An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol.
Shervin Rahimzadeh ArashlooJosef KittlerPublished in: IJCB (2017)
Keyphrases
- anomaly detection
- intrusion detection
- detect anomalies
- detecting anomalies
- network intrusion detection
- detecting anomalous
- anomalous behavior
- intrusion detection system
- behavior analysis
- computer security
- unsupervised anomaly detection
- network anomaly detection
- malware detection
- network traffic
- unsupervised learning
- one class support vector machines
- cumulative sum
- machine learning
- network security
- knowledge discovery
- feature vectors
- object recognition
- liveness detection