Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CTM

2015

Source-Target-Source Classification Using Stacked Denoising Autoencoders

Authors
Kandaswamy, C; Silva, LM; Cardoso, JS;

Publication
PATTERN RECOGNITION AND IMAGE ANALYSIS (IBPRIA 2015)

Abstract
Deep Transfer Learning (DTL) emerged as a new paradigm in machine learning in which a deep model is trained on a source task and the knowledge acquired is then totally or partially transferred to help in solving a target task. Even though DTL offers a greater flexibility in extracting high-level features and enabling feature transference from a source to a target task, the DTL solution might get stuck at local minima leading to performance degradation-negative transference-, similar to what happens in the classical machine learning approach. In this paper, we propose the Source-Target-Source (STS) methodology to reduce the impact of negative transference, by iteratively switching between source and target tasks in the training process. The results show the effectiveness of such approach.

2015

Pattern Recognition and Image Analysis - 7th Iberian Conference, IbPRIA 2015, Santiago de Compostela, Spain, June 17-19, 2015, Proceedings

Authors
Paredes, R; Cardoso, JS; Pardo, XM;

Publication
IbPRIA

Abstract

2015

Fingerprint Liveness Detection in the Presence of Capable Intruders

Authors
Sequeira, AF; Cardoso, JS;

Publication
SENSORS

Abstract
Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

2015

Preface

Authors
Paredes, R; Cardoso, JS; Pardo, XM;

Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abstract

2015

Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part III

Authors
Bifet, A; May, M; Zadrozny, B; Gavaldà, R; Pedreschi, D; Bonchi, F; Cardoso, JS; Spiliopoulou, M;

Publication
ECML/PKDD (3)

Abstract

2015

The vitality of pattern recognition and image analysis

Authors
Micó, L; Sanches, JM; Cardoso, JS;

Publication
Neurocomputing

Abstract

  • 231
  • 368