Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline
Related publications (46)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The present article evaluates the knowledge that can be attributed to the application of « Best Practices » in the field of urban habitat. It especially aims at identifying the conditions of innovation in such a setting, as well as defining the necessary c ...
Developing new techniques for human-computer interaction is very challenging. Vision-based techniques have the advantage of being unobtrusive and hands are a natural device that can be used for more intuitive interfaces. But in order to use hands for inter ...
Developing new techniques for human-computer interaction is very challenging. Vision-based techniques have the advantage of being unobtrusive and hands are a natural device that can be used for more intuitive interfaces. But in order to use hands for inter ...
The conditional indirect utility of many random utility maximization (RUM) discrete choice models is specified as a sum of an index V depending on observables and an independent random term P. In general, the universe of RUM consistent models is much large ...
We provide the definition and a complete characterization of regular affine processes. This type of process unifies the concepts of continuousstate branching processes with immigration and Ornstein-Uhlenbeck type processes. We show, and provide foundations ...
After more than a century of research, the mechanisms underlying visual masking are still hotly debated. One key characteristic of masking is that variations in the stimulus onset asynchrony (SOA) between the target and the mask can lead to either monotoni ...
Association for Research in Vision and Ophthalmology2007
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the part of the user. Therefore, users cannot automatically be expected to follow ...
Institute of Electrical and Electronics Engineers2008
Multimodal signals can be defined in general as signals originating from the same physical source, but acquired through different devices, techniques or protocols. This applies for example to audio-visual signals, medical or satellite images. Understanding ...
Early stages of hot-electron thermalization in small gold nanoparticles wrapped in an adsorbates shell have been investigated by femtosecond transient absorption spectroscopy. Type-I hot electrons thermalize in 800 fs (to form type-II hot electron) either ...
Le site de Vidy est une vaste zone de verdure sur les bords du lac Léman, entièrement dédiée aux sports et loisirs de plein air, ainsi qu'aux activités culturelles. Le projet consiste en l'implantation d'un stade de 4500 places dédié au tennis dans la cont ...