A proposal of social graph analysis for nursery schools using face authentication systems

被引:0
|
作者
Tomioka T.
Abe S.
Hasegawa M.
机构
关键词
D O I
10.3169/itej.71.J151
中图分类号
学科分类号
摘要
[No abstract available]
引用
收藏
页码:J151 / J154
页数:3
相关论文
共 50 条
  • [1] A Study of Social Graph Analysis for Preschool Education Using Face Authentication Pruning for Centrality Optimization in Graph Analysis
    Tomioka, Tsuyoshi
    Hasegawa, Makoto
    Shiraishi, Shojiro
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 569 - 574
  • [2] Frontal face authentication using morphological elastic graph matching
    Kotropoulos, C
    Tefas, A
    Pitas, I
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (04) : 555 - 560
  • [3] Face authentication by using elastic graph matching and support vector machines
    Tefas, A
    Kotropoulos, C
    Pitas, I
    2000 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, PROCEEDINGS, VOLS I-VI, 2000, : 2409 - 2412
  • [4] Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method
    Musa, Arbena
    Vishi, Kamer
    Rexha, Blerim
    APPLIED ARTIFICIAL INTELLIGENCE, 2021, 35 (15) : 1346 - 1360
  • [5] User Authentication in Social Networking Sites using Face Recognition
    Kauri, Prabujeet
    Singh, Aruni
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 773 - 778
  • [6] Using support vector machines for face authentication based on elastic graph matching
    Tefas, A
    Kotropoulos, C
    Pitas, I
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 29 - 32
  • [7] Poisoning attacks on face authentication systems by using the generative deformation model
    Chak-Tong Chan
    Szu-Hao Huang
    Patrick Puiyui Choy
    Multimedia Tools and Applications, 2023, 82 : 29457 - 29476
  • [8] Poisoning attacks on face authentication systems by using the generative deformation model
    Chan, Chak-Tong
    Huang, Szu-Hao
    Choy, Patrick Puiyui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (19) : 29457 - 29476
  • [9] Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems
    Wang, Min
    Abbass, Hussein A.
    Hu, Jiankun
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [10] Using support vector machines to enhance the performance of elastic graph matching for frontal face authentication
    Tefas, A
    Kotropoulos, C
    Pitas, I
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2001, 23 (07) : 735 - 746