Deep learning for face anti-spoofing: A survey

Z Yu, Y Qin, X Li, C Zhao, Z Lei… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …

Mask does not matter: Anti-spoofing face authentication using mmWave without on-site registration

W Xu, W Song, J Liu, Y Liu, X Cui, Y Zheng… - Proceedings of the 28th …, 2022 - dl.acm.org
Face authentication (FA) schemes are universally adopted. However, current FA systems
are mainly camera-based and hence susceptible to face occlusion (eg, facial masks) and …

Detecting real-time deep-fake videos using active illumination

CR Gerstner, H Farid - … of the IEEE/CVF Conference on …, 2022 - openaccess.thecvf.com
While many have grown suspicious of viral images and videos found online, there is a
general sense that we can and should trust that the person on the other end of our video …

[PDF][PDF] Digital and physical face attacks: Reviewing and one step further

C Kong, S Wang, H Li - APSIPA Transactions on Signal and …, 2022 - nowpublishers.com
With the rapid progress over the past five years, face authentication has become the most
pervasive biometric recognition method. Thanks to the high-accuracy recognition …

PATRON: Exploring respiratory signal derived from non-contact face videos for face anti-spoofing

L Birla, P Gupta - Expert Systems with Applications, 2022 - Elsevier
Face authentication provides non-contact, user-friendly, covert, and low-cost acquisition.
Despite this, face authentication is avoided in safety-critical applications because an …

Artificial intelligence of things: A survey

SI Siam, H Ahn, L Liu, S Alam, H Shen, Z Cao… - ACM Transactions on …, 2024 - dl.acm.org
The integration of the Internet of Things (IoT) and modern Artificial Intelligence (AI) has given
rise to a new paradigm known as the Artificial Intelligence of Things (AIoT). In this survey, we …

AFace: Range-flexible Anti-spoofing Face Authentication via Smartphone Acoustic Sensing

Z Xu, T Liu, R Jiang, P Hu, Z Guo, C Liu - Proceedings of the ACM on …, 2024 - dl.acm.org
User authentication on smartphones needs to balance both security and convenience. Many
image-based face authentication methods are vulnerable to spoofing and are plagued by …

M FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System

C Kong, K Zheng, Y Liu, S Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face presentation attacks (FPA), also known as face spoofing, have brought increasing
concerns to the public through various malicious applications, such as financial fraud and …

Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns

M Zhou, Q Wang, Q Li, W Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Face authentication usually utilizes deep learning models to verify users with high accuracy.
However, it is vulnerable to various attacks that cheat the models by manipulating the digital …

Where are the dots: Hardening face authentication on smartphones with unforgeable eye movement patterns

Z Zheng, Q Wang, C Wang, M Zhou… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
With the ubiquitous adoption, mobile face authentication systems have been facing constant
security challenges, particularly the spoofing risks. Except for those using specialized …