Alert button
Picture for Anil K. Jain

Anil K. Jain

Alert button

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Add code
Bookmark button
Alert button
Oct 09, 2019
Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain

Figure 1 for Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Figure 2 for Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Figure 3 for Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Figure 4 for Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Viaarxiv icon

White-Box Evaluation of Fingerprint Matchers

Add code
Bookmark button
Alert button
Sep 23, 2019
Steven A. Grosz, Joshua J. Engelsma, Nicholas G. Paulter Jr., Anil K. Jain

Figure 1 for White-Box Evaluation of Fingerprint Matchers
Figure 2 for White-Box Evaluation of Fingerprint Matchers
Figure 3 for White-Box Evaluation of Fingerprint Matchers
Figure 4 for White-Box Evaluation of Fingerprint Matchers
Viaarxiv icon

Learning a Fixed-Length Fingerprint Representation

Add code
Bookmark button
Alert button
Sep 21, 2019
Joshua J. Engelsma, Kai Cao, Anil K. Jain

Figure 1 for Learning a Fixed-Length Fingerprint Representation
Figure 2 for Learning a Fixed-Length Fingerprint Representation
Figure 3 for Learning a Fixed-Length Fingerprint Representation
Figure 4 for Learning a Fixed-Length Fingerprint Representation
Viaarxiv icon

AdvFaces: Adversarial Face Synthesis

Add code
Bookmark button
Alert button
Aug 14, 2019
Debayan Deb, Jianbang Zhang, Anil K. Jain

Figure 1 for AdvFaces: Adversarial Face Synthesis
Figure 2 for AdvFaces: Adversarial Face Synthesis
Figure 3 for AdvFaces: Adversarial Face Synthesis
Figure 4 for AdvFaces: Adversarial Face Synthesis
Viaarxiv icon

OCT Fingerprints: Resilience to Presentation Attacks

Add code
Bookmark button
Alert button
Jul 31, 2019
Tarang Chugh, Anil K. Jain

Figure 1 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 2 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 3 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 4 for OCT Fingerprints: Resilience to Presentation Attacks
Viaarxiv icon

End-to-End Pore Extraction and Matching in Latent Fingerprints: Going Beyond Minutiae

Add code
Bookmark button
Alert button
May 30, 2019
Dinh-Luan Nguyen, Anil K. Jain

Figure 1 for End-to-End Pore Extraction and Matching in Latent Fingerprints: Going Beyond Minutiae
Figure 2 for End-to-End Pore Extraction and Matching in Latent Fingerprints: Going Beyond Minutiae
Figure 3 for End-to-End Pore Extraction and Matching in Latent Fingerprints: Going Beyond Minutiae
Figure 4 for End-to-End Pore Extraction and Matching in Latent Fingerprints: Going Beyond Minutiae
Viaarxiv icon

Recurrent Embedding Aggregation Network for Video Face Recognition

Add code
Bookmark button
Alert button
Apr 26, 2019
Sixue Gong, Yichun Shi, Anil K. Jain, Nathan D. Kalka

Figure 1 for Recurrent Embedding Aggregation Network for Video Face Recognition
Figure 2 for Recurrent Embedding Aggregation Network for Video Face Recognition
Figure 3 for Recurrent Embedding Aggregation Network for Video Face Recognition
Figure 4 for Recurrent Embedding Aggregation Network for Video Face Recognition
Viaarxiv icon

Probabilistic Face Embeddings

Add code
Bookmark button
Alert button
Apr 25, 2019
Yichun Shi, Anil K. Jain, Nathan D. Kalka

Figure 1 for Probabilistic Face Embeddings
Figure 2 for Probabilistic Face Embeddings
Figure 3 for Probabilistic Face Embeddings
Figure 4 for Probabilistic Face Embeddings
Viaarxiv icon