A constrained generative model applied to face detection

被引:0
|
作者
Feraud, R [1 ]
Bernier, O [1 ]
Collobert, D [1 ]
机构
[1] FRANCE TELECOM,CNET,TECHNOPOLE ANTICIPA,TNT,RIO,LAB,F-22307 LANNION,FRANCE
关键词
autoencoder; face detection; information theory; neural network;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A generative neural network model, constrained by non-face examples chosen by an iterative algorithm, is applied to fact: detection. To improve the generalization ability of the model, another constraint based on the minimum description length is added. This model is tested and compared with another state-of-the-art face detection system on a large image test set collected at CMU.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [31] Discriminative and Generative Classification Techniques Applied to Automated Neonatal Seizure Detection
    Thomas, Eoin M.
    Temko, Andriy
    Marnane, William P.
    Boylan, Geraldine B.
    Lightbody, Gordon
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2013, 17 (02) : 297 - 304
  • [32] Variational data generative model for intrusion detection
    Lopez-Martin, Manuel
    Carro, Belen
    Sanchez-Esguevillas, Antonio
    KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 60 (01) : 569 - 590
  • [33] Variational data generative model for intrusion detection
    Manuel Lopez-Martin
    Belen Carro
    Antonio Sanchez-Esguevillas
    Knowledge and Information Systems, 2019, 60 : 569 - 590
  • [34] Generative model for reciprocity and community detection in networks
    Safdari, Hadiseh
    Contisciani, Martina
    De Bacco, Caterina
    PHYSICAL REVIEW RESEARCH, 2021, 3 (02):
  • [35] Constrained Generative Adversarial Networks
    Chao, Xiaopeng
    Cao, Jiangzhong
    Lu, Yuqin
    Dai, Qingyun
    Liang, Shangsong
    IEEE ACCESS, 2021, 9 : 19208 - 19218
  • [36] Multi-task Learning and Identity-constrained Generative Adversarial Network for Face Frontalization and Recognition
    Huang X.-Y.
    Liu F.
    Bao Q.-Y.
    Li R.-P.
    Liu X.
    Li L.-L.
    Chen P.-H.
    Liu Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (10): : 2936 - 2949
  • [37] Poisoning attacks on face authentication systems by using the generative deformation model
    Chak-Tong Chan
    Szu-Hao Huang
    Patrick Puiyui Choy
    Multimedia Tools and Applications, 2023, 82 : 29457 - 29476
  • [38] A Two-Stage Deep Generative Model for Masked Face Synthesis
    Lee, Seungho
    SENSORS, 2022, 22 (20)
  • [39] Poisoning attacks on face authentication systems by using the generative deformation model
    Chan, Chak-Tong
    Huang, Szu-Hao
    Choy, Patrick Puiyui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (19) : 29457 - 29476
  • [40] Face recognition model applied to the missing people problem
    Figueredo, Marcos Batista
    de Souza, Josemar Rodrigues
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,