Open-source face recognition frameworks: A review of the landscape

D Wanyonyi, T Celik - IEEE Access, 2022 - ieeexplore.ieee.org
From holistic low-dimension feature-based segmentation to deep polynomial neural
networks, Face Recognition (FR) accuracy has increased dramatically since its early days …

The replay-mobile face presentation-attack database

A Costa-Pazo, S Bhattacharjee… - … conference of the …, 2016 - ieeexplore.ieee.org
For face authentication to become widespread on mobile devices, robust countermeasures
must be developed for face presentation-attack detection (PAD). Existing databases for …

Automated face swapping and its detection

Y Zhang, L Zheng, VLL Thing - 2017 IEEE 2nd international …, 2017 - ieeexplore.ieee.org
Face has been used as one of the mainstream manners for user identification. However,
with the popularity of face-swapping apps, it takes only a few seconds to change the faces …

Preventing face-based authentication spoofing

DL Graumann, R Ghosh, RS Narjala - US Patent 10,198,645, 2019 - Google Patents
System and techniques for preventing face-based authenti cation spoofing are described
herein. A visible light emitter may be controlled to project a pattern into a camera's field of …

FeatherNets: Convolutional neural networks as light as feather for face anti-spoofing

P Zhang, F Zou, Z Wu, N Dai, S Mark… - Proceedings of the …, 2019 - openaccess.thecvf.com
Face Anti-spoofing gains increased attentions recently in both academic and industrial
fields. With the emergence of various CNN based solutions, the multi-modal (RGB, depth …

Face liveness detection using a flash against 2D spoofing attack

PPK Chan, W Liu, D Chen, DS Yeung… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Face recognition technique has been widely applied to personal identification systems due
to its satisfying performance. However, its security may be a crucial issue, since many …

Face flashing: a secure liveness detection protocol based on light reflections

D Tang, Z Zhou, Y Zhang, K Zhang - arXiv preprint arXiv:1801.01949, 2018 - arxiv.org
Face authentication systems are becoming increasingly prevalent, especially with the rapid
development of Deep Learning technologies. However, human facial information is easy to …

How far did we get in face spoofing detection?

L Souza, L Oliveira, M Pamplona, J Papa - Engineering Applications of …, 2018 - Elsevier
The growing use of control access systems based on face recognition shed light over the
need for even more accurate systems to detect face spoofing attacks. In this paper, an …

Secure data transfer in IoT environment: Adopting both cryptography and steganography techniques

R Das, I Das - … on Research in Computational Intelligence and …, 2016 - ieeexplore.ieee.org
Owing to the unprecedented growth in computing power, electronics miniaturization and
mobile and wireless network interconnections the internet has metamorphosed into Internet …