The challenge in sourcing attribution for forgery faces has gained wides...
Face forgery techniques have advanced rapidly and pose serious security
...
Deepfakes are realistic face manipulations that can pose serious threats...
Face anti-spoofing (FAS) based on domain generalization (DG) has been
re...
A hard challenge in developing practical face recognition (FR) attacks i...
The security of artificial intelligence (AI) is an important research ar...
Deep learning models have shown their vulnerability when dealing with
ad...
Face anti-spoofing (FAS) approaches based on unsupervised domain adaptio...
With various face presentation attacks emerging continually, face
anti-s...
Denoising Diffusion Probabilistic Model (DDPM) is able to make flexible
...
Various facial manipulation techniques have drawn serious public concern...
With the rapid development of facial forgery techniques, forgery detecti...
With various facial manipulation techniques arising, face forgery detect...
Batch normalization (BN) is widely used in modern deep neural networks, ...
The rapid development of facial manipulation techniques has aroused publ...
With various face presentation attacks arising under unseen scenarios, f...
In pursuit of consolidating the face verification systems, prior face
an...
Face anti-spoofing approaches based on domain generalization (DG) have d...
Deep neural networks, particularly face recognition models, have been sh...
With the rapid development of facial manipulation techniques, face forge...
Face anti-spoofing approach based on domain generalization(DG) has drawn...
Deep models have shown their vulnerability when processing adversarial
s...
This paper reports methods and results in the DeeperForensics Challenge ...
Face authentication on mobile end has been widely applied in various
sce...
Face anti-spoofing is crucial to security of face recognition systems.
P...