A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Robustness of Face Recognition Algorithms Against Attacks and Bias
[article]
2020
arXiv
pre-print
Different types of attacks such as physical presentation attacks, disguise/makeup, digital adversarial attacks, and morphing/tampering using GANs have been discussed. ...
Despite the enhanced accuracies, robustness of these algorithms against attacks and bias has been challenged. ...
Nagpal is supported via the TCS PhD fellowship. M. Vatsa is also supported through the Swarnajayanti Fellowship by the Government of India, ...
arXiv:2002.02942v1
fatcat:d54z6d47hbe5pgij4y4p7nwf2m
On the Robustness of Face Recognition Algorithms Against Attacks and Bias
2020
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
Different types of attacks such as physical presentation attacks, disguise/makeup, digital adversarial attacks, and morphing/tampering using GANs have been discussed. ...
Despite the enhanced accuracies, robustness of these algorithms against attacks and bias has been challenged. ...
Nagpal is supported via the TCS PhD fellowship. M. Vatsa is also supported through the Swarnajayanti Fellowship by the Government of India, ...
doi:10.1609/aaai.v34i09.7085
fatcat:i5ffpurug5divotc65x6kb346q
3D Face Anti-spoofing with Factorized Bilinear Coding
[article]
2020
arXiv
pre-print
We have witnessed rapid advances in both face presentation attack models and presentation attack detection (PAD) in recent years. ...
Our method, based on factorized bilinear coding of multiple color channels (namely MC\_FBC), targets at learning subtle fine-grained differences between real and fake images. ...
A network based on transfer learning using a pre-trained VGG-16 model architecture is presented in [42] to recognize photo, video and 3D mask attacks. ...
arXiv:2005.06514v3
fatcat:whvinwbehfap5o4dtm5u54i2qa
Periocular Biometrics: A Modality for Unconstrained Scenarios
[article]
2023
arXiv
pre-print
, and detection; (b) identity recognition, including combination with other modalities and use of various spectra; and (c) ocular soft-biometric analysis. ...
The COVID-19 pandemic has further highlighted its importance, as the ocular region remained the only visible facial area even in controlled settings due to the widespread use of masks. ...
The most common attack, presentation attack (also known as spoofing), consists in presenting a fake biometric sample to the sensor. ...
arXiv:2212.13792v2
fatcat:ydn3pfcfrrho7fzojzoxwcnaxe
Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor
2019
KSII Transactions on Internet and Information Systems
In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. ...
However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. ...
Repesentation [42]
0.75
-
0.00
-
Codebook [45]
-
2.75
14.00
8.00
29.87
Deep dictionary via greedy learning
(DDGL) [46]
-
0.00
1.3
0.00
16.50
Proposed method
0.00
0.00
0.00
2.44
26.00 ...
doi:10.3837/tiis.2019.02.022
fatcat:benkum63q5gnhpntmuf6xn4wnq
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
[chapter]
2012
Lecture Notes in Computer Science
The backdoor was found amongst additional JTAG functionality and exists on the silicon itself, it was not present in any firmware loaded onto the chip. ...
This way an attacker can extract all the configuration data from the chip, reprogram crypto and access keys, modify low-level silicon features, access unencrypted configuration bitstream or permanently ...
This permits a new and disturbing possibility of a large scale Stuxnet-type attack via a network or the Internet on the silicon itself. ...
doi:10.1007/978-3-642-33027-8_2
fatcat:tbcqe3s6ubhnnfholsxc6v5du4
Face Recognition: A Novel Multi-Level Taxonomy based Survey
[article]
2019
arXiv
pre-print
Following the proposed taxonomy, a comprehensive survey of representative face recognition solutions is presented. ...
, electronic devices displaying a face or silicon face masks. ...
This may facilitate the deployment of deep face models on resource-constrained embedded devices such as mobile devices [97] . Face presentation attack detection for face recognition security -Despite ...
arXiv:1901.00713v1
fatcat:ofks5jqf6fca3e4l27nph6eiri
AI/ML Algorithms and Applications in VLSI Design and Technology
[article]
2023
arXiv
pre-print
Employing AI and machine learning (ML) algorithms in VLSI design and manufacturing reduces the time and effort for understanding and processing the data within and across different abstraction levels via ...
automated learning algorithms. ...
ML can aid in detecting hardware attacks and could take necessary counter-attacks with suitable design [319] . ...
arXiv:2202.10015v2
fatcat:ej3pdqucqna3hlxbiq4mzmbl5y
Emerging Biometrics: Deep Inference and Other Computational Intelligence
[article]
2020
arXiv
pre-print
Biometric-enabled systems are evolving towards deep learning and deep inference using the principles of adaptive computing, - the front tides of the modern computational intelligence domain. ...
The authors of [108] have introduced a novel detector of the facial silicone mask presentation attack based on a multilevel deep dictionary via greedy learning. ...
Good performance is reported in various tasks, in particular, in silicon face mask detection [108] and hair style recognition [135] . ...
arXiv:2006.11971v1
fatcat:k6aunuoxc5apbb347vy2lj7bsq
2020 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 39
2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Chang, W., +, TCAD Aug. 2020 1662-1673 SRAF Insertion via Supervised Dictionary Learning. ...
Seghaier, I., +, TCAD Feb. 2020 294-307 SRAF Insertion via Supervised Dictionary Learning. ...
., +, TCAD Dec. 2020 4828-4841 High-Level Synthesis Design Space Exploration: Past, Present, and Future. Schafer, B.C., +, TCAD Oct. 2020 ...
doi:10.1109/tcad.2021.3054536
fatcat:wsw3olpxzbeclenhex3f73qlw4
Dictionary Based Renovation from Minuzie to Image
2015
International Journal of Science and Research (IJSR)
The orientation patch dictionary is used to renovate the orientation field from minuzie, while the continuous phase patch dictionary is used to renovate the ridge pattern. ...
In this paper, the previous experience about fingerprint ridge structures is conceal in terms of orientation patch and continuous phase patch dictionaries to improve the fingerprint renovation. ...
While the introduction of compact silicon chip-based sensors that capture only part of the fingerprint has made this problem important from a commercial perspective, there is also considerable interest ...
doi:10.21275/v4i11.27101501
fatcat:o4ib2qwclfclnb5d3yi3ye2pc4
BIOSIG 2020 - Komplettband
2020
Biometrics and Electronic Signatures
We address that by presenting a specifically collected database containing three session, each with three different capture instructions, to simulate realistic use cases. ...
However, the pandemic led to the wide use of face masks, essential to keep the pandemic under control. ...
Acknowledgments This research is based upon work supported by the Ministry of Electronics and Information Technology (MeitY), Government of India, under Grant (No.4 (13)/2019-ITEA). ...
dblp:conf/biosig/X20
fatcat:hkqvegujqbatdlopbzclkxdive
Camera Invariant Feature Learning for Generalized Face Anti-spoofing
[article]
2021
arXiv
pre-print
The first branch aims to learn the camera invariant spoofing features via feature level decomposition in the high frequency domain. ...
There has been an increasing consensus in learning based face anti-spoofing that the divergence in terms of camera models is causing a large domain gap in real application scenarios. ...
In [35] , a multi-level deep dictionary learning based method was proposed especially for the silicone mask attacks. ...
arXiv:2101.10075v1
fatcat:3obmibbf6rbgjbroajpej2at44
Machine Learning-Based Condition Monitoring for PV Systems: State of the Art and Future Prospects
2021
Energies
Accordingly, this review primarily investigates the different learning architectures used (i.e., ordinary, hybrid, and ensemble) in relation to their learning frameworks (i.e., traditional and deep learning ...
A just-in-time task to deal with several naturally occurring faults can be correctly undertaken via the cooperation of effective detection, diagnosis, and prognostic analyses. ...
[67] suggested a supervised and unsupervised dictionary learning approach to detect disconnect (open-circuit) faults in PV modules. ...
doi:10.3390/en14196316
fatcat:4ul3nm3sdza7vk5tynyup2cmiq
Systematic Literature Review of EM-SCA Attacks on Encryption
[article]
2024
arXiv
pre-print
Electromagnetic side-channel analysis (EM-SCA) gathers information by monitoring EM radiation, capable of retrieving encryption keys and detecting malicious activity. ...
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to side-channel attacks (SCAs), physical assaults exploiting power consumption and EM radiation. ...
Device Type EM Capture Machine Learning Deep Learning Key Recovery ...
arXiv:2402.10030v1
fatcat:xumgsh3owve7loebtcr7lbmxf4
« Previous
Showing results 1 — 15 out of 358 results