News
WDSU investigates the tool that has helped catch fugitives but sparked a fierce debate over privacy, power and public trust.
Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single ...
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the ...
Learn how to train a neural network to recognize hand-drawn digits using PyTorch! A fun and beginner-friendly intro to deep learning and computer vision. Top economist warns America is heading ...
This project, developed with VS Code, Jupyter Notebook and Google Colab, uses Python (Flask, Pytorch, face_recognition, and more) and Postman (for API Testing) to develop two implementations of ...
As the Milwaukee Police Department moves to expand its use of facial recognition technology, a June report from the federal government finds this technology continues to disproportionately misidentify ...
Folders and files ... Repository files navigation face-recognition-attendance About No description, website, or topics provided.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results