DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4
hits: 31
1.
  • Towards More Efficient Secu... Towards More Efficient Security Inspection via Deep Learning: A Task-Driven X-ray Image Cropping Scheme
    Nguyen, Hong Duc; Cai, Rizhao; Zhao, Heng ... Micromachines, 03/2022, Volume: 13, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    X-ray imaging machines are widely used in border control checkpoints or public transportation, for luggage scanning and inspection. Recent advances in deep learning enabled automatic object detection ...
Full text
Available for: UL
2.
  • DRL-FAS: A Novel Framework ... DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing
    Cai, Rizhao; Li, Haoliang; Wang, Shiqi ... IEEE transactions on information forensics and security, 2021, Volume: 16
    Journal Article
    Peer reviewed

    Inspired by the philosophy employed by human beings to determine whether a presented face example is genuine or not, i.e., to glance at the example globally first and then carefully observe the local ...
Full text
Available for: UL

PDF
3.
  • Distortion Model-Based Spec... Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection
    Chen, Changsheng; Li, Bokang; Cai, Rizhao ... IEEE transactions on information forensics and security, 2024, Volume: 19
    Journal Article
    Peer reviewed

    Document recapturing is a presentation attack that covers the forensic traces in the digital domain. Document presentation attack detection (DPAD) is an important step in the document authentication ...
Full text
Available for: UL
4.
  • Learning Meta Pattern for F... Learning Meta Pattern for Face Anti-Spoofing
    Cai, Rizhao; Li, Zhi; Wan, Renjie ... IEEE transactions on information forensics and security, 2022, Volume: 17
    Journal Article
    Peer reviewed

    Face Anti-Spoofing (FAS) is essential to secure face recognition systems and has been extensively studied in recent years. Although deep neural networks (DNNs) for the FAS task have achieved ...
Full text
Available for: UL
5.
  • Rethinking Vision Transform... Rethinking Vision Transformer and Masked Autoencoder in Multimodal Face Anti-Spoofing
    Yu, Zitong; Cai, Rizhao; Cui, Yawen ... International journal of computer vision, 06/2024
    Journal Article
    Peer reviewed
    Open access

    Abstract Recently, vision transformer (ViT) based multimodal learning methods have been proposed to improve the robustness of face anti-spoofing (FAS) systems. However, there are still no works to ...
Full text
Available for: UL
6.
  • A Copy-Proof Scheme Based o... A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models
    Chen, Changsheng; Li, Mulin; Ferreira, Anselmo ... IEEE transactions on information forensics and security, 2020, Volume: 15
    Journal Article
    Peer reviewed

    The traditional two-dimensional (2D) barcode has been employed in anti-counterfeiting systems as a storage media for serial numbers. However, an attack can be initiated by simply copying the 2D ...
Full text
Available for: UL
7.
  • S-Adapter: Generalizing Vis... S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens
    Cai, Rizhao; Yu, Zitong; Kong, Chenqi ... IEEE transactions on information forensics and security, 06/2024
    Journal Article
    Peer reviewed
    Open access

    Face Anti-Spoofing (FAS) aims to detect malicious attempts to invade a face recognition system by presenting spoofed faces. State-of-the-art FAS techniques predominantly rely on deep learning models ...
Full text
Available for: UL
8.
Full text
Available for: CEKLJ, UL
9.
  • One-Class Knowledge Distill... One-Class Knowledge Distillation for Face Presentation Attack Detection
    Li, Zhi; Cai, Rizhao; Li, Haoliang ... IEEE transactions on information forensics and security, 2022, Volume: 17
    Journal Article
    Peer reviewed
    Open access

    Face presentation attack detection (PAD) has been extensively studied by research communities to enhance the security of face recognition systems. Although existing methods have achieved good ...
Full text
Available for: UL
10.
  • Image Inpainting Detection ... Image Inpainting Detection via Enriched Attentive Pattern with Near Original Image Augmentation
    Yang, Wenhan; Cai, Rizhao; Kot, Alex Proceedings of the 30th ACM International Conference on Multimedia, 10/2022
    Conference Proceeding

    As deep learning-based inpainting methods have achieved increasingly better results, its malicious use, e.g. removing objects to report fake news or to provide fake evidence, is becoming threatening. ...
Full text
Available for: UL
1 2 3 4
hits: 31

Load filters