2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2019
DOI: 10.1109/cvprw.2019.00201
|View full text |Cite
|
Sign up to set email alerts
|

Deep Anomaly Detection for Generalized Face Anti-Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(36 citation statements)
references
References 29 publications
0
36
0
Order By: Relevance
“…Accordingly, the face PAD problem may be better characterised as an open-set recognition task in a real-world setting, necessitating a different approach to be dealt with. The importance of unseen attacks has not only been identified in the context of face PAD [1]- [6] but also in other biometric modalities [7]- [11], motivating lots of intensive research on the problem. Among others options, one potential approach to the problem is that of one-class classification (OCC) [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, the face PAD problem may be better characterised as an open-set recognition task in a real-world setting, necessitating a different approach to be dealt with. The importance of unseen attacks has not only been identified in the context of face PAD [1]- [6] but also in other biometric modalities [7]- [11], motivating lots of intensive research on the problem. Among others options, one potential approach to the problem is that of one-class classification (OCC) [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…The few-shot learning was utilized to identify similar regions and extract more discriminative features. Perez-Cabo et al [16] proposed a deep metric learning method for the generalized presentation attack detection problem, in which a triplet focal loss was defined to regularize a new "metric-softmax" loss. They used the few-shot learning to improve the feature representation and distinguish attacks only using the image data.…”
Section: B Few-shot Learning In Industrial Applicationsmentioning
confidence: 99%
“…Current state-of-the-art approaches have achieved unprecedented results in standard benchmarks and datasets [2,3]. The reasons are clear: (a) the available data is orders of magnitude under the amount of the model's parameters and (b) all the presentation attacks are known beforehand and are completely represented by the training data.…”
Section: Introductionmentioning
confidence: 99%