2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020
DOI: 10.1109/cvpr42600.2020.00851
|View full text |Cite
|
Sign up to set email alerts
|

Single-Side Domain Generalization for Face Anti-Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
162
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 237 publications
(162 citation statements)
references
References 27 publications
0
162
0
Order By: Relevance
“…Poor generalizability is more serious in earlier DL-based methods [3]. And, in recent works [30][31][32], such defect is significantly improved.…”
Section: Deep Learning-based Methodsmentioning
confidence: 99%
“…Poor generalizability is more serious in earlier DL-based methods [3]. And, in recent works [30][31][32], such defect is significantly improved.…”
Section: Deep Learning-based Methodsmentioning
confidence: 99%
“…Since the above methods did not pay attention to the cross-dataset setting, MADDG [Shao et al, 2019] utilized multiple domain discriminators to learn a generalized feature space. While SSDG [Jia et al, 2020] only aligned the features of real samples from different datasets but not for the features of the fake ones. Moreover, [Chen et al, 2021] proposed D 2 AM to settle a more challenging generalizable scenario in the real world where domain labels are unknown.…”
Section: Face Anti-spoofingmentioning
confidence: 99%
“…To overcome the limitation, some researchers introduce the domain generalization (DG) methods for face presentation attack detection, which utilize several source domains to improve the generalization abilities of the model. Based on it, existing methods [Shao et al, 2019;Jia et al, 2020] attempt to align the features of multiple source data equally for a shared feature space. However, for some samples are little domain-biased and some ones are large domain-biased, training on such samples indiscriminately will corrupt the generalization abilities of the methods.…”
Section: Introductionmentioning
confidence: 99%
“…To tackle this problem, zero-shot/fewshot learning [32], [33], on-class representation [34], and anomaly detection [35], [36], [37] approaches are used. Domain adaptation algorithms are also used to tackle the problem [38], [39], [40], [41], [42], [43].…”
Section: Dnnsmentioning
confidence: 99%