With the advent of deep learning models, face recognition systems have
a...
Upon the discovery of adversarial attacks, robust models have become
obl...
Over the past two decades, biometric recognition has exploded into a ple...
State-of-the-art defense mechanisms against face attacks achieve near pe...
Prevailing defense mechanisms against adversarial face images tend to ov...
In many of the least developed and developing countries, a multitude of
...
State-of-the-art spoof detection methods tend to overfit to the spoof ty...
Given a gallery of face images of missing children, state-of-the-art fac...
Given a gallery of face images of missing children, state-of-the-art fac...
Given a gallery of face images of missing children, state-of-the-art fac...
Deep neural networks (DNN) have achieved unprecedented success in numero...
Face recognition systems have been shown to be vulnerable to adversarial...
In developing countries around the world, a multitude of infants continu...
Prevailing user authentication schemes on smartphones rely on explicit u...
We propose, WarpGAN, a fully automatic network that can generate caricat...
Fingerprint alteration, also referred to as obfuscation presentation att...
We present a new method of primate face recognition, and evaluate this m...
We address the problem of comparing fingerphotos, fingerprint images fro...
We present a longitudinal study of face recognition performance on Child...