default search action
Jukka Komulainen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Zhaodong Sun, Xiaobai Li, Jukka Komulainen, Guoying Zhao:
Biometric Authentication Based on Enhanced Remote Photoplethysmography Signal Morphology. IJCB 2024: 1-10 - [i5]Zhaodong Sun, Xiaobai Li, Jukka Komulainen, Guoying Zhao:
Biometric Authentication Based on Enhanced Remote Photoplethysmography Signal Morphology. CoRR abs/2407.04127 (2024) - 2022
- [j9]Usman Muhammad, Zitong Yu, Jukka Komulainen:
Self-supervised 2D face presentation attack detection via temporal sequence sampling. Pattern Recognit. Lett. 156: 15-22 (2022) - 2021
- [i4]Zitong Yu, Jukka Komulainen, Xiaobai Li, Guoying Zhao:
Review of Face Presentation Attack Detection Competitions. CoRR abs/2112.11290 (2021) - 2020
- [j8]Yasar Abbas Ur Rehman, Lai-Man Po, Jukka Komulainen:
Enhancing deep discriminative feature maps via perturbation for face presentation attack detection. Image Vis. Comput. 94: 103858 (2020)
2010 – 2019
- 2019
- [j7]Upal Mahbub, Jukka Komulainen, Denzil Ferreira, Rama Chellappa:
Continuous Authentication of Smartphones Based on Application Usage. IEEE Trans. Biom. Behav. Identity Sci. 1(3): 165-180 (2019) - [p2]Jukka Komulainen, Zinelabidine Boulkenafet, Zahid Akhtar:
Review of Face Presentation Attack Detection Competitions. Handbook of Biometric Anti-Spoofing, 2nd Ed. 2019: 291-317 - [i3]Pekka Siirtola, Jukka Komulainen, Vili Kellokumpu:
Effect of context in swipe gesture-based continuous authentication on smartphones. CoRR abs/1905.11780 (2019) - 2018
- [j6]Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
On the generalization of color texture-based face anti-spoofing. Image Vis. Comput. 77: 1-9 (2018) - [c14]Pekka Siirtola, Jukka Komulainen, Vili Kellokumpu:
Effect of context in swipe gesture-based continuous authentication on smartphones. ESANN 2018 - [i2]Upal Mahbub, Jukka Komulainen, Denzil Ferreira, Rama Chellappa:
Continuous Authentication of Smartphones Based on Application Usage. CoRR abs/1808.03319 (2018) - 2017
- [j5]Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
Face Antispoofing Using Speeded-Up Robust Features and Fisher Vector Encoding. IEEE Signal Process. Lett. 24(2): 141-145 (2017) - [c13]Zinelabdine Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, Abdenour Hadid:
OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations. FG 2017: 612-618 - [c12]Zinelabdine Boulkenafet, Jukka Komulainen, Zahid Akhtar, Azeddine Benlamoudi, Djamel Samai, Salah Eddine Bekhouche, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, Fei Peng, L. B. Zhang, Min Long, Shruti Bhilare, Vivek Kanhangad, Artur Costa-Pazo, Esteban Vázquez-Fernández, Daniel Pérez-Cabo, J. J. Moreira-Perez, Daniel González-Jiménez, Amir Mohammadi, Sushil Bhattacharjee, Sébastien Marcel, Svetlana Volkova, Y. Tang, N. Abe, L. Li, X. Feng, Z. Xia, X. Jiang, S. Liu, Rui Shao, Pong C. Yuen, Waldir R. de Almeida, Fernanda A. Andaló, Rafael Padilha, Gabriel Bertocco, William Dias, Jacques Wainer, Ricardo da Silva Torres, Anderson Rocha, Marcus A. Angeloni, Guilherme Folego, Alan Godoy, Abdenour Hadid:
A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 2017: 688-696 - 2016
- [j4]Elhocine Boutellaa, Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
Audiovisual synchrony assessment for replay attack detection in talking face biometrics. Multim. Tools Appl. 75(9): 5329-5343 (2016) - [j3]Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
Face Spoofing Detection Using Colour Texture Analysis. IEEE Trans. Inf. Forensics Secur. 11(8): 1818-1830 (2016) - [c11]Jukka Komulainen, Iryna Anina, Jukka Holappa, Elhocine Boutellaa, Abdenour Hadid:
On the robustness of audiovisual liveness detection to visual speech animation. BTAS 2016: 1-8 - [c10]Zinelabidine Boulkenafet, Jukka Komulainen, Xiaoyi Feng, Abdenour Hadid:
Scale space texture analysis for face anti-spoofing. ICB 2016: 1-6 - [c9]Xiaobai Li, Jukka Komulainen, Guoying Zhao, Pong Chi Yuen, Matti Pietikäinen:
Generalized face anti-spoofing by detecting pulse from face videos. ICPR 2016: 4244-4249 - 2015
- [c8]Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
Face anti-spoofing based on color texture analysis. ICIP 2015: 2636-2640 - [i1]Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid:
face anti-spoofing based on color texture analysis. CoRR abs/1511.06316 (2015) - 2014
- [j2]Tiago Freitas Pereira, Jukka Komulainen, André Anjos, José Mario De Martino, Abdenour Hadid, Matti Pietikäinen, Sébastien Marcel:
Face liveness detection using dynamic texture. EURASIP J. Image Video Process. 2014: 2 (2014) - [c7]Jukka Komulainen, Abdenour Hadid, Matti Pietikäinen:
Generalized textured contact lens detection by extracting BSIF description from Cartesian iris images. IJCB 2014: 1-7 - [p1]André Anjos, Jukka Komulainen, Sébastien Marcel, Abdenour Hadid, Matti Pietikäinen:
Face Anti-spoofing: Visual Approach. Handbook of Biometric Anti-Spoofing 2014: 65-82 - 2013
- [c6]Jukka Komulainen, Abdenour Hadid, Matti Pietikäinen:
Context based face anti-spoofing. BTAS 2013: 1-8 - [c5]Ivana Chingovska, J. Yang, Zhen Lei, Dong Yi, Stan Z. Li, Olga Kähm, Christian Glaser, Naser Damer, Arjan Kuijper, Alexander Nouak, Jukka Komulainen, Tiago Freitas Pereira, Shubham Gupta, Shubham Khandelwal, Shubham Bansal, Ayush K. Rai, Tarun Krishna, Dushyant Goyal, Muhammad-Adeel Waris, Honglei Zhang, Iftikhar Ahmad, Serkan Kiranyaz, Moncef Gabbouj, Roberto Tronci, Maurizio Pili, Nicola Sirena, Fabio Roli, Javier Galbally, Julian Fiérrez, Allan da Silva Pinto, Hélio Pedrini, W. S. Schwartz, Anderson Rocha, André Anjos, Sébastien Marcel:
The 2nd competition on counter measures to 2D face spoofing attacks. ICB 2013: 1-6 - [c4]Jukka Komulainen, Abdenour Hadid, Matti Pietikäinen, André Anjos, Sébastien Marcel:
Complementary countermeasures for detecting scenic face spoofing attacks. ICB 2013: 1-7 - 2012
- [j1]Jukka Määttä, Abdenour Hadid, Matti Pietikäinen:
Face spoofing detection from single images using texture and local shape analysis. IET Biom. 1(1): 3-10 (2012) - [c3]Jukka Komulainen, Abdenour Hadid, Matti Pietikäinen:
Face Spoofing Detection Using Dynamic Texture. ACCV Workshops (1) 2012: 146-157 - 2011
- [c2]Murali Mohan Chakka, André Anjos, Sébastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei, Zhiwei Zhang, Stan Z. Li, William Robson Schwartz, Anderson Rocha, Hélio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen:
Competition on counter measures to 2-D facial spoofing attacks. IJCB 2011: 1-6 - [c1]Jukka Määttä, Abdenour Hadid, Matti Pietikäinen:
Face spoofing detection from single images using micro-texture analysis. IJCB 2011: 1-7
Coauthor Index
aka: Zinelabdine Boulkenafet
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint