Recent text-to-image diffusion models have demonstrated an astonishing
c...
While remarkable success has been achieved in weakly-supervised object
l...
The technology of optical coherence tomography (OCT) to fingerprint imag...
Accurate abnormality localization in chest X-rays (CXR) can benefit the
...
Can we construct an explainable face recognition network able to learn a...
Deep convolutional neural network (CNN) based models are vulnerable to t...
A long-term video, such as a movie or TV show, is composed of various sc...
Named entity recognition based on deep learning (DNER) can effectively m...
The robustness and generalization ability of Presentation Attack Detecti...
Due to the diversity of attack materials, fingerprint recognition system...
Generative Adversarial Networks (GANs) have been widely adopted in vario...
Biometric systems are vulnerable to the Presentation Attacks (PA) perfor...
The vanilla convolutional neural network (CNN) is vulnerable to images w...
With the development of presentation attacks, Automated Fingerprint
Reco...