The challenge in sourcing attribution for forgery faces has gained wides...
The ubiquitous use of face recognition has sparked increasing privacy
co...
Face forgery techniques have advanced rapidly and pose serious security
...
The Contrastive Language-Image Pre-training (CLIP) has recently shown
re...
Deepfakes are realistic face manipulations that can pose serious threats...
Deep neural networks (DNNs) have been showed to be highly vulnerable to
...
Artificial Intelligence (AI) is making a profound impact in almost every...
The unauthorized use of personal data for commercial purposes and the
cl...
Unrestricted adversarial attacks typically manipulate the semantic conte...
Face anti-spoofing (FAS) based on domain generalization (DG) has been
re...
A hard challenge in developing practical face recognition (FR) attacks i...
Text-based Person Search (TPS), is targeted on retrieving pedestrians to...
The security of artificial intelligence (AI) is an important research ar...
Deep learning models have shown their vulnerability when dealing with
ad...
As a challenging task, text-to-image generation aims to generate
photo-r...
Modeling sparse and dense image matching within a unified functional
cor...
In this paper, we present a novel model for simultaneous stable co-salie...
Traditional federated optimization methods perform poorly with heterogen...
Person search is a challenging task which aims to achieve joint pedestri...
Face anti-spoofing (FAS) approaches based on unsupervised domain adaptio...
With various face presentation attacks emerging continually, face
anti-s...
With the wide application of face recognition systems, there is rising
c...
Face recognition technology has been used in many fields due to its high...
Knowledge distillation (KD) is a widely-used technique that utilizes lar...
Various facial manipulation techniques have drawn serious public concern...
Partially-supervised instance segmentation is a task which requests
segm...
Patch attacks, one of the most threatening forms of physical attack in
a...
Although existing face anti-spoofing (FAS) methods achieve high accuracy...
With the rapid development of facial forgery techniques, forgery detecti...
With various facial manipulation techniques arising, face forgery detect...
Over the last few years, deep learning based approaches have achieved
ou...
The rapid development of facial manipulation techniques has aroused publ...
Aiming at discovering and locating most distinctive objects from visual
...
With various face presentation attacks arising under unseen scenarios, f...
In pursuit of consolidating the face verification systems, prior face
an...
Face anti-spoofing approaches based on domain generalization (DG) have d...
Face authentication usually utilizes deep learning models to verify user...
Deep neural networks, particularly face recognition models, have been sh...
With the rapid development of facial manipulation techniques, face forge...
Face anti-spoofing approach based on domain generalization(DG) has drawn...
Deep models have shown their vulnerability when processing adversarial
s...
This paper reports methods and results in the DeeperForensics Challenge ...
Face authentication on mobile end has been widely applied in various
sce...
Face anti-spoofing is crucial to security of face recognition systems.
P...
Anomaly detection is a fundamental problem in computer vision area with ...
3D object detection from raw and sparse point clouds has been far less
t...
In this paper, we propose a light reflection based face anti-spoofing me...
In this paper, we propose a novel face alignment method that trains deep...