Use of in-the-wild images for anomaly detection in face anti-spoofing.
Latifah AbduhIoannis P. IvrissimtzisPublished in: CoRR (2020)
Keyphrases
- anomaly detection
- intrusion detection
- anomalous behavior
- input image
- detecting anomalies
- network intrusion detection
- intrusion detection system
- one class support vector machines
- malware detection
- detect anomalies
- network traffic
- detecting anomalous
- unsupervised learning
- network anomaly detection
- behavior analysis
- unsupervised anomaly detection
- network security
- negative selection algorithm
- connectionist systems
- machine learning
- human subjects
- maximum likelihood
- data analysis
- pattern recognition
- training data