Sébastien Marcel
#147,973
Most Influential Person Now
Sébastien Marcel's AcademicInfluence.com Rankings
Sébastien Marcelcomputer-science Degrees
Computer Science
#7567
World Rank
#7967
Historical Rank
Machine Learning
#2831
World Rank
#2866
Historical Rank
Database
#4615
World Rank
#4794
Historical Rank

Download Badge
Computer Science
Why Is Sébastien Marcel Influential?
(Suggest an Edit or Addition)Sébastien Marcel's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- On the effectiveness of local binary patterns in face anti-spoofing (2012) (738)
- Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation (2007) (488)
- Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition (2014) (467)
- DeepFakes: a New Threat to Face Recognition? Assessment and Detection (2018) (371)
- Biometric Antispoofing Methods: A Survey in Face Recognition (2014) (340)
- Counter-measures to photo attacks in face recognition: A public database and a baseline (2011) (333)
- Torchvision the machine-vision package of torch (2010) (297)
- LBP - TOP Based Countermeasure against Face Spoofing Attacks (2012) (278)
- Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect (2013) (258)
- Can face anti-spoofing countermeasures work in a real world scenario? (2013) (257)
- Spoofing Face Recognition With 3D Masks (2014) (229)
- Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data (2012) (227)
- Face liveness detection using dynamic texture (2014) (225)
- Local binary patterns as an image preprocessing for face authentication (2006) (209)
- Competition on counter measures to 2-D facial spoofing attacks (2011) (174)
- Face Anti-spoofing Based on General Image Quality Assessment (2014) (169)
- Bob: a free signal processing and machine learning toolbox for researchers (2012) (168)
- Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned (2015) (160)
- Motion-based counter-measures to photo attacks in face recognition (2014) (152)
- Face Authentication Using Adapted Local Binary Pattern Histograms (2006) (149)
- Hand gesture recognition using input-output hidden Markov models (2000) (148)
- Face authentication test on the BANCA database (2004) (134)
- Complementary countermeasures for detecting scenic face spoofing attacks (2013) (131)
- Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network (2019) (131)
- On the vulnerability of face verification systems to hill-climbing attacks (2010) (129)
- The Replay-Mobile Face Presentation-Attack Database (2016) (127)
- Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection (2019) (121)
- Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS (2003) (119)
- A competition on generalized software-based face presentation attack detection in mobile scenarios (2017) (114)
- Towards Directly Modeling Raw Speech Signal for Speaker Verification Using CNNS (2018) (112)
- Hand Posture Classification and Recognition using the Modified Census Transform (2006) (111)
- On the Recent Use of Local Binary Patterns for Face Authentication (2007) (110)
- The 2nd competition on counter measures to 2D face spoofing attacks (2013) (107)
- On the vulnerability of speaker verification to realistic voice spoofing (2015) (106)
- Face Verification Competition on the XM2VTS Database (2003) (100)
- A comparative study of two state-of-the-art sequence processing techniques for hand gesture recognition (2009) (92)
- Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting (2017) (88)
- Hand posture recognition in a body-face centered space (1999) (86)
- Joint Speaker Verification and Antispoofing in the $i$ -Vector Space (2015) (85)
- I4u submission to NIST SRE 2012: a large-scale collaborative effort for noise-robust speaker verification (2013) (84)
- Biometrics Evaluation Under Spoofing Attacks (2014) (84)
- On the vulnerability of finger vein recognition to spoofing (2014) (84)
- On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing (2018) (79)
- Face Recognition Systems Under Spoofing Attacks (2016) (78)
- Confidence measures for multimodal identity verification (2002) (78)
- Vulnerability assessment and detection of Deepfake videos (2019) (77)
- A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition (2013) (76)
- Overview of BTAS 2016 speaker anti-spoofing competition (2016) (75)
- A Reproducible Study on Remote Heart Rate Measurement (2017) (74)
- Inter-session variability modelling and joint factor analysis for face authentication (2011) (70)
- Mobile Biometrics: Combined Face and Voice Verification for a Mobile Platform (2013) (68)
- Spoofing Deep Face Recognition with Custom Silicone Masks (2018) (68)
- Lighting Normalization Algorithms for Face Verification (2005) (68)
- Anti-spoofing in Action: Joint Operation with a Verification System (2013) (66)
- Spoofing 2D face recognition systems with 3D masks (2013) (64)
- On the vulnerability of palm vein recognition to spoofing attacks (2015) (64)
- The 2013 speaker recognition evaluation in mobile environment (2013) (63)
- On the Results of the First Mobile Biometry (MOBIO) Face and Speaker Verification Evaluation (2010) (61)
- Improving face verification using skin color information (2002) (59)
- Improving face authentication using virtual samples (2003) (59)
- Speaker Inconsistency Detection in Tampered Video (2018) (58)
- Handbook of Biometric Anti-Spoofing (2019) (56)
- Deeply vulnerable: a study of the robustness of face recognition to presentation attacks (2018) (56)
- End-to-End convolutional neural network-based voice presentation attack detection (2017) (55)
- Heterogeneous Face Recognition Using Domain Specific Units (2019) (54)
- Multi-layer Perceptron (2018) (53)
- Face Authentication Competition on the BANCA Database (2004) (50)
- An Evaluation of Video-to-Video Face Verification (2010) (50)
- Fast Bounding Box Estimation based Face Detection (2010) (50)
- Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments (2017) (50)
- Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks (2020) (49)
- The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks (2015) (48)
- Keystroke Biometrics Ongoing Competition (2016) (46)
- Introducing i-vectors for joint anti-spoofing and speaker verification (2014) (44)
- Spear: An open source toolbox for speaker recognition based on Bob (2014) (43)
- Finger vein liveness detection using motion magnification (2015) (42)
- Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks (2020) (42)
- HMM and IOHMM for the Recognition of Mono- and Bi-Manual 3D Hand Gestures (2004) (41)
- Haar Local Binary Pattern Feature for Fast Illumination Invariant Face Detection (2009) (40)
- Performance Characterisation of Face Recognition Algorithms and Their Sensitivity to Severe Illumination Changes (2006) (40)
- Cross Modal Focal Loss for RGBD Face Anti-Spoofing (2021) (39)
- A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers (2012) (39)
- Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models (2012) (38)
- Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions (2010) (38)
- BEAT – biometrics evaluation and testing (2013) (37)
- Long-Term Spectral Statistics for Voice Presentation Attack Detection (2017) (37)
- Cross-Database Evaluation of Audio-Based Spoofing Detection Systems (2016) (37)
- Face and eye detection on hard datasets (2011) (35)
- Evaluation of Biometric Technology on XM2VTS (2001) (34)
- Handbook of Vascular Biometrics (2019) (34)
- Hierarchical speaker clustering methods for the NIST i-vector Challenge (2014) (34)
- Hill-climbing attack to an Eigenface-based face verification system (2009) (34)
- Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks (2014) (33)
- The 2013 face recognition evaluation in mobile environment (2013) (33)
- What You Can't See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection (2017) (33)
- Cross-database evaluation using an open finger vein sensor (2014) (32)
- An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms (2012) (32)
- MOBIO Database for the ICPR 2010 Face and Speech Competition (2009) (32)
- On performance evaluation of face detection and localization algorithms (2004) (31)
- Bi-modal biometric authentication on mobile phones in challenging conditions (2014) (31)
- On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing (2020) (29)
- Session variability modelling for face authentication (2013) (29)
- Fairness in Biometrics: A Figure of Merit to Assess Biometric Verification Systems (2020) (29)
- Face Recognition in Challenging Environments: An Experimental and Reproducible Research Survey (2016) (28)
- Score calibration in face recognition (2014) (28)
- Cross-eyed 2017: Cross-spectral iris/periocular recognition competition (2017) (26)
- Domain Adaptation in Multi-Channel Autoencoder based Features for Robust Face Anti-Spoofing (2019) (25)
- Mobile Biometrics (MoBio): Joint Face and Voice Verification for a Mobile Platform (2012) (25)
- Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations (2017) (25)
- Recent Advances in Face Presentation Attack Detection (2019) (24)
- Periocular biometrics in mobile environment (2015) (24)
- Gestures for Multi-Modal Interfaces: A Review (2002) (24)
- Biometrics: In Search of Identity and Security (Q & A) (2018) (22)
- Palm Vein Database and Experimental Framework for Reproducible Research (2015) (22)
- Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack Detection (2019) (22)
- Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features (2020) (22)
- Understanding and Visualizing Raw Waveform-Based CNNs (2019) (22)
- Guest Editorial Special Issue on Biometric Spoofing and Countermeasures (2015) (21)
- Swiss French Regional Accent Identification (2014) (21)
- Face Anti-spoofing: Visual Approach (2014) (21)
- Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks (2020) (21)
- Iris Liveness Detection Competition (LivDet-Iris) - The 2020 Edition (2020) (21)
- Audio-visual gender recognition in uncontrolled environment using variability modeling techniques (2014) (21)
- A novel statistical generative model dedicated to face recognition (2010) (20)
- Speech & face based biometric authentication at IDIAP (2003) (20)
- Deepfake detection: humans vs. machines (2020) (20)
- A symmetric transformation for LDA-based face verification (2004) (20)
- Anti-spoofing: Evaluation Methodologies (2014) (19)
- Presentation Attack Detection Using Long-Term Spectral Statistics for Trustworthy Speaker Verification (2016) (17)
- Pulse-based Features for Face Presentation Attack Detection (2018) (17)
- Robust-to-Illumination Face Localisation using Active Shape Models and Local Binary Patterns (2006) (17)
- Boosted binary features for noise-robust speaker verification (2010) (16)
- Evaluation Methodologies for Biometric Presentation Attack Detection (2019) (16)
- Towards Protecting and Enhancing Vascular Biometric Recognition Methods via Biohashing and Deep Neural Networks (2021) (16)
- Spoofing Attacks To 2D Face Recognition Systems With 3D Masks (2013) (15)
- On Learning Vocal Tract System Related Speaker Discriminative Information from Raw Signal Using CNNs (2018) (15)
- Two-Handed Gesture Recognition (2005) (15)
- Parts-Based Face Verification Using Local Frequency Bands (2009) (14)
- Face Video Competition (2009) (14)
- A principled approach to remove false alarms by modelling the context of a face detector (2010) (14)
- On the Generalization of Fused Systems in Voice Presentation Attack Detection (2017) (14)
- Alternative search techniques for face detection using location estimation and binary features (2013) (14)
- Tampered Speaker Inconsistency Detection with Phonetically Aware Audio-visual Features (2019) (14)
- Smartphone Multi-modal Biometric Authentication: Database and Evaluation (2019) (14)
- Multispectral Deep Embeddings as a Countermeasure to Custom Silicone Mask Presentation Attacks (2019) (14)
- Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems (2020) (13)
- A Cross-Database Study of Voice Presentation Attack Detection (2019) (13)
- Active Shape Models Using Local Binary Patterns (2006) (13)
- On the use of convolutional neural networks for speech presentation attack detection (2018) (13)
- Biometrics Security and Privacy Protection [From the Guest Editors] (2015) (13)
- Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in Laplacian scale-space (2016) (12)
- Feature distribution modelling techniques for 3D face verification (2010) (12)
- Low-latency speaker spotting with online diarization and detection (2018) (12)
- Domain Adaptation for Generalization of Face Presentation Attack Detection in Mobile Settengs with Minimal Information (2020) (11)
- Can Your Face Detector Do Anti-spoofing? Face Presentation Attack Detection with a Multi-Channel Face Detector (2020) (11)
- Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models (2012) (11)
- Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation (2018) (10)
- BEAT: An Open-Source Web-Based Open-Science Platform (2017) (10)
- Phoneme recognition using Boosted Binary Features (2011) (10)
- MOBIO: MOBILE BIOMETRIC FACE AND SPEAKER AUTHENTICATION (2010) (10)
- Introduction to the special issue on image and video retrieval: theory and applications (2011) (10)
- Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System (2006) (10)
- 2D Face Recognition: An Experimental and Reproducible Research Survey (2017) (10)
- Remote Blood Pulse Analysis for Face Presentation Attack Detection (2019) (10)
- Audio-Visual Processing in Meetings: Seven Questions and Current AMI Answers (2006) (10)
- The Speed Submission to DIHARD II: Contributions & Lessons Learned (2019) (10)
- Are GAN-based morphs threatening face recognition? (2022) (10)
- On the use of automatically generated synthetic image datasets for benchmarking face recognition (2021) (9)
- Evaluation Methodologies (2014) (9)
- Face Verification using MLP and SVM (2002) (9)
- Vulnerability of Face Recognition to Deep Morphing (2019) (9)
- Recognition of isolated complex mono- and bi-manual 3D hand gestures (2004) (9)
- Multiview Face Detection (2005) (9)
- Efficient Diffusion-based Illumination Normalization for Face Verification (2005) (9)
- Face Liveness Detection Competition (LivDet-Face) - 2021 (2021) (9)
- On the Recognition Performance of BioHash-Protected Finger Vein Templates (2019) (9)
- Face Authentication with Salient Local Features and Static Bayesian Network (2007) (9)
- Within- and cross- database evaluations for face gender classification via befit protocols (2014) (9)
- The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database (2020) (8)
- Bi-modal authentication in mobile environments using session variability modelling (2012) (8)
- Impact of eye detection error on face recognition performance (2015) (8)
- Enhancing Trust in eAssessment - the TeSLA System Solution (2019) (8)
- Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets (2020) (7)
- Multispectral Biometrics System Framework: Application to Presentation Attack Detection (2020) (7)
- Heterogeneous Face Recognition Using Inter-Session Variability Modelling (2016) (7)
- Deep Auto-Encoding and Biohashing for Secure Finger Vein Recognition (2021) (7)
- On the Improvements of Uni-modal and Bi-modal Fusions of Speaker and Face Recognition for Mobile Biometrics (2013) (6)
- A State-of-the-art Neural Network for Robust Face Verification (2002) (6)
- Gradient-based spectral visualization of CNNs using raw waveforms (2018) (6)
- Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques (2021) (6)
- Joint operation of voice biometrics and presentation attack detection (2016) (6)
- Master Face Attacks on Face Recognition Systems (2021) (6)
- Face Verification using Gabor filtering and adapted Gaussian Mixture Models (2012) (6)
- Subjective and Objective Evaluation of Deepfake Videos (2021) (6)
- The Idiap Speaker Recognition Evaluation System at NIST SRE 2012 (2012) (6)
- Introducing crossmodal biometrics: Person identification from distinct audio & visual streams (2010) (6)
- Improving Generalization of Deepfake Detection by Training for Attribution (2021) (5)
- On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models (2021) (5)
- Improving Generalization of Deepfake Detection With Data Farming and Few-Shot Learning (2022) (5)
- Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator (2019) (5)
- A comparative study of two state-ofthe-art sequence processing techniques for hand gesture recognition (2009) (5)
- BEAT: An Open-Science Web Platform (2017) (4)
- Towards Protecting Face Embeddings in Mobile Face Verification Scenarios (2021) (4)
- MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron (2022) (4)
- Bob Speaks Kaldi (2017) (4)
- Fast speaker verification on mobile phone data using boosted slice classifiers (2011) (4)
- Bayesian Networks to Combine Intensity and Color Information in Face Recognition (2009) (4)
- Face Reconstruction from Deep Facial Embeddings using a Convolutional Neural Network (2022) (4)
- An alternative scanning strategy to detect faces (2010) (4)
- Anti-spoofing, Face Databases (2015) (4)
- Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (2010) (4)
- CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR (2020) (4)
- Presentation attack detection in voice biometrics (2017) (3)
- A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings (2019) (3)
- An Introduction to Vein Presentation Attacks and Detection (2019) (3)
- Towards quantifying the entropy of fingervein patterns across different feature extractors (2018) (3)
- Eight Years of Face Recognition Research: Reproducibility, Achievements and Open Issues (2022) (3)
- The I4U Submission to the 2012 NIST Speaker Recognition Evaluation (2012) (3)
- Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics (2022) (3)
- Visual processing-inspired fern-audio features for noise-robust speaker verification (2010) (2)
- On the detection of morphing attacks generated by GANs (2022) (2)
- Anti-spoofing, Evaluation Methodologies (2015) (2)
- Vein Enhancement with Deep Auto-Encoders to improve Finger Vein Recognition (2021) (2)
- Audio-Visual Processing in Meetings : Seven Questions and Some AMI Answers (2006) (2)
- Boosting localized binary features for speech recognition (2012) (2)
- Biometric Face Authentication Using Pixel-Based Weak Classifiers (2004) (2)
- Face Verification using LDA and MLP on the BANCA database (2003) (2)
- Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR (2022) (2)
- Multi-channel Face Presentation Attack Detection Using Deep Learning (2021) (2)
- Improving Face Verification using Symmetric Transformation (2003) (2)
- Boosting Pixel-based Classifiers for Face Verification (2003) (2)
- Benchmarking of Cancelable Biometrics for Deep Templates (2023) (1)
- On Improving Face Detection Performance by Modelling Contextual Information (2010) (1)
- Evaluation Protocols and Comparative Results for the Triesch Hand Posture Database (2002) (1)
- Anti-Spoofing: Face Databases (2014) (1)
- Face Authentication using Client-specific Matching Pursuit (2004) (1)
- Face Detection using Ferns (2011) (1)
- Supervised Domain Adaptation for Text-Independent Speaker Verification Using Limited Data (2020) (1)
- IDIAP Martigny-Valais-Suisse CONFIDENCE MEASURES FOR MULTIMODAL IDENTITY VERIFICATION (2002) (1)
- Continuous Speech Recognition using Boosted Binary Features (2011) (1)
- ICB 2013 - Competition on speaker recognition in mobile environment using the MOBIO database: The Evaluation Plan (2012) (1)
- An overview of palmvein biometrics (2018) (1)
- MASK-MORPH: Does Morphing of Custom 3D Face Masks Threatens the Face Recognition Systems? (2022) (1)
- A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection (2022) (1)
- Face detection using boosted Jaccard distance-based regression (2012) (1)
- The Threat of Deepfakes to Computer and Human Visions (2022) (1)
- Face liveness detection using dynamic texture (2014) (1)
- Face Video Competition at ICB2009 (2009) (1)
- Spoofing Deep Face Recognition with Custom Flexible Masks (2017) (1)
- DOMAIN ADAPTATION AND INVESTIGATION OF ROBUSTNESS OF DNN-BASED EMBEDDINGS FOR TEXT-INDEPENDENT SPEAKER VERIFICATION USING DILATED RESIDUAL NETWORKS (2019) (1)
- An anomaly detection approach for backdoored neural networks: face recognition as a case study (2022) (0)
- PAID I CONTINUOUS SPEECH RECOGNITION USING BOOSTED BINARY FEATURES Anindya (2011) (0)
- EVALUATION IN MOBILE ENVIRONMENT (2013) (0)
- Custom Attribution Loss for Improving Generalization and Interpretability of Deepfake Detection (2022) (0)
- MONTH YEAR 2 Feature Extractor SW-Based Liveness Detection Sensor HW-Based Liveness Detection Rest of the Biometric Recognition System Attack : Spoofing Attack : Synthetic / Reconstructed Samples (2013) (0)
- Con dence Measures for Multimodal Identity Veri cation ? (2003) (0)
- PAID I CROSS-POLLINATION OF NORMALISATION TECHNIQUES FROM SPEAKER TO FACE AUTHENTICATION USING GAUSSIAN MIXTURE MODELS (2012) (0)
- ROBUST-TO-ILLUMINATION FACE LOCALISATION (2006) (0)
- Joint Bi-Modal Face and Speaker Authentication using Explicit Polynomial Expansion (2007) (0)
- Deep Convolutional Neural Networks: from recognition to anti-spoofing (2021) (0)
- 06-07 Active Shape Models Using Local Binary Patterns (2006) (0)
- Title Mobile multimedia services based on user attention profiles (2011) (0)
- Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection (2022) (0)
- Scalable Probabilistic Models: Applied to Face Identification in the Wild (2014) (0)
- Media on the web, in post-production and broadcasting: the practitioner day of the ACM 2009 International Conference on Image and Video Retrieval (2009) (0)
- Annotation of face detection: description of XML format and files (2006) (0)
- Face Video Competition (Results) (2009) (0)
- EXPLICIT POLYNOMIAL EXPANSION (2007) (0)
- On-line unsupervised adaptation for face verification using Gaussian Mixture Models with multiple user models (2011) (0)
- BOOSTINGPIXEL -BASED CLASSIFIERS FORFACE VERIFICATION (2008) (0)
- Towards lifelong human assisted speaker diarization (2022) (0)
- Improving Face Verification Using Symmetric Transformation Improving Face Verification Using Symmetric Transformation (2003) (0)
- Face Recognition for Biometrics (2014) (0)
- ROBUST FACE PRESENTATION ATTACK DETECTION WITH MULTI-CHANNEL NEURAL NETWORKS (2022) (0)
- A video package for Torch (2004) (0)
- PAID I BIOMETRICS EVALUATION UNDER SPOOFING ATTACKS (2014) (0)
- Residual Feature Pyramid Network for Enhancement of Vascular Patterns (2022) (0)
- Indexing Protected Deep Face Templates by Frequent Binary Patterns (2022) (0)
- Multi-IVE: Privacy Enhancement of Multiple Soft-Biometrics in Face Embeddings (2023) (0)
- INARY P ATTERNS FOR F ACE A UTHENTICATION (2006) (0)
- eXtended Custom Silicone Mask Attack Dataset (XCSMAD) (2020) (0)
- Boosting Pixel-based Classifiers for Face Verification Boosting Pixel-based Classifiers for Face Verification Biometric Authentication Workshop (bioaw) in Conjunction with Eccv, 2004 (2007) (0)
- Measuring Linkability of Protected Biometric Templates Using Maximal Leakage (2023) (0)
- Fairness Index Measures to Evaluate Bias in Biometric Recognition (2022) (0)
- Benchmarking Face Detection in a Mobile / Tablet Environment (2011) (0)
- Speech & Face Based Biometric Authentication at Idiap Speech & Face Based Biometric Authentication at Idiap (2003) (0)
- Robust Face Verification using Skin Color and Neural Networks (2002) (0)
- Evaluation Databases (2014) (0)
- Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles (2022) (0)
- FACE BASED BIOMETRIC AUTHENTICATION AT IDIAP (2003) (0)
- Video processing and recognition (2012) (0)
- Face Detection on Hard Datasets (2011) (0)
- MULTIMODAL IDENTITY VERIFICATION (2001) (0)
- High-Quality Wide Multi-Channel Attack (HQ-WMCA) (2020) (0)
- Gender Classification by LUT Based Boosting of Overlapping Block Patterns (2015) (0)
- Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics (2023) (0)
- Face Anthropometry Aware Audio-visual Age Verification (2022) (0)
This paper list is powered by the following services: