Face anti-spoofing (FAS) techniques play an important role in defending face recognition systems against spoofing attacks. Existing FAS methods often require a large number of annotated spoofing face data to train effective anti-spoofing models. Considering the attacking nature of spoofing data and its diverse variants, obtaining all the spoofing types in advance is difficult. This would limit the performance of FAS networks in practice. Thus, an online learning FAS method is highly desirable. In this paper, we present a semi-supervised learning based framework to tackle face spoofing attacks with only a few labeled training data (e.g., ∼ 50 face images). Specifically, we progressively adopt the unlabeled data with reliable pseudo labels ...
International audienceDespite the fact that current Facial Recognition (FR) models like FaceNet or m...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection ...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
Abstract Face anti-spoofing is crucial to the security of face recognition systems. Most previous m...
Current domain adaptation methods for face anti-spoofing leverage labeled source domain data and unl...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract Face anti-spoofing (FAS) secures face recognition from presentation attacks (PAs). Existin...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Modern biometric systems based on face recognition demonstrate high recognition quality, but they ar...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
International audienceDespite the fact that current Facial Recognition (FR) models like FaceNet or m...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection ...
Face anti-spoofing aims to prevent false authentications of face recognition systems by distinguishi...
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods for...
Abstract Face anti-spoofing is crucial to the security of face recognition systems. Most previous m...
Current domain adaptation methods for face anti-spoofing leverage labeled source domain data and unl...
Face anti-spoofing has drawn a lot of attention due to the high security requirements in biometric a...
Face spoofing detection has received great research interest recently due to the rapidly increasing ...
Abstract Face anti-spoofing (FAS) secures face recognition from presentation attacks (PAs). Existin...
Face presentation attacks have become an increasingly critical concern when face recognition is wide...
The face recognition system is vulnerable to spoofing attacks by photos or videos of a valid user fa...
Modern biometric systems based on face recognition demonstrate high recognition quality, but they ar...
Face recognition is a mature and trustworthy method for identifying individuals. Thanks to the avai...
Face recognition as a convenient approach for automatic identity verification has become increasingl...
International audienceDespite the fact that current Facial Recognition (FR) models like FaceNet or m...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
To counteract spoofing attacks, the majority of recent approaches to face spoofing attack detection ...