Picture for Clemens Seibold

Clemens Seibold

Towards Better Morphed Face Images without Ghosting Artifacts

Add code
Dec 13, 2023
Viaarxiv icon

From Explanations to Segmentation: Using Explainable AI for Image Segmentation

Add code
Feb 01, 2022
Figure 1 for From Explanations to Segmentation: Using Explainable AI for Image Segmentation
Figure 2 for From Explanations to Segmentation: Using Explainable AI for Image Segmentation
Figure 3 for From Explanations to Segmentation: Using Explainable AI for Image Segmentation
Figure 4 for From Explanations to Segmentation: Using Explainable AI for Image Segmentation
Viaarxiv icon

Automated Damage Inspection of Power Transmission Towers from UAV Images

Add code
Nov 30, 2021
Figure 1 for Automated Damage Inspection of Power Transmission Towers from UAV Images
Figure 2 for Automated Damage Inspection of Power Transmission Towers from UAV Images
Figure 3 for Automated Damage Inspection of Power Transmission Towers from UAV Images
Figure 4 for Automated Damage Inspection of Power Transmission Towers from UAV Images
Viaarxiv icon

Focused LRP: Explainable AI for Face Morphing Attack Detection

Add code
Mar 26, 2021
Figure 1 for Focused LRP: Explainable AI for Face Morphing Attack Detection
Figure 2 for Focused LRP: Explainable AI for Face Morphing Attack Detection
Figure 3 for Focused LRP: Explainable AI for Face Morphing Attack Detection
Figure 4 for Focused LRP: Explainable AI for Face Morphing Attack Detection
Viaarxiv icon

Style Your Face Morph and Improve Your Face Morphing Attack Detector

Add code
Apr 23, 2020
Figure 1 for Style Your Face Morph and Improve Your Face Morphing Attack Detector
Figure 2 for Style Your Face Morph and Improve Your Face Morphing Attack Detector
Figure 3 for Style Your Face Morph and Improve Your Face Morphing Attack Detector
Figure 4 for Style Your Face Morph and Improve Your Face Morphing Attack Detector
Viaarxiv icon

Reflection Analysis for Face Morphing Attack Detection

Add code
Jul 05, 2018
Figure 1 for Reflection Analysis for Face Morphing Attack Detection
Figure 2 for Reflection Analysis for Face Morphing Attack Detection
Figure 3 for Reflection Analysis for Face Morphing Attack Detection
Figure 4 for Reflection Analysis for Face Morphing Attack Detection
Viaarxiv icon

Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks

Add code
Jun 11, 2018
Figure 1 for Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks
Figure 2 for Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks
Figure 3 for Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks
Figure 4 for Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks
Viaarxiv icon