Sorry, you need to enable JavaScript to visit this website.

Biometrics

Securing smartphone handwritten PIN codes with recurrent neural networks

Paper Details

Authors:
Gaël LE LAN, Vincent FREY
Submitted On:
15 May 2019 - 6:21am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

icassp_3080.pdf

(17)

Keywords

Subscribe

[1] Gaël LE LAN, Vincent FREY, "Securing smartphone handwritten PIN codes with recurrent neural networks", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4521. Accessed: Jul. 17, 2019.
@article{4521-19,
url = {http://sigport.org/4521},
author = {Gaël LE LAN; Vincent FREY },
publisher = {IEEE SigPort},
title = {Securing smartphone handwritten PIN codes with recurrent neural networks},
year = {2019} }
TY - EJOUR
T1 - Securing smartphone handwritten PIN codes with recurrent neural networks
AU - Gaël LE LAN; Vincent FREY
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4521
ER -
Gaël LE LAN, Vincent FREY. (2019). Securing smartphone handwritten PIN codes with recurrent neural networks. IEEE SigPort. http://sigport.org/4521
Gaël LE LAN, Vincent FREY, 2019. Securing smartphone handwritten PIN codes with recurrent neural networks. Available at: http://sigport.org/4521.
Gaël LE LAN, Vincent FREY. (2019). "Securing smartphone handwritten PIN codes with recurrent neural networks." Web.
1. Gaël LE LAN, Vincent FREY. Securing smartphone handwritten PIN codes with recurrent neural networks [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4521

AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION


This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and experimental results show the trade-off between the security and error rates.

Paper Details

Authors:
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy
Submitted On:
13 May 2019 - 9:23am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

conference_poster_4.pdf

(11)

Keywords

Subscribe

[1] Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy, "AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4486. Accessed: Jul. 17, 2019.
@article{4486-19,
url = {http://sigport.org/4486},
author = {Marzieh Gheisari; Teddy Furon; Laurent Amsaleg; Behrooz Razeghi; Slava Voloshynovskiy },
publisher = {IEEE SigPort},
title = {AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION},
year = {2019} }
TY - EJOUR
T1 - AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION
AU - Marzieh Gheisari; Teddy Furon; Laurent Amsaleg; Behrooz Razeghi; Slava Voloshynovskiy
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4486
ER -
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. (2019). AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION. IEEE SigPort. http://sigport.org/4486
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy, 2019. AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION. Available at: http://sigport.org/4486.
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. (2019). "AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION." Web.
1. Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4486

AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION


This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and experimental results show the trade-off between the security and error rates.

Paper Details

Authors:
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy
Submitted On:
13 May 2019 - 9:23am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

conference_poster_4.pdf

(12)

Keywords

Subscribe

[1] Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy, "AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4484. Accessed: Jul. 17, 2019.
@article{4484-19,
url = {http://sigport.org/4484},
author = {Marzieh Gheisari; Teddy Furon; Laurent Amsaleg; Behrooz Razeghi; Slava Voloshynovskiy },
publisher = {IEEE SigPort},
title = {AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION},
year = {2019} }
TY - EJOUR
T1 - AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION
AU - Marzieh Gheisari; Teddy Furon; Laurent Amsaleg; Behrooz Razeghi; Slava Voloshynovskiy
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4484
ER -
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. (2019). AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION. IEEE SigPort. http://sigport.org/4484
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy, 2019. AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION. Available at: http://sigport.org/4484.
Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. (2019). "AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION." Web.
1. Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. AGGREGATION AND EMBEDDING FOR GROUP MEMBERSHIP VERIFICATION [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4484

CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION


Deep neural networks (DNNs) have recently achieved impressive performances on various applications. However, recent researches show that DNNs are vulnerable to adversarial perturbations injected into input samples. In this paper, we investigate a defense method for face verification: a deep residual generative network (ResGN) is learned to clean adversarial perturbations. We propose a novel training framework composed of ResGN, pre-trained VGG-Face network and FaceNet network.

Paper Details

Authors:
Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu
Submitted On:
8 May 2019 - 4:59am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster苏玉莹.pdf

(17)

Keywords

Subscribe

[1] Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu, "CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4052. Accessed: Jul. 17, 2019.
@article{4052-19,
url = {http://sigport.org/4052},
author = {Yuying Su; Guangling Sun; Weiqi Fan; Xiaofeng Lu; Zhi Liu },
publisher = {IEEE SigPort},
title = {CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION},
year = {2019} }
TY - EJOUR
T1 - CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION
AU - Yuying Su; Guangling Sun; Weiqi Fan; Xiaofeng Lu; Zhi Liu
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4052
ER -
Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu. (2019). CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION. IEEE SigPort. http://sigport.org/4052
Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu, 2019. CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION. Available at: http://sigport.org/4052.
Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu. (2019). "CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION." Web.
1. Yuying Su, Guangling Sun, Weiqi Fan, Xiaofeng Lu, Zhi Liu. CLEANING ADVERSARIAL PERTURBATIONS VIA RESIDUAL GENERATIVE NETWORK FOR FACE VERIFICATION [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4052

DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK


Nowadays, speech spoofing is so common that it presents a great challenge to social security. Thus, it is of great significance to recognize a spoofed speech from a genuine one. Most of the current researches have focused on voice conversion (VC), synthesis and recapture which mimic a target speaker to break through ASV systems by increased false acceptance rates. However, there exists another type of spoofing, voice transformation (VT), that transforms a speech signal without a target in order ‘not to be recognized’ by increased false reject rates. VT has received much less attention.

Paper Details

Authors:
Yong Wang, Zhuoyi Su
Submitted On:
8 May 2019 - 3:15am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Paper #1311.pdf

(17)

Keywords

Subscribe

[1] Yong Wang, Zhuoyi Su, "DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4031. Accessed: Jul. 17, 2019.
@article{4031-19,
url = {http://sigport.org/4031},
author = {Yong Wang; Zhuoyi Su },
publisher = {IEEE SigPort},
title = {DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK},
year = {2019} }
TY - EJOUR
T1 - DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK
AU - Yong Wang; Zhuoyi Su
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4031
ER -
Yong Wang, Zhuoyi Su. (2019). DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK. IEEE SigPort. http://sigport.org/4031
Yong Wang, Zhuoyi Su, 2019. DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK. Available at: http://sigport.org/4031.
Yong Wang, Zhuoyi Su. (2019). "DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK." Web.
1. Yong Wang, Zhuoyi Su. DETECTION OF VOICE TRANSFORMATION SPOOFING BASED ON DENSE CONVOLUTIONAL NETWORK [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4031

ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION


This paper introduces a deep neural network based feature extraction scheme that aims to improve the trade-off between utility and privacy in speaker classification tasks. In the proposed scenario we develop a feature representation that helps to maximize the performance of a gender classifier while minimizing additional speaker

Paper Details

Authors:
Rainer Martin
Submitted On:
8 May 2019 - 2:50am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP2019_poster_Nelus.pdf

(17)

Subscribe

[1] Rainer Martin, "ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4027. Accessed: Jul. 17, 2019.
@article{4027-19,
url = {http://sigport.org/4027},
author = {Rainer Martin },
publisher = {IEEE SigPort},
title = {ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION},
year = {2019} }
TY - EJOUR
T1 - ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION
AU - Rainer Martin
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4027
ER -
Rainer Martin. (2019). ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION. IEEE SigPort. http://sigport.org/4027
Rainer Martin, 2019. ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION. Available at: http://sigport.org/4027.
Rainer Martin. (2019). "ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION." Web.
1. Rainer Martin. ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4027

ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION

Paper Details

Authors:
Submitted On:
8 May 2019 - 2:50am
Short Link:
Type:
Paper Code:
Document Year:
Cite

Document Files

ICASSP2019_poster_Nelus.pdf

(15)

Subscribe

[1] , "ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4025. Accessed: Jul. 17, 2019.
@article{4025-19,
url = {http://sigport.org/4025},
author = { },
publisher = {IEEE SigPort},
title = {ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION},
year = {2019} }
TY - EJOUR
T1 - ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION
AU -
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4025
ER -
. (2019). ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION. IEEE SigPort. http://sigport.org/4025
, 2019. ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION. Available at: http://sigport.org/4025.
. (2019). "ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION." Web.
1. . ICASSP 2019 Poster for Paper #3198: PRIVACY-AWARE FEATURE EXTRACTION FOR GENDER DISCRIMINATION VERSUS SPEAKER IDENTIFICATION [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4025

Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing


In recent years, morphing of facial images has arisen as an important attack vector on biometric systems. Detection of morphed images has proven challenging for automated systems and human experts alike. Likewise, in recent years, the importance of efficient (fast) biometric identification has been emphasised by the rapid rise and growth of large-scale biometric systems around the world.

Paper Details

Authors:
P. Drozdowski, C. Rathgeb, C. Busch
Submitted On:
8 May 2019 - 2:08am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Poster for paper 4438: "Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing"

(15)

Keywords

Subscribe

[1] P. Drozdowski, C. Rathgeb, C. Busch, "Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4016. Accessed: Jul. 17, 2019.
@article{4016-19,
url = {http://sigport.org/4016},
author = {P. Drozdowski; C. Rathgeb; C. Busch },
publisher = {IEEE SigPort},
title = {Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing},
year = {2019} }
TY - EJOUR
T1 - Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing
AU - P. Drozdowski; C. Rathgeb; C. Busch
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4016
ER -
P. Drozdowski, C. Rathgeb, C. Busch. (2019). Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing. IEEE SigPort. http://sigport.org/4016
P. Drozdowski, C. Rathgeb, C. Busch, 2019. Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing. Available at: http://sigport.org/4016.
P. Drozdowski, C. Rathgeb, C. Busch. (2019). "Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing." Web.
1. P. Drozdowski, C. Rathgeb, C. Busch. Poster: Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4016

Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation

Paper Details

Authors:
Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez
Submitted On:
8 October 2018 - 3:08am
Short Link:
Type:
Event:
Presenter's Name:

Document Files

Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation

(163)

Keywords

Subscribe

[1] Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez, "Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3615. Accessed: Jul. 17, 2019.
@article{3615-18,
url = {http://sigport.org/3615},
author = {Ester Gonzalez-Sosa; Julian Fierrez; Ruben Vera-Rodriguez and Fernando Alonso-Fernandez },
publisher = {IEEE SigPort},
title = {Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation},
year = {2018} }
TY - EJOUR
T1 - Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation
AU - Ester Gonzalez-Sosa; Julian Fierrez; Ruben Vera-Rodriguez and Fernando Alonso-Fernandez
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3615
ER -
Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez. (2018). Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation. IEEE SigPort. http://sigport.org/3615
Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez, 2018. Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation. Available at: http://sigport.org/3615.
Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez. (2018). "Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation." Web.
1. Ester Gonzalez-Sosa, Julian Fierrez, Ruben Vera-Rodriguez and Fernando Alonso-Fernandez. Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation and COTS Evaluation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3615

KNOT MAGNIFY LOSS FOR FACE RECOGNITION

Paper Details

Authors:
Qiang Rao, Bing Yu, Yun Yang, Bailan Feng
Submitted On:
7 October 2018 - 9:36pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Knot Loss For Face Recognition poster.pdf

(23)

Keywords

Subscribe

[1] Qiang Rao, Bing Yu, Yun Yang, Bailan Feng, "KNOT MAGNIFY LOSS FOR FACE RECOGNITION", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3604. Accessed: Jul. 17, 2019.
@article{3604-18,
url = {http://sigport.org/3604},
author = {Qiang Rao; Bing Yu; Yun Yang; Bailan Feng },
publisher = {IEEE SigPort},
title = {KNOT MAGNIFY LOSS FOR FACE RECOGNITION},
year = {2018} }
TY - EJOUR
T1 - KNOT MAGNIFY LOSS FOR FACE RECOGNITION
AU - Qiang Rao; Bing Yu; Yun Yang; Bailan Feng
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3604
ER -
Qiang Rao, Bing Yu, Yun Yang, Bailan Feng. (2018). KNOT MAGNIFY LOSS FOR FACE RECOGNITION. IEEE SigPort. http://sigport.org/3604
Qiang Rao, Bing Yu, Yun Yang, Bailan Feng, 2018. KNOT MAGNIFY LOSS FOR FACE RECOGNITION. Available at: http://sigport.org/3604.
Qiang Rao, Bing Yu, Yun Yang, Bailan Feng. (2018). "KNOT MAGNIFY LOSS FOR FACE RECOGNITION." Web.
1. Qiang Rao, Bing Yu, Yun Yang, Bailan Feng. KNOT MAGNIFY LOSS FOR FACE RECOGNITION [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3604

Pages