Picture for Naser Damer

Naser Damer

ID-Booth: Identity-consistent Face Generation with Diffusion Models

Add code
Apr 10, 2025
Viaarxiv icon

SelfMAD: Enhancing Generalization and Robustness in Morphing Attack Detection via Self-Supervised Learning

Add code
Apr 07, 2025
Viaarxiv icon

Frequency Matters: Explaining Biases of Face Recognition in the Frequency Domain

Add code
Jan 28, 2025
Viaarxiv icon

MADation: Face Morphing Attack Detection with Foundation Models

Add code
Jan 08, 2025
Viaarxiv icon

FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection

Add code
Jan 06, 2025
Figure 1 for FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection
Figure 2 for FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection
Figure 3 for FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection
Figure 4 for FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection
Viaarxiv icon

KVC-onGoing: Keystroke Verification Challenge

Add code
Dec 29, 2024
Figure 1 for KVC-onGoing: Keystroke Verification Challenge
Figure 2 for KVC-onGoing: Keystroke Verification Challenge
Figure 3 for KVC-onGoing: Keystroke Verification Challenge
Figure 4 for KVC-onGoing: Keystroke Verification Challenge
Viaarxiv icon

Second FRCSyn-onGoing: Winning Solutions and Post-Challenge Analysis to Improve Face Recognition with Synthetic Data

Add code
Dec 02, 2024
Viaarxiv icon

FRoundation: Are Foundation Models Ready for Face Recognition?

Add code
Oct 31, 2024
Figure 1 for FRoundation: Are Foundation Models Ready for Face Recognition?
Figure 2 for FRoundation: Are Foundation Models Ready for Face Recognition?
Figure 3 for FRoundation: Are Foundation Models Ready for Face Recognition?
Figure 4 for FRoundation: Are Foundation Models Ready for Face Recognition?
Viaarxiv icon

First Competition on Presentation Attack Detection on ID Card

Add code
Aug 31, 2024
Figure 1 for First Competition on Presentation Attack Detection on ID Card
Figure 2 for First Competition on Presentation Attack Detection on ID Card
Figure 3 for First Competition on Presentation Attack Detection on ID Card
Figure 4 for First Competition on Presentation Attack Detection on ID Card
Viaarxiv icon

A Survey on Drowsiness Detection -- Modern Applications and Methods

Add code
Aug 23, 2024
Viaarxiv icon