• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lai Xinyu, Chen Si, Yan Yan, Wang Dahan, Zhu Shunzhi. Survey on Deep Learning Based Facial Attribute Recognition Methods[J]. Journal of Computer Research and Development, 2021, 58(12): 2760-2782. DOI: 10.7544/issn1000-1239.2021.20200870
Citation: Lai Xinyu, Chen Si, Yan Yan, Wang Dahan, Zhu Shunzhi. Survey on Deep Learning Based Facial Attribute Recognition Methods[J]. Journal of Computer Research and Development, 2021, 58(12): 2760-2782. DOI: 10.7544/issn1000-1239.2021.20200870

Survey on Deep Learning Based Facial Attribute Recognition Methods

Funds: This work was supported by the General Program of the National Natural Science Foundation of China (62071404, 61773325), the General Program of the Natural Science Foundation of Fujian Province (2021J011185, 2020J01001), the Science and Technology Planning Project of Fujian Province (2020H0023), and the Youth Innovation Foundation of Xiamen City (3502Z20206068).
More Information
  • Published Date: November 30, 2021
  • Facial attribute recognition is one of the most popular research topics in computer vision and pattern recognition, and has great research significance of analyzing and understanding facial images. At the same time, it has a wide range of practical application value in many fields such as image retrieval, face recognition, micro-expression recognition and recommendation system. With the rapid development of deep learning, a large number of deep learning based facial attribute recognition (termed DFAR) methods have been put forward by domestic and foreign scholars. First the overall process of the facial attribute recognition method is described. Then, according to the different mechanisms of model construction, the part-based and holistic DFAR methods are reviewed and discussed in detail, respectively. Specifically, the part-based DFAR methods are classified according to whether or not to adopt the regular area localization technique, while the holistic DFAR methods are distinguished from the perspectives of single-task learning and multi-task learning, where multi-task learning based DFAR methods are further subdivided according to whether the attribute grouping strategy is used. Next, several popular databases and evaluation metrics on facial attribute recognition are introduced, and the performance of the state-of-the-art DFAR methods is compared and analyzed. Finally, the future research directions of the DFAR methods are provided.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1680) PDF downloads (875) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return