Picture for Anderson Rocha

Anderson Rocha

Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision

Add code
Jul 13, 2021
Figure 1 for Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision
Figure 2 for Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision
Figure 3 for Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision
Figure 4 for Detect and Locate: A Face Anti-Manipulation Approach with Semantic and Noise-level Supervision
Viaarxiv icon

Benchmarking Scientific Image Forgery Detectors

Add code
May 26, 2021
Viaarxiv icon

Unsupervised and self-adaptative techniques for cross-domain person re-identification

Add code
Mar 26, 2021
Figure 1 for Unsupervised and self-adaptative techniques for cross-domain person re-identification
Figure 2 for Unsupervised and self-adaptative techniques for cross-domain person re-identification
Figure 3 for Unsupervised and self-adaptative techniques for cross-domain person re-identification
Figure 4 for Unsupervised and self-adaptative techniques for cross-domain person re-identification
Viaarxiv icon

Content-Based Detection of Temporal Metadata Manipulation

Add code
Mar 08, 2021
Figure 1 for Content-Based Detection of Temporal Metadata Manipulation
Figure 2 for Content-Based Detection of Temporal Metadata Manipulation
Figure 3 for Content-Based Detection of Temporal Metadata Manipulation
Figure 4 for Content-Based Detection of Temporal Metadata Manipulation
Viaarxiv icon

Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?

Add code
Apr 30, 2020
Figure 1 for Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?
Figure 2 for Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?
Figure 3 for Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?
Figure 4 for Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?
Viaarxiv icon

Learning Transformation-Aware Embeddings for Image Forensics

Add code
Jan 13, 2020
Figure 1 for Learning Transformation-Aware Embeddings for Image Forensics
Figure 2 for Learning Transformation-Aware Embeddings for Image Forensics
Figure 3 for Learning Transformation-Aware Embeddings for Image Forensics
Figure 4 for Learning Transformation-Aware Embeddings for Image Forensics
Viaarxiv icon

An In-Depth Study on Open-Set Camera Model Identification

Add code
Apr 11, 2019
Figure 1 for An In-Depth Study on Open-Set Camera Model Identification
Figure 2 for An In-Depth Study on Open-Set Camera Model Identification
Figure 3 for An In-Depth Study on Open-Set Camera Model Identification
Figure 4 for An In-Depth Study on Open-Set Camera Model Identification
Viaarxiv icon

Needle in a Haystack: A Framework for Seeking Small Objects in Big Datasets

Add code
Apr 10, 2019
Figure 1 for Needle in a Haystack: A Framework for Seeking Small Objects in Big Datasets
Figure 2 for Needle in a Haystack: A Framework for Seeking Small Objects in Big Datasets
Figure 3 for Needle in a Haystack: A Framework for Seeking Small Objects in Big Datasets
Figure 4 for Needle in a Haystack: A Framework for Seeking Small Objects in Big Datasets
Viaarxiv icon

FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning

Add code
Feb 07, 2019
Figure 1 for FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning
Figure 2 for FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning
Figure 3 for FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning
Figure 4 for FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning
Viaarxiv icon

Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection

Add code
Nov 25, 2018
Figure 1 for Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
Figure 2 for Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
Figure 3 for Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
Figure 4 for Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
Viaarxiv icon