2015
DOI: 10.1016/j.patcog.2015.05.021
|View full text |Cite
|
Sign up to set email alerts
|

Facial aging and asymmetry decomposition based approaches to identification of twins

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…Later, Active Appearance Models (AAM) (Cootes et al, 2001) were adopted in several works to unify the facial shape and texture (i.e. wrinkles) features for age estimation (Lanitis et al, 2004;Luu et al, 2009a;Choi et al, 2011;Zhang and Yeung, 2010;Chang et al, 2011;Duong et al, 2011;Xu et al, 2011Xu et al, , 2015Le et al, 2015;Luu, 2010;Chen et al, 2011).…”
Section: Age Progressionmentioning
confidence: 99%
“…Later, Active Appearance Models (AAM) (Cootes et al, 2001) were adopted in several works to unify the facial shape and texture (i.e. wrinkles) features for age estimation (Lanitis et al, 2004;Luu et al, 2009a;Choi et al, 2011;Zhang and Yeung, 2010;Chang et al, 2011;Duong et al, 2011;Xu et al, 2011Xu et al, , 2015Le et al, 2015;Luu, 2010;Chen et al, 2011).…”
Section: Age Progressionmentioning
confidence: 99%
“…Supervised deep learning models have recently achieved numerous breakthrough results in various applications, for example, Image Classification [1][2][3], Object Detection [4][5][6], Face Recognition [7][8][9][10][11][12][13][14], Image Segmentation [15,16] and Generative Model [17][18][19][20][21][22]. However, these methods usually require a huge number of annotated data, which is highly expensive.…”
Section: Introductionmentioning
confidence: 99%
“…technologies [25], there is no apparent technique to inverse that embedding process to reconstruct the faces of a subject given his/her extracted features from those engines. Some Blackbox Adversarial Attack approaches [20,21,44] have partially addressed this task by analyzing the gradients of the classifier's outputs to generate adversarial examples that mislead the behaviour of that classifier.…”
Section: Introductionmentioning
confidence: 99%