Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Face recognition under spoofing attacks: countermeasures and research directions

L Li, PL Correia, A Hadid - Iet Biometrics, 2018 - Wiley Online Library
Among tangible threats facing current biometric systems are spoofing attacks. A spoofing
attack occurs when a person tries to masquerade as someone else by falsifying data and …

Transfer learning-assisted multi-resolution breast cancer histopathological images classification

N Ahmad, S Asghar, SA Gillani - The Visual Computer, 2022 - Springer
Breast cancer is one of the leading death cause among women nowadays. Several methods
have been proposed for the detection of breast cancer. Various machine learning-based …

CNN-based anti-spoofing two-tier multi-factor authentication system

M Sajjad, S Khan, T Hussain, K Muhammad… - Pattern Recognition …, 2019 - Elsevier
Many hybrid and multimodal biometric recognition techniques have been presented to
provide secure and authentic systems, incorporating both soft and hard biometric schemes …

Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors

DT Nguyen, TD Pham, NR Baek, KR Park - Sensors, 2018 - mdpi.com
Although face recognition systems have wide application, they are vulnerable to
presentation attack samples (fake samples). Therefore, a presentation attack detection …

GLNET: global–local CNN's-based informed model for detection of breast cancer categories from histopathological slides

SUR Khan, M Zhao, S Asif, X Chen, Y Zhu - The Journal of …, 2024 - Springer
In computer vision, particularly in label categorization, attributing features such as color,
shape, and tissue size to each category presents a formidable challenge. Dense features …

A survey on face presentation attack detection mechanisms: hitherto and future perspectives

D Sharma, A Selwal - Multimedia Systems, 2023 - Springer
The advances in human face recognition (FR) systems have recorded sublime success for
automatic and secured authentication in diverse domains. Although the traditional methods …

Anti-spoofing in face recognition-based biometric authentication using image quality assessment

E Fourati, W Elloumi, A Chetouani - Multimedia Tools and Applications, 2020 - Springer
Despite the rapid growth of face recognition-based biometrics for both authentication and
identification, the security of face biometric systems against presentation attacks (also called …

A comparative evaluation of local feature descriptors for deepfakes detection

Z Akhtar, D Dasgupta - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
The global proliferation of affordable photographing devices and readily-available face
image and video editing software has caused a remarkable rise in face manipulations, eg …

Deep learning techniques for electronic health record analysis

L Caroprese, P Veltri, E Vocaturo… - 2018 9th International …, 2018 - ieeexplore.ieee.org
Following the general trend, the amount of digital information in the stored electronic health
records (EHRs) had an explosion in the last decade. EHRs are not anymore used, as in the …