W Xu, W Song, J Liu, Y Liu, X Cui, Y Zheng… - Proceedings of the 28th …, 2022 - dl.acm.org
Face authentication (FA) schemes are universally adopted. However, current FA systems are mainly camera-based and hence susceptible to face occlusion (eg, facial masks) and …
CR Gerstner, H Farid - … of the IEEE/CVF Conference on …, 2022 - openaccess.thecvf.com
While many have grown suspicious of viral images and videos found online, there is a general sense that we can and should trust that the person on the other end of our video …
C Kong, S Wang, H Li - APSIPA Transactions on Signal and …, 2022 - nowpublishers.com
With the rapid progress over the past five years, face authentication has become the most pervasive biometric recognition method. Thanks to the high-accuracy recognition …
L Birla, P Gupta - Expert Systems with Applications, 2022 - Elsevier
Face authentication provides non-contact, user-friendly, covert, and low-cost acquisition. Despite this, face authentication is avoided in safety-critical applications because an …
The integration of the Internet of Things (IoT) and modern Artificial Intelligence (AI) has given rise to a new paradigm known as the Artificial Intelligence of Things (AIoT). In this survey, we …
Z Xu, T Liu, R Jiang, P Hu, Z Guo, C Liu - Proceedings of the ACM on …, 2024 - dl.acm.org
User authentication on smartphones needs to balance both security and convenience. Many image-based face authentication methods are vulnerable to spoofing and are plagued by …
C Kong, K Zheng, Y Liu, S Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face presentation attacks (FPA), also known as face spoofing, have brought increasing concerns to the public through various malicious applications, such as financial fraud and …
M Zhou, Q Wang, Q Li, W Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face authentication usually utilizes deep learning models to verify users with high accuracy. However, it is vulnerable to various attacks that cheat the models by manipulating the digital …
Z Zheng, Q Wang, C Wang, M Zhou… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
With the ubiquitous adoption, mobile face authentication systems have been facing constant security challenges, particularly the spoofing risks. Except for those using specialized …