Zobrazeno 1 - 10
of 102
pro vyhledávání: '"Research Line: Computer vision (CV)"'
Autor:
Matej Vitek, Abhijit Das, Diego Rafael Lucio, Luiz Antonio Zanlorensi, David Menotti, Jalil Nourmohammadi Khiarak, Mohsen Akbari Shahpar, Meysam Asgari-Chenaghlu, Farhang Jaryani, Juan E. Tapia, Andres Valenzuela, Caiyong Wang, Yunlong Wang, Zhaofeng He, Zhenan Sun, Fadi Boutros, Naser Damer, Jonas Henry Grebe, Arjan Kuijper, Kiran Raja, Gourav Gupta, Georgios Zampoukis, Lazaros Tsochatzidis, Ioannis Pratikakis, S. V. Aruna Kumar, B. S. Harish, Umapada Pal, Peter Peer, Vitomir Struc
Publikováno v:
IEEE Transactions on Information Forensics and Security. 18:190-205
Bias and fairness of biometric algorithms have been key topics of research in recent years, mainly due to the societal, legal and ethical implications of potentially unfair decisions made by automated decision-making models. A considerable amount of
Autor:
Max von Buelow, Reimar Tausch, Martin Schurig, Volker Knauthe, Tristan Wirth, Stefan Guthe, Pedro Santos, Dieter W. Fellner
Publikováno v:
Journal on Computing and Cultural Heritage. 15:1-16
Over the years, photometric three-dimensional (3D) reconstruction gained increasing importance in several disciplines, especially in cultural heritage preservation. While increasing sizes of images and datasets enhanced the overall reconstruction res
Autor:
Biying Fu, Naser Damer
Publikováno v:
IET Biometrics. 11:359-382
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. A morphed image can be successfully verified to multiple identities. This operation, therefore, poses serious security issues related to the abili
Publikováno v:
IET Biometrics
Identity documents (or IDs) play an important role in verifying the identity of a person with wide applications in banks, travel, video-identification services and border controls. Replay or photocopied ID cards can be misused to pass ID control in u
Autor:
Tatjana Gruber-Rouh, Julian L. Wichmann, Leona S. Alizadeh, Lukas Lenga, Leon D. Gruenewald, Christoph Mader, Tommaso D'Angelo, Christian Booz, Silvio Mazziotti, Vitali Koch, Katrin Eichler, Thomas J. Vogl, Simon S. Martin, Stefan Wesarg, Ibrahim Yel, Nicole A Huizinga, Moritz H. Albrecht
Publikováno v:
Gruenewald, L D, Koch, V, Martin, S S, Yel, I, Eichler, K, Gruber-Rouh, T, Lenga, L, Wichmann, J L, Alizadeh, L S, Albrecht, M H, Mader, C, Huizinga, N A, D’Angelo, T, Mazziotti, S, Wesarg, S, Vogl, T J & Booz, C 2022, ' Diagnostic accuracy of quantitative dual-energy CT-based volumetric bone mineral density assessment for the prediction of osteoporosis-associated fractures ', European Radiology, vol. 32, no. 5, pp. 3076-3084 . https://doi.org/10.1007/s00330-021-08323-9
European Radiology, 32(5), 3076-3084. Springer Verlag
European Radiology, 32(5), 3076-3084. Springer Verlag
Objectives To evaluate the predictive value of volumetric bone mineral density (BMD) assessment of the lumbar spine derived from phantomless dual-energy CT (DECT)-based volumetric material decomposition as an indicator for the 2-year occurrence risk
Autor:
Bo Peters, Gesche Blume-Werry, Alexander Gillert, Sarah Schwieger, Uwe Freiherr von Lukas, Juergen Kreyling
Publikováno v:
Scientific Reports. 13
Plant roots influence many ecological and biogeochemical processes, such as carbon, water and nutrient cycling. Because of difficult accessibility, knowledge on plant root growth dynamics in field conditions, however, is fragmentary at best. Minirhiz
Autor:
Gillert, Alexander, Resente, Giulia, Anadon-Rosell, Alba, Wilmking, Martin, Lukas, Uwe Freiherr Von
We address the problem of detecting tree rings in microscopy images of shrub cross sections. This can be regarded as a special case of the instance segmentation task with several unique challenges such as the concentric circular ring shape of the obj
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ca57602b01f59184b2b1733addabfe8
Autor:
Fang, Meiling
The vulnerability of biometric recognition to presentation attacks (PAs) has been widely recognized and has attracted increasing attention as it enables attackers to impersonate authentic users. Presentation attack detection (PAD), aiming at automati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1538a9f7029dceb55b65549ced4a5635
http://tuprints.ulb.tu-darmstadt.de/23814/
http://tuprints.ulb.tu-darmstadt.de/23814/
Purpose: The acquisition conditions of medical imaging are often precisely defined, leading to a high homogeneity among different data sets. Nonetheless, outliers or artefacts still appear and need to be reliably detected to ensure a reliable diagnos
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::45d773560ae145a0a43a227dda86e0db
Autor:
Krivek, Gabriella, Gillert, Alexander, Harder, Martin, Fritze, Marcus, Frankowski, Karina, Timm, Luisa, Meyer‐Olbersleben, Liska, Lukas, Uwe Freiherr von, Kerth, Gerald, Schaik, Jaap van
Automated monitoring technologies can increase the efficiency of ecological data collection and support data-driven conservation. Camera traps coupled with infrared light barriers can be used to monitor temperate-zone bat assemblages at underground h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______610::e979395d16ea11b526e6ceb0d7b0d314
https://publica.fraunhofer.de/handle/publica/442026
https://publica.fraunhofer.de/handle/publica/442026