×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [3]
计算技术研究所 [2]
西藏大学 [2]
清华大学 [1]
北京航空航天大学 [1]
水生生物研究所 [1]
更多...
内容类型
期刊论文 [13]
会议论文 [3]
发表日期
2023 [1]
2021 [2]
2019 [2]
2018 [3]
2017 [1]
2014 [1]
更多...
学科主题
Zoology [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Deep Learning for Face Anti-Spoofing: A Survey
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5609-5631
作者:
Yu, Zitong
;
Qin, Yunxiao
;
Li, Xiaobai
;
Zhao, Chenxu
;
Lei, Zhen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/16
Face recognition
Deep learning
Cameras
Task analysis
Sensors
Protocols
Three-dimensional displays
Face anti-spoofing
presentation attack
deep learning
pixel-wise supervision
multi-modal
domain generalization
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing
期刊论文
PATTERN RECOGNITION, 2021, 卷号: 115, 页码: 13
作者:
Jia, Yunpei
;
Zhang, Jie
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2021/12/01
Face anti-spoofing
Face presentation attack detection
Domain adaptation
Deep learning
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 56-69
作者:
Wang, Guoqing
;
Han, Hu
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2020/12/10
Face
Feature extraction
Testing
Adaptation models
Databases
Deep learning
Three-dimensional displays
Face presentation attack detection
face liveness detection
face anti-spoofing
adversarial domain adaptation
metric learning
disentangled representation
Hierarchical 2-D Feature Coding for Secure Pilot Authentication in Multi-User Multi-Antenna OFDM Systems: A Reliability Bound Contraction Perspective
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 592-607
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2019/11/19
channel training
multi-user OFDM
Physical-layer authentication
anti-attack
hierarchical 2-D feature coding
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 387-402
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/11/19
channel training
Physical-layer authentication
OFDM
anti-attack
independence-checking coding
E-business information fuzzy retrieval system based on block chain anti-attack algorithm
期刊论文
2018, 页码: 1-12
作者:
Gao, Fei
;
Basu, M.A.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/15
Block
chain
anti-attack
algorithm
e-business
information
fuzzy
retrieval
syste
E-business information fuzzy retrieval system based on block chain anti-attack algorithm.
期刊论文
2018, 卷号: Vol.35 No.4, 页码: 4475-4486
作者:
Gao, Fei
;
Basu, M.A.
;
Fernández-Martínez, Manuel
;
Guirao, Juan L.G.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/04/15
anti-attack
algorithm
Block
chain
e-business
information
fuzzy
retrieval
syste.
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 卷号: 56, 期号: 1
作者:
Zhang, Yue
;
Ye, Dengpan
;
Gan, Junjun
;
Li, Zhenyu
;
Cheng, Qingfeng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Image steganography
anti-scaling attack
anti-statistical detection
quantization index modulation
A Whole-Process WiFi Security Perception Software System
期刊论文
2017 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEM AND SIMULATION (ICCSS 2017), 2017, 页码: 151-156
作者:
Ao, Shiliang
;
Huang, Heqing
;
Ja, Yan
;
Hu, Yanjun
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/04/24
WiFi
whole-process
rogue AP recognition
anti-sniffing
deauth attack
A Guidance Law with Impact Angle Constraint for Anti-ship Missiles Cooperative Attack
会议论文
2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014-01-01
作者:
Wu Xiaolong
;
Wu Sentang
;
Xing Zhihui
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
Anti-ship missile
Cooperative Attack
Guidance Law
Time Cooperation
Impact Angle
©版权所有 ©2017 CSpace - Powered by
CSpace