2020 IEEE International Joint Conference on Biometrics (IJCB) 2020
DOI: 10.1109/ijcb48548.2020.9304935
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection-Based Unknown Face Presentation Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 32 publications
0
16
0
Order By: Relevance
“…This feature is passed through the open-set classifier via path (1) to evaluate the cross entropy loss L cls . Then, the image corresponding to the obtained latent feature is generated by passing the feature through the decoder following path (2). The decoded image is used to calculate its difference to the corresponding clean image based on the reconstruction loss L rec .…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This feature is passed through the open-set classifier via path (1) to evaluate the cross entropy loss L cls . Then, the image corresponding to the obtained latent feature is generated by passing the feature through the decoder following path (2). The decoded image is used to calculate its difference to the corresponding clean image based on the reconstruction loss L rec .…”
Section: Proposed Methodsmentioning
confidence: 99%
“…A significant improvement has been achieved in the image classification task since the advent of deep convolutional neural networks (CNNs) [14]. The promising performance in classification has contributed to many real-world computer vision applications [41,37,40,38,39,36,42,45,47,20,2,46]. However, This work was conducted prior to joining AWS AI Labs when the author was affiliated with Johns Hopkins University.…”
Section: Introductionmentioning
confidence: 99%
“…Within the published works, it is possible to find reinforcement learning approaches [3], 3D-CNNs [19], a two stages approach relying on blinking [8] and several other colour-based methods [20,2]. The background usage is addressed in some works [27,1,22,30,16], however, they did not perform comparative studies regarding performance, with and without the background, of several approaches. It is possible to find this comparison in other works, however, the proposed methods are based on conventional machine learning instead of end-to-end deep learning [31,18].…”
Section: Related Workmentioning
confidence: 99%
“…FAS can be also formulated as a domain adaptation/generalization problem in [28,34,60], where disentangled learning [41,75], adversarial learning [56], and meta learning [10,37,38,57,61] are adopt to improve the model's generalization capacity on unseen scenarios. Besides, several anomaly detection [1,17,36,46], zero-shot [40,51] and continuous learning [49,53] approaches are proposed for unknown PAs detection. Though the generalization capacity has been improved by those techniques, they are still restricted to labeled data in source domains.…”
Section: Related Workmentioning
confidence: 99%