跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.14) 您好!臺灣時間:2025/12/25 06:38
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:蕭勝興
研究生(外文):Sheng-Hsing Hsiao
論文名稱:透過重新排序與近似最鄰近搜尋以改進基於殘差網路之人臉特徵擷取器
論文名稱(外文):Improving ResNet-based Feature Extractor for Face Recognition via Re-ranking and Approximate Nearest Neighbor Search
指導教授:張智星張智星引用關係
指導教授(外文):Jyh-Shing Roger Jang
口試委員:傅楸善楊建生
口試委員(外文):Chiou-Shann Fuh Jason Young
口試日期:2019-06-26
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:英文
論文頁數:70
中文關鍵詞:深度殘差網絡特徵向量抽取人臉識別人臉驗證重新排序近似最近鄰搜索
DOI:10.6342/NTU201900707
相關次數:
  • 被引用被引用:0
  • 點閱點閱:218
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
深度殘差網絡 (ResNet) 是圖像分類和物件偵測中最先進的架構之一,當網路架構中最後一層被移除時,它可以當作一個良好的特徵向量抽取器。將人臉轉換成特徵向量後,一些任務例如人臉識別、人臉驗證,就可以使用一些距離測量方法來實現。我們提出了一個基於ResNet特徵提取器的人臉識別框架,並加上其他改善性能的步驟,包括人臉偵測,人臉對齊,人臉驗證/識別以及透過近似最近鄰搜索 (ANNS) 來重新排序。首先,我們在三個常見的人臉檢測資料集上評估兩種人臉偵測演算法,MTCNN和FaceBoxes,接著總結這兩種方法的最佳使用場景。其次,經過特定的預處理和後處理,我們的系統選擇基於ResNet的特徵提取器,並在LFW資料集中達到99.33%的驗證準確度。第三,我們使用懲罰曲線來確定最佳配置並獲得良好的臉部驗證結果。最後,基於這篇論文提出的重新排序策略,我們的方法在大型類別間變異數據集 (在CASIA-faceV5資料集上提升1.47%,在CASIA-WebFace資料集上提高2.28%) 與大型類別內變異數據集 (在FG-NET資料集上提高1.3%,在CACD資料集上提高2.43%) 上都能使辨識率上升。
Deep residual network (ResNet) is one of the state-of-the-art architectures in image classification and object detection, which can serve as a robust feature extractor when the last layer is removed. Once the faces are embedded as feature vectors, tasks such as face recognition, verification and identification can be easily implemented using some distance measurements. This paper proposes a framework for face recognition based on feature extractor from ResNet, together with other steps for improving its performance, including face detection, face alignment, face verification/identification, and re-ranking via Approximate Nearest Neighbor Search (ANNS). First, we evaluate two face detection algorithms, MTCNN, and FaceBoxes on three common face detection benchmarks, and then summarize the best usage scenario for each approach. Second, with certain preprocessing and postprocessing, our system selects the ResNet-based feature extractor, which achieves 99.33% verification accuracy on LFW benchmark. Third, we use the penalty curve to determine the best configuration and obtain improved results of face verification. Lastly, based on the proposed re-ranking policy, our method not only boosts the accuracy in large inter-class variation datasets (1.47% and 2.28% improvement in rank-1 accuracy for CASIA-faceV5 and CASIA-WebFace respectively) but also in large intra-class variation datasets (1.3% and 2.43% improvement in rank-1 accuracy for FG-NET and CACD respectively).
口試委員會審定書 i
致謝 ii
摘要 iii
Abstract iv
Contents v
List of Figures vii
List of Tables ix
1 Introduction 1
2 Related Work 5
2.1 Face Detection 5
2.2 Face Alignment 9
2.3 Face Identification and Verification 10
2.3.1 Face representation 11
2.3.2 Discriminative metric learning 12
2.4 Approximate Nearest Neighbor Search 16
2.5 Re-ranking for object retrieval 20
3 Methods 21
3.1 Face Detection 22
3.1.1 MTCNN 22
3.1.2 FaceBoxes 23
3.2 Face Alignment 24
3.3 Face Feature Extractor 26
3.4 Approximate Nearest Neighbors Search 27
3.5 Re-ranking Policy 29
4 Experiments 33
4.1 Evaluation of Face Detection 33
4.1.1 Benchmark evaluation 34
4.1.2 Face Detection Runtime Efficiency 36
4.1.3 Face Detection Conclusion 37
4.2 Evaluation of Face Verification 37
4.2.1 Performance on LFW 38
4.2.2 Performance on CASIA-FaceV5 and Helen dataset 39
4.2.3 Alignment and Average 41
4.3 Evaluation of Face Identification 43
4.3.1 Experiments on CASIA-FaceV5 44
4.3.2 Experiments on CASIA-WebFace 45
4.3.3 Experiments on FG-NET 47
4.3.4 Experiments on CACD 49
4.4 Parameter Analysis 51
5 Conclusions and Discussions 53
Reference 54
[1]A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," Communications of the ACM, vol. 51, no. 1, p. 117, 2008.
[2]A. Andoni and I. Razenshteyn, "Optimal data-dependent hashing for approximate near neighbors," in Proceedings of the forty-seventh annual ACM symposium on Theory of computing, 2015: ACM, pp. 793-801.
[3]A. Asthana, S. Zafeiriou, S. Cheng, and M. Pantic, "Robust discriminative response map fitting with constrained local models," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2013, pp. 3444-3451.
[4]M. Aumüller, E. Bernhardsson, and A. Faithfull, "ANN-benchmarks: A benchmarking tool for approximate nearest neighbor algorithms," Information Systems, 2019.
[5]S. Bai and X. Bai, "Sparse contextual activation for efficient visual re-ranking," IEEE Transactions on Image Processing, vol. 25, no. 3, pp. 1056-1069, 2016.
[6]A. Bansal, C. Castillo, R. Ranjan, and R. Chellappa, "The do''s and don''ts for cnn-based face verification," in Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 2545-2554.
[7]P. N. Belhumeur, D. W. Jacobs, D. J. Kriegman, and N. Kumar, "Localizing parts of faces using a consensus of exemplars," IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 12, pp. 2930-2940, 2013.
[8]J. L. Bentley, "Multidimensional binary search trees used for associative searching," Communications of the ACM, vol. 18, no. 9, pp. 509-517, 1975.
[9]A. Beygelzimer, S. Kakade, and J. Langford, "Cover trees for nearest neighbor," in Proceedings of the 23rd international conference on Machine learning, 2006: ACM, pp. 97-104.
[10]L. Bourdev and J. Brandt, "Robust object detection via soft cascade," in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR''05), 2005, vol. 2: IEEE, pp. 236-243.
[11]S. C. Brubaker, J. Wu, J. Sun, M. D. Mullin, and J. M. Rehg, "On the design of cascades of boosted ensembles for face detection," International Journal of Computer Vision, vol. 77, no. 1-3, pp. 65-86, 2008.
[12]Q. Cao, L. Shen, W. Xie, O. M. Parkhi, and A. Zisserman, "Vggface2: A dataset for recognising faces across pose and age," in 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), 2018: IEEE, pp. 67-74.
[13]B.-C. Chen, C.-S. Chen, and W. H. Hsu, "Cross-age reference coding for age-invariant face recognition and retrieval," in European Conference on Computer Vision, 2014: Springer, pp. 768-783.
[14]B.-C. Chen, C.-S. Chen, and W. H. Hsu, "Face recognition and retrieval using cross-age reference coding with cross-age celebrity dataset," IEEE Transactions on Multimedia, vol. 17, no. 6, pp. 804-815, 2015.
[15]D. Chen, X. Cao, F. Wen, and J. Sun, "Blessing of dimensionality: High-dimensional feature and its efficient compression for face verification," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013, pp. 3025-3032.
[16]O. Chum, J. Philbin, J. Sivic, M. Isard, and A. Zisserman, "Total recall: Automatic query expansion with a generative feature model for object retrieval," in 2007 IEEE 11th International Conference on Computer Vision, 2007: IEEE, pp. 1-8.
[17]P. Ciaccia, M. Patella, and P. Zezula, "M-tree: An E cient Access Method for Similarity Search in Metric Spaces," in Proceedings of the 23rd VLDB conference, Athens, Greece, 1997: Citeseer, pp. 426-435.
[18]J. Dai, Y. Li, K. He, and J. Sun, "R-fcn: Object detection via region-based fully convolutional networks," in Advances in neural information processing systems, 2016, pp. 379-387.
[19]S. Dasgupta and Y. Freund, "Random projection trees and low dimensional manifolds," in STOC, 2008, vol. 8: Citeseer, pp. 537-546.
[20]M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proceedings of the twentieth annual symposium on Computational geometry, 2004: ACM, pp. 253-262.
[21]S. Deerwester, S. T. Dumais, G. W. Furnas, T. K. Landauer, and R. Harshman, "Indexing by latent semantic analysis," Journal of the American society for information science, vol. 41, no. 6, pp. 391-407, 1990.
[22]J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," arXiv preprint arXiv:1801.07698, 2018.
[23]J. Deng, Y. Zhou, and S. Zafeiriou, "Marginal loss for deep face recognition," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 60-68.
[24]C. Ding and D. Tao, "Robust face recognition via multimodal deep face representation," IEEE Transactions on Multimedia, vol. 17, no. 11, pp. 2049-2058, 2015.
[25]M. Everingham, L. Van Gool, C. K. Williams, J. Winn, and A. Zisserman, "The pascal visual object classes (voc) challenge," International journal of computer vision, vol. 88, no. 2, pp. 303-338, 2010.
[26]S. S. Farfade, M. J. Saberian, and L.-J. Li, "Multi-view face detection using deep convolutional neural networks," in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, 2015: ACM, pp. 643-650.
[27]T. Ge, K. He, Q. Ke, and J. Sun, "Optimized product quantization for approximate nearest neighbor search," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013, pp. 2946-2953.
[28]A. Gionis, P. Indyk, and R. Motwani, "Similarity search in high dimensions via hashing," in Vldb, 1999, vol. 99, no. 6, pp. 518-529.
[29]R. Girshick, J. Donahue, T. Darrell, and J. Malik, "Rich feature hierarchies for accurate object detection and semantic segmentation," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 580-587.
[30]D. Gong, Z. Li, D. Lin, J. Liu, and X. Tang, "Hidden factor analysis for age invariant face recognition," in Proceedings of the IEEE international conference on computer vision, 2013, pp. 2872-2879.
[31]D. Gong, Z. Li, D. Tao, J. Liu, and X. Li, "A maximum entropy feature descriptor for age invariant face recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 5289-5297.
[32]Y. Guo, L. Zhang, Y. Hu, X. He, and J. Gao, "Ms-celeb-1m: A dataset and benchmark for large-scale face recognition," in European Conference on Computer Vision, 2016: Springer, pp. 87-102.
[33]K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770-778.
[34]P. Hu and D. Ramanan, "Finding tiny faces," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 951-959.
[35]G. B. Huang, H. Lee, and E. Learned-Miller, "Learning hierarchical representations for face verification with convolutional deep belief networks," in 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012: IEEE, pp. 2518-2525.
[36]G. B. Huang, M. Mattar, T. Berg, and E. Learned-Miller, "Labeled faces in the wild: A database forstudying face recognition in unconstrained environments," in Workshop on faces in''Real-Life''Images: detection, alignment, and recognition, 2008.
[37]P. Indyk and R. Motwani, "Approximate nearest neighbors: towards removing the curse of dimensionality," in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998: ACM, pp. 604-613.
[38]V. Jain and E. Learned-Miller, "Fddb: A benchmark for face detection in unconstrained settings," UMass Amherst Technical Report, 2010.
[39]H. Jegou, M. Douze, and C. Schmid, "Product quantization for nearest neighbor search," IEEE transactions on pattern analysis and machine intelligence, vol. 33, no. 1, pp. 117-128, 2010.
[40]H. Jiang and E. Learned-Miller, "Face detection with the faster R-CNN," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017: IEEE, pp. 650-657.
[41]A. Joly and O. Buisson, "A posteriori multi-probe locality sensitive hashing," in Proceedings of the 16th ACM international conference on Multimedia, 2008: ACM, pp. 209-218.
[42]V. Kazemi and J. Sullivan, "One millisecond face alignment with an ensemble of regression trees," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1867-1874.
[43]I. Kemelmacher-Shlizerman, S. M. Seitz, D. Miller, and E. Brossard, "The megaface benchmark: 1 million faces for recognition at scale," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 4873-4882.
[44]J. Kim, C. Liu, F. Sha, and K. Grauman, "Deformable spatial pyramid matching for fast dense correspondences," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013, pp. 2307-2314.
[45]D. E. King, "Dlib-ml: A machine learning toolkit," Journal of Machine Learning Research, vol. 10, no. Jul, pp. 1755-1758, 2009.
[46]B. F. Klare et al., "Pushing the frontiers of unconstrained face detection and recognition: Iarpa janus benchmark a," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1931-1939.
[47]A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, 2012, pp. 1097-1105.
[48]A. Kumar, R. Ranjan, V. Patel, and R. Chellappa, "Face alignment by local deep descriptor regression," arXiv preprint arXiv:1601.07950, 2016.
[49]V. Le, J. Brandt, Z. Lin, L. Bourdev, and T. S. Huang, "Interactive facial feature localization," in European conference on computer vision, 2012: Springer, pp. 679-692.
[50]E. Learned-Miller, G. B. Huang, A. RoyChowdhury, H. Li, and G. Hua, "Labeled faces in the wild: A survey," in Advances in face detection and facial image analysis: Springer, 2016, pp. 189-248.
[51]H. Li, Z. Lin, X. Shen, J. Brandt, and G. Hua, "A convolutional neural network cascade for face detection," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 5325-5334.
[52]S. Z. Li, L. Zhu, Z. Zhang, A. Blake, H. Zhang, and H. Shum, "Statistical learning of multi-view face detection," in European Conference on Computer Vision, 2002: Springer, pp. 67-81.
[53]Y. Li, B. Sun, T. Wu, and Y. Wang, "Face detection with end-to-end integration of a convnet and a 3d model," in European Conference on Computer Vision, 2016: Springer, pp. 420-436.
[54]Z. Li, U. Park, and A. K. Jain, "A discriminative model for age invariant face recognition," IEEE transactions on information forensics and security, vol. 6, no. 3, pp. 1028-1037, 2011.
[55]S. Liao, A. K. Jain, and S. Z. Li, "A fast and accurate unconstrained face detector," IEEE transactions on pattern analysis and machine intelligence, vol. 38, no. 2, pp. 211-223, 2015.
[56]L. Lin, G. Wang, W. Zuo, X. Feng, and L. Zhang, "Cross-domain visual matching via generalized similarity measure and feature learning," IEEE transactions on pattern analysis and machine intelligence, vol. 39, no. 6, pp. 1089-1102, 2016.
[57]J. Liu, Y. Deng, T. Bai, Z. Wei, and C. Huang, "Targeting ultimate accuracy: Face recognition via deep embedding," arXiv preprint arXiv:1506.07310, 2015.
[58]T. Liu, A. W. Moore, and A. Gray, "New algorithms for efficient high-dimensional nonparametric classification," Journal of Machine Learning Research, vol. 7, no. Jun, pp. 1135-1158, 2006.
[59]W. Liu et al., "Ssd: Single shot multibox detector," in European conference on computer vision, 2016: Springer, pp. 21-37.
[60]W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, "Sphereface: Deep hypersphere embedding for face recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 212-220.
[61]W. Liu, Y. Wen, Z. Yu, and M. Yang, "Large-margin softmax loss for convolutional neural networks," in ICML, 2016, vol. 2, no. 3, p. 7.
[62]Y. Liu, H. Li, and X. Wang, "Rethinking feature discrimination and polymerization for large-scale recognition," arXiv preprint arXiv:1710.00870, 2017.
[63]D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International journal of computer vision, vol. 60, no. 2, pp. 91-110, 2004.
[64]Q. Lv, W. Josephson, Z. Wang, M. Charikar, and K. Li, "Multi-probe LSH: efficient indexing for high-dimensional similarity search," in Proceedings of the 33rd international conference on Very large data bases, 2007: VLDB Endowment, pp. 950-961.
[65]Y. Malkov, A. Ponomarenko, A. Logvinov, and V. Krylov, "Approximate nearest neighbor algorithm based on navigable small world graphs," Information Systems, vol. 45, pp. 61-68, 2014.
[66]Y. A. Malkov and D. A. Yashunin, "Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs," IEEE transactions on pattern analysis and machine intelligence, 2018.
[67]M. Mathias, R. Benenson, M. Pedersoli, and L. Van Gool, "Face detection without bells and whistles," in European conference on computer vision, 2014: Springer, pp. 720-735.
[68]I. Matthews and S. Baker, "Active appearance models revisited," International journal of computer vision, vol. 60, no. 2, pp. 135-164, 2004.
[69]M. Muja and D. G. Lowe, "Scalable nearest neighbor algorithms for high dimensional data," IEEE transactions on pattern analysis and machine intelligence, vol. 36, no. 11, pp. 2227-2240, 2014.
[70]B. Naidan, L. Boytsov, and E. Nyberg, "Permutation search methods are efficient, yet faster search is possible," Proceedings of the VLDB Endowment, vol. 8, no. 12, pp. 1618-1629, 2015.
[71]G. Navarro, "Searching in metric spaces by spatial approximation," The VLDB Journal, vol. 11, no. 1, pp. 28-46, 2002.
[72]S. M. Omohundro, "Efficient algorithms with neural network behavior," Complex Systems, vol. 1, no. 2, pp. 273-347, 1987.
[73]M. Osadchy, Y. L. Cun, and M. L. Miller, "Synergistic face detection and pose estimation with energy-based models," Journal of Machine Learning Research, vol. 8, no. May, pp. 1197-1215, 2007.
[74]R. Panigrahy, "Entropy based nearest neighbor search in high dimensions," in Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, 2006: Society for Industrial and Applied Mathematics, pp. 1186-1195.
[75]O. M. Parkhi, A. Vedaldi, and A. Zisserman, "Deep face recognition," in bmvc, 2015, vol. 1, no. 3, p. 6.
[76]M.-T. Pham and T.-J. Cham, "Fast training and selection of haar features using statistics in boosting-based face detection," in 2007 IEEE 11th International Conference on Computer Vision, 2007: IEEE, pp. 1-7.
[77]F. P. Preparata and M. I. Shamos, Computational geometry: an introduction. Springer Science & Business Media, 2012.
[78]D. Qin, S. Gammeter, L. Bossard, T. Quack, and L. Van Gool, "Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors," in CVPR 2011, 2011: IEEE, pp. 777-784.
[79]H. Qin, J. Yan, X. Li, and X. Hu, "Joint training of cascaded CNN for face detection," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 3456-3465.
[80]D. Ramanan and X. Zhu, "Face detection, pose estimation, and landmark localization in the wild," in Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2012: Citeseer, pp. 2879-2886.
[81]R. Ranjan et al., "Crystal loss and quality pooling for unconstrained face verification and recognition," arXiv preprint arXiv:1804.01159, 2018.
[82]R. Ranjan, C. D. Castillo, and R. Chellappa, "L2-constrained softmax loss for discriminative face verification," arXiv preprint arXiv:1703.09507, 2017.
[83]R. Ranjan, V. M. Patel, and R. Chellappa, "A deep pyramid deformable part model for face detection," in 2015 IEEE 7th international conference on biometrics theory, applications and systems (BTAS), 2015: IEEE, pp. 1-8.
[84]R. Ranjan, V. M. Patel, and R. Chellappa, "Hyperface: A deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 1, pp. 121-135, 2019.
[85]R. Ranjan, S. Sankaranarayanan, C. D. Castillo, and R. Chellappa, "An all-in-one convolutional neural network for face analysis," in 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), 2017: IEEE, pp. 17-24.
[86]S. Ren, K. He, R. Girshick, and J. Sun, "Faster r-cnn: Towards real-time object detection with region proposal networks," in Advances in neural information processing systems, 2015, pp. 91-99.
[87]C. Sagonas, G. Tzimiropoulos, S. Zafeiriou, and M. Pantic, "300 faces in-the-wild challenge: The first facial landmark localization challenge," in Proceedings of the IEEE International Conference on Computer Vision Workshops, 2013, pp. 397-403.
[88]S. Sankaranarayanan, A. Alavi, C. D. Castillo, and R. Chellappa, "Triplet probabilistic embedding for face verification and clustering," in 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), 2016: IEEE, pp. 1-8.
[89]J. Saragih and R. Goecke, "A nonlinear discriminative approach to AAM fitting," in 2007 IEEE 11th International Conference on Computer Vision, 2007: IEEE, pp. 1-8.
[90]F. Schroff, D. Kalenichenko, and J. Philbin, "Facenet: A unified embedding for face recognition and clustering," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.
[91]W. Shang, K. Sohn, D. Almeida, and H. Lee, "Understanding and improving convolutional neural networks via concatenated rectified linear units," in international conference on machine learning, 2016, pp. 2217-2225.
[92]K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint arXiv:1409.1556, 2014.
[93]Y. Sun, Y. Chen, X. Wang, and X. Tang, "Deep learning face representation by joint identification-verification," in Advances in neural information processing systems, 2014, pp. 1988-1996.
[94]Y. Sun, D. Liang, X. Wang, and X. Tang, "Deepid3: Face recognition with very deep neural networks," arXiv preprint arXiv:1502.00873, 2015.
[95]Y. Sun, X. Wang, and X. Tang, "Deep learning face representation from predicting 10,000 classes," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1891-1898.
[96]Y. Sun, X. Wang, and X. Tang, "Deeply learned face representations are sparse, selective, and robust," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 2892-2900.
[97]Y. Sun, X. Wang, and X. Tang, "Hybrid deep learning for face verification," in Proceedings of the IEEE international conference on computer vision, 2013, pp. 1489-1496.
[98]C. Szegedy et al., "Going deeper with convolutions," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1-9.
[99]Y. Taigman, M. Yang, M. A. Ranzato, and L. Wolf, "Deepface: Closing the gap to human-level performance in face verification," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1701-1708.
[100]X. Tang, D. K. Du, Z. He, and J. Liu, "Pyramidbox: A context-assisted single shot face detector," in Proceedings of the European Conference on Computer Vision (ECCV), 2018, pp. 797-813.
[101]J. K. Uhlmann, "Satisfying general proximity/similarity queries with metric trees," Information processing letters, vol. 40, no. 4, pp. 175-179, 1991.
[102]J. R. Uijlings, K. E. Van De Sande, T. Gevers, and A. W. Smeulders, "Selective search for object recognition," International journal of computer vision, vol. 104, no. 2, pp. 154-171, 2013.
[103]R. Vaillant, C. Monrocq, and Y. Le Cun, "Original approach for the localisation of objects in images," IEE Proceedings-Vision, Image and Signal Processing, vol. 141, no. 4, pp. 245-250, 1994.
[104]P. Viola and M. J. Jones, "Robust real-time face detection," International journal of computer vision, vol. 57, no. 2, pp. 137-154, 2004.
[105]F. Wang et al., "The devil of face recognition is in the noise," in Proceedings of the European Conference on Computer Vision (ECCV), 2018, pp. 765-780.
[106]F. Wang, J. Cheng, W. Liu, and H. Liu, "Additive margin softmax for face verification," IEEE Signal Processing Letters, vol. 25, no. 7, pp. 926-930, 2018.
[107]F. Wang, X. Xiang, J. Cheng, and A. L. Yuille, "Normface: l 2 hypersphere embedding for face verification," in Proceedings of the 25th ACM international conference on Multimedia, 2017: ACM, pp. 1041-1049.
[108]H. Wang et al., "Cosface: Large margin cosine loss for deep face recognition," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 5265-5274.
[109]K. Q. Weinberger and L. K. Saul, "Distance metric learning for large margin nearest neighbor classification," Journal of Machine Learning Research, vol. 10, no. Feb, pp. 207-244, 2009.
[110]Y. Wen, Z. Li, and Y. Qiao, "Latent factor guided convolutional neural networks for age-invariant face recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 4893-4901.
[111]L. Wolf, T. Hassner, and I. Maoz, Face recognition in unconstrained videos with matched background similarity. IEEE, 2011.
[112]Y. Wu, H. Liu, J. Li, and Y. Fu, "Deep face recognition with center invariant loss," in Proceedings of the on Thematic Workshops of ACM Multimedia 2017, 2017: ACM, pp. 408-414.
[113]E. P. Xing, M. I. Jordan, S. J. Russell, and A. Y. Ng, "Distance metric learning with application to clustering with side-information," in Advances in neural information processing systems, 2003, pp. 521-528.
[114]C. Xu, Q. Liu, and M. Ye, "Age invariant face recognition and retrieval by coupled auto-encoder networks," Neurocomputing, vol. 222, pp. 62-71, 2017.
[115]J. Yan, Z. Lei, L. Wen, and S. Z. Li, "The fastest deformable part model for object detection," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 2497-2504.
[116]J. Yan, X. Zhang, Z. Lei, and S. Z. Li, "Face detection by structural models," Image and Vision Computing, vol. 32, no. 10, pp. 790-799, 2014.
[117]B. Yang, J. Yan, Z. Lei, and S. Z. Li, "Aggregate channel features for multi-view face detection," in IEEE international joint conference on biometrics, 2014: IEEE, pp. 1-8.
[118]B. Yang, J. Yan, Z. Lei, and S. Z. Li, "Fine-grained evaluation on face detection in the wild," in 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, vol. 1: IEEE, pp. 1-7.
[119]S. Yang, P. Luo, C.-C. Loy, and X. Tang, "From facial parts responses to face detection: A deep learning approach," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 3676-3684.
[120]S. Yang, P. Luo, C.-C. Loy, and X. Tang, "Wider face: A face detection benchmark," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 5525-5533.
[121]S. Yang, Y. Xiong, C. C. Loy, and X. Tang, "Face detection through scale-friendly deep convolutional networks," arXiv preprint arXiv:1706.02863, 2017.
[122]D. Yi, Z. Lei, S. Liao, and S. Z. Li, "Learning face representation from scratch," arXiv preprint arXiv:1411.7923, 2014.
[123]P. N. Yianilos, "Data structures and algorithms for nearest neighbor search in general metric spaces," in SODA, 1993, vol. 93, no. 194, pp. 311-21.
[124]J. Zhang, S. Shan, M. Kan, and X. Chen, "Coarse-to-fine auto-encoder networks (cfan) for real-time face alignment," in European conference on computer vision, 2014: Springer, pp. 1-16.
[125]K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detection and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
[126]S. Zhang, X. Zhu, Z. Lei, H. Shi, X. Wang, and S. Z. Li, "Faceboxes: A CPU real-time face detector with high accuracy," in 2017 IEEE International Joint Conference on Biometrics (IJCB), 2017: IEEE, pp. 1-9.
[127]S. Zhang, X. Zhu, Z. Lei, H. Shi, X. Wang, and S. Z. Li, "S3fd: Single shot scale-invariant face detector," in Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 192-201.
[128]X. Zhang, Z. Fang, Y. Wen, Z. Li, and Y. Qiao, "Range loss for deep face recognition with long-tailed training data," in Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 5409-5418.
[129]Z. Zhang, Y. Song, and H. Qi, "Age progression/regression by conditional adversarial autoencoder," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017, pp. 5810-5818.
[130]L. Zheng, Y. Yang, and Q. Tian, "SIFT meets CNN: A decade survey of instance retrieval," IEEE transactions on pattern analysis and machine intelligence, vol. 40, no. 5, pp. 1224-1244, 2017.
[131]T. Zheng, W. Deng, and J. Hu, "Age estimation guided convolutional neural network for age-invariant face recognition," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017, pp. 1-9.
[132]Y. Zheng, D. K. Pal, and M. Savvides, "Ring loss: Convex feature normalization for face recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 5089-5097.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top