Nome |
# |
A Multidisciplinary Approach for the Development of Smart Distribution Networks, file e2f56ed7-ef7f-3eaf-e053-3a05fe0a5d97
|
783
|
Fingerprint verification by fusion of optical and capacitive sensors, file e2f56ed3-b528-3eaf-e053-3a05fe0a5d97
|
319
|
The Face Deepfake Detection Challenge, file 8e75ddca-3c8e-45c8-aa19-0e5c92af9f41
|
285
|
Fingerprint Adversarial Presentation Attack in the Physical Domain, file e2f56ed9-d87d-3eaf-e053-3a05fe0a5d97
|
228
|
On the interoperability of capture devices in fingerprint presentation attacks detection, file e2f56ed6-8b84-3eaf-e053-3a05fe0a5d97
|
89
|
EEG personal recognition based on ‘qualified majority’ over signal patches, file e2f56ed9-c97b-3eaf-e053-3a05fe0a5d97
|
86
|
3D Face Reconstruction for Forensic Recognition - A Survey, file c9e70ba7-5364-4b76-8a87-f2652a613c1e
|
83
|
Cybersecurity and AI: The PRALab Research Experience, file 83f0d3ee-aaaf-4a6b-b008-d9f998f8470c
|
77
|
Fingerprint recognition with embedded presentation attacks detection: are we ready?, file e2f56eda-73c4-3eaf-e053-3a05fe0a5d97
|
57
|
Video face recognition from a single still image using an adaptive appearance model tracker, file e2f56ed5-61db-3eaf-e053-3a05fe0a5d97
|
49
|
A novel classification-selection approach for the self updating of template-based face recognition systems, file e2f56ed8-99bb-3eaf-e053-3a05fe0a5d97
|
49
|
Statistical meta-analysis of presentation attacks for secure multibiometric systems, file e2f56eda-b87d-3eaf-e053-3a05fe0a5d97
|
43
|
Leveraging Artificial Intelligence to Fight (Cyber)Bullying for Human Well-being: The BullyBuster Project, file a6c0edc5-9b52-4b8c-b503-178068d3933b
|
35
|
Preliminary Results on a "Real" Iris Recognition System under Challenging Operational Conditions, file 358ded82-ac54-4f26-8847-57f9deb997b5
|
32
|
Analysis of Score-Level Fusion Rules for Deepfake Detection, file d2ec2d6b-0728-42a7-92a1-e493bae25958
|
31
|
DeepFake detection based on high-frequency enhancement network for highly compressed content, file 21acc0ff-1c36-4d5f-9c34-0db9db748f37
|
21
|
DeepFake detection based on high-frequency enhancement network for highly compressed content, file f10e26fd-6ed6-4b53-98e4-40847ec834b0
|
18
|
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics, file 1032094e-5771-4a46-9d37-20801cdcd74f
|
15
|
Realistic fingerprint presentation attacks based on an adversarial approach, file 6b06fad6-47ae-4ed0-9eb7-cb7396443d1a
|
15
|
Fingerprint Presentation Attacks: Tackling the Ongoing Arms Race in Biometric Authentication, file 5a616d35-a38d-4743-8fb1-219e1ceaf442
|
14
|
Mitigating Sensor and Acquisition Method-Dependence of Fingerprint Presentation Attack Detection Systems by Exploiting Data from Multiple Devices, file 9cf3af60-460a-4295-87bf-ba434833cd36
|
14
|
Biometric presentation attacks: Handcrafted features versus deep learning approaches, file 66298e3b-1e12-49a5-859b-3bc8eca5f49f
|
11
|
3D Face Reconstruction: the Road to Forensics, file f6bf966b-bac3-49d7-bd7f-68a47c37d235
|
9
|
Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project, file c49eec9c-6769-47c6-98b7-6a3f43bd05d9
|
8
|
Palmprint recognition with an efficient data driven ensemble classifier, file e2f56ed8-05d5-3eaf-e053-3a05fe0a5d97
|
8
|
Towards Contactless Fingerprint Presentation Attack Detection using Algorithms from the Contact-based Domain, file 0476ffe2-8b63-4cfb-b6bd-c01fb551878e
|
7
|
Experimental results on palmvein-based personal recognition by multi-snapshot fusion of textural features, file e2f56ed8-dd07-3eaf-e053-3a05fe0a5d97
|
7
|
null, file e2f56ed3-af64-3eaf-e053-3a05fe0a5d97
|
6
|
An EEG-based biometric system using eigenvector centrality in resting state brain networks, file e2f56ed4-e456-3eaf-e053-3a05fe0a5d97
|
6
|
Statistical meta-analysis of presentation attacks for secure multibiometric systems, file e2f56ed6-8f9e-3eaf-e053-3a05fe0a5d97
|
6
|
Interoperability among capture devices for fingerprint presentation attacks detection, file e2f56ed8-23f5-3eaf-e053-3a05fe0a5d97
|
6
|
Review of the Fingerprint Liveness Detection (LivDet) Competition Series: From 2009 to 2021, file e56ae74b-aa6e-4d3e-8395-ae93a03bb62c
|
6
|
null, file e2f56ed3-a923-3eaf-e053-3a05fe0a5d97
|
5
|
null, file e2f56ed3-addd-3eaf-e053-3a05fe0a5d97
|
5
|
Liveness Detection Competition 2009, file e2f56ed3-c173-3eaf-e053-3a05fe0a5d97
|
5
|
Why template self-update should work in biometric authentication systems?, file e2f56ed3-c18a-3eaf-e053-3a05fe0a5d97
|
5
|
Experimental Results on the Feature-level Fusion of Multiple Fingerprint Liveness Detection Algorithms, file e2f56ed3-c5ba-3eaf-e053-3a05fe0a5d97
|
5
|
Minimum spanning tree and k-core decomposition as measure of subject-specific EEG traits, file e2f56ed5-5a21-3eaf-e053-3a05fe0a5d97
|
5
|
Experimental results on multi-modal fusion of EEG-based personal verification algorithms, file e2f56ed5-5a89-3eaf-e053-3a05fe0a5d97
|
5
|
LivDet2023 - Fingerprint Liveness Detection Competition: Advancing Generalization, file 00e900a4-5c6d-4ca5-be55-f539d7e0df9a
|
4
|
Fingerprint verification by fusion of optical and capacitive sensors, file e2f56ed3-b529-3eaf-e053-3a05fe0a5d97
|
4
|
Analysis of unsupervised template update in biometric recognition systems, file e2f56ed3-c8dc-3eaf-e053-3a05fe0a5d97
|
4
|
Multimodal fingerprint verification by score-level fusion: an experimental investigation, file e2f56ed5-f53f-3eaf-e053-3a05fe0a5d97
|
4
|
Palmprint recognition with an efficient data driven ensemble classifier, file e2f56ed9-2c35-3eaf-e053-3a05fe0a5d97
|
4
|
Generalized Deepfake Detection Algorithm Based on Inconsistency Between Inner and Outer Faces, file 022bdba4-3719-49b5-bd39-7b321cde7690
|
3
|
Towards Contactless Fingerprint Presentation Attack Detection using Algorithms from the Contact-based Domain, file 6403c5bf-10bc-474c-bd1a-533d18223d8c
|
3
|
A multi-modal dataset, protocol and tools for adaptive biometric systems: A benchmarking study, file e2f56ed3-9b34-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-9c9d-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-9c9e-3eaf-e053-3a05fe0a5d97
|
3
|
Fusion of PCA and LDA for Face Verification, file e2f56ed3-aa4a-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-c0eb-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-c39c-3eaf-e053-3a05fe0a5d97
|
3
|
A novel method for head pose estimation based on the "Vitruvian Man", file e2f56ed3-c907-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed3-c9c9-3eaf-e053-3a05fe0a5d97
|
3
|
Analysis and Selection of Features for the Fingerprint Vitality Detection, file e2f56ed5-613e-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed5-bedc-3eaf-e053-3a05fe0a5d97
|
3
|
International Fingerprint Liveness Detection Competition, file e2f56ed8-1289-3eaf-e053-3a05fe0a5d97
|
3
|
Review of fingerprint presentation attack detection competitions, file e2f56ed8-5e9f-3eaf-e053-3a05fe0a5d97
|
3
|
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?, file e2f56ed9-de49-3eaf-e053-3a05fe0a5d97
|
3
|
Introduction to Presentation Attack Detection in Fingerprint Biometrics, file e789f6b2-215c-4b72-8eba-60e5fb6924b4
|
3
|
Human-Centered Evaluation of Anomalous Events Detection in Crowded Environments, file f1b2413a-9b42-4283-8a1c-fc3df0d5ae18
|
3
|
Human-Centered Evaluation of Anomalous Events Detection in Crowded Environments, file c7034fac-e600-4348-9150-74d7ba1eb870
|
2
|
null, file e2f56ed3-98bc-3eaf-e053-3a05fe0a5d97
|
2
|
LivDet 2011 - Fingerprint Liveness Detection Competition 2011, file e2f56ed3-a34d-3eaf-e053-3a05fe0a5d97
|
2
|
Self adaptive systems: an experimental analysis of the performance over time, file e2f56ed3-b077-3eaf-e053-3a05fe0a5d97
|
2
|
Fingerprint Liveness Detection based on Fake Finger characteristics, file e2f56ed3-b91a-3eaf-e053-3a05fe0a5d97
|
2
|
Perceptron-based fusion of multiple fingerprint matchers, file e2f56ed3-bb78-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed3-bedd-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed3-bede-3eaf-e053-3a05fe0a5d97
|
2
|
Robustness Analysis of Likelihood Ratio Score Fusion Rule for Multimodal Biometric Systems under Spoof Attacks, file e2f56ed3-c286-3eaf-e053-3a05fe0a5d97
|
2
|
A novel method for head pose estimation based on the "Vitruvian Man", file e2f56ed3-c908-3eaf-e053-3a05fe0a5d97
|
2
|
Adaptive ensembles for face recognition in changing video surveillance environments, file e2f56ed3-c9c3-3eaf-e053-3a05fe0a5d97
|
2
|
Adaptive appearance model tracking for still-to-video face recognition, file e2f56ed4-da0e-3eaf-e053-3a05fe0a5d97
|
2
|
User-specific effects in Fingerprint Presentation Attacks Detection: Insights for future research, file e2f56ed5-5a2f-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed5-c5a6-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed5-c757-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed5-f8b2-3eaf-e053-3a05fe0a5d97
|
2
|
Fingerprint liveness detection using local texture features, file e2f56ed6-7ad6-3eaf-e053-3a05fe0a5d97
|
2
|
null, file e2f56ed6-8d48-3eaf-e053-3a05fe0a5d97
|
2
|
Fingerprint Presentation Attacks Detection based on the User-Specific Effect, file e2f56ed6-d4ca-3eaf-e053-3a05fe0a5d97
|
2
|
Incremental Support Vector Machine for self-updating Fingerprint Presentation Attack Detection systems, file e2f56ed6-ee3d-3eaf-e053-3a05fe0a5d97
|
2
|
An experimental investigation on self adaptive facial recognition algorithms using a long time span data set, file e2f56ed8-0376-3eaf-e053-3a05fe0a5d97
|
2
|
Robustness of functional connectivity metrics for EEG-based personal identification over task-induced intra-class and inter-class variations, file e2f56ed8-3996-3eaf-e053-3a05fe0a5d97
|
2
|
LivDet 2017 fingerprint liveness detection competition 2017, file e2f56ed8-c726-3eaf-e053-3a05fe0a5d97
|
2
|
Analysis of “User-Specific Effect” and Impact of Operator Skills on Fingerprint PAD Systems, file e2f56ed9-5e30-3eaf-e053-3a05fe0a5d97
|
2
|
Detecting Anomalies from Video-Sequences: a Novel Descriptor, file e2f56ed9-f03d-3eaf-e053-3a05fe0a5d97
|
2
|
Are Adaptive Face Recognition Systems still Necessary? Experiments on the APE Dataset, file e2f56eda-22b6-3eaf-e053-3a05fe0a5d97
|
2
|
Experimental Results on Multi-modal Deepfake Detection, file 2e4837b8-44eb-4aa8-a0e7-59479433da57
|
1
|
Towards realistic fingerprint presentation attacks: The ScreenSpoof method, file 5ed77e64-f933-4832-9dd4-7de38972d97e
|
1
|
3D Face Reconstruction for Forensic Recognition - A Survey, file 7d033173-09b1-4251-8796-7de4cafbb4c8
|
1
|
Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits, file e2f56ed3-8928-3eaf-e053-3a05fe0a5d97
|
1
|
Fatevi Riconoscere, file e2f56ed3-8c07-3eaf-e053-3a05fe0a5d97
|
1
|
A Fingerprint Forensic Tool for Criminal Investigations, file e2f56ed3-a3d5-3eaf-e053-3a05fe0a5d97
|
1
|
Multimodal Anti-spoofing in Biometric Recognition Systems, file e2f56ed3-a69e-3eaf-e053-3a05fe0a5d97
|
1
|
Graph-Based and Structural Methods for Fingerprint Classification, file e2f56ed3-a998-3eaf-e053-3a05fe0a5d97
|
1
|
Graph-Based and Structural Methods for Fingerprint Classification, file e2f56ed3-a999-3eaf-e053-3a05fe0a5d97
|
1
|
Biometric system adaptation by self-update and graph-based techniques, file e2f56ed3-ac1b-3eaf-e053-3a05fe0a5d97
|
1
|
Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device, file e2f56ed3-ae64-3eaf-e053-3a05fe0a5d97
|
1
|
Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device, file e2f56ed3-ae65-3eaf-e053-3a05fe0a5d97
|
1
|
Fingerprint Liveness Detection based on Fake Finger characteristics, file e2f56ed3-b91b-3eaf-e053-3a05fe0a5d97
|
1
|
Totale |
2.594 |