• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • A
  • A
  • A
  • A
  • A
Обычная версия сайта
  • RU
  • EN
  • HSE University
  • Publications
  • Book chapter
  • Open-Set Face Identification with Sequential Analysis and Out-of-Distribution Data Detection
  • RU
  • EN
Расширенный поиск
Высшая школа экономики
Национальный исследовательский университет
Priority areas
  • business informatics
  • economics
  • engineering science
  • humanitarian
  • IT and mathematics
  • law
  • management
  • mathematics
  • sociology
  • state and public administration
by year
  • 2027
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996
  • 1995
  • 1994
  • 1993
  • 1992
  • 1991
  • 1990
  • 1989
  • 1988
  • 1987
  • 1986
  • 1985
  • 1984
  • 1983
  • 1982
  • 1981
  • 1980
  • 1979
  • 1978
  • 1977
  • 1976
  • 1975
  • 1974
  • 1973
  • 1972
  • 1971
  • 1970
  • 1969
  • 1968
  • 1967
  • 1966
  • 1965
  • 1964
  • 1963
  • 1958
  • More
Subject
News
May 15, 2026
Preserving Rationality in a Period of Turbulence
The HSE International Laboratory for Logic, Linguistics and Formal Philosophy studies logic and rationality in a transformed world characterised by a diversity of logical systems and rational agents. The laboratory supports and develops academic ties with Russian and international partners. The HSE News Service spoke with the head of the laboratory, Prof. Elena Dragalina-Chernaya, about its work.
May 15, 2026
‘All My Time Is Devoted to My Dissertation
Ilya Venediktov graduated from the Master’s programme at the HSE Tikhonov Moscow Institute of Electronics and Mathematics through the combined Master’s–PhD track and is currently studying at the HSE Doctoral School of Engineering Sciences. At present, he is undertaking a long-term research internship at the University of Science and Technology of China in Hefei, where he is preparing his dissertation. In this interview, he explains how an internship differs from an academic mobility programme, discusses his research topic, and describes the daily life of a Russian doctoral student in China.
May 15, 2026
‘What Matters Is Not What You Study, but Who You Study with
Katerina Koloskova began studying Arabic expecting to give it up after a year—now she cannot imagine her life without it. In an interview for the Young Scientists of HSE University project, she spoke about two translated books, an expedition to Socotra, and her love for Bethlehem.

 

Have you spotted a typo?
Highlight it, click Ctrl+Enter and send us a message. Thank you for your help!

Publications
  • Books
  • Articles
  • Chapters of books
  • Working papers
  • Report a publication
  • Research at HSE

?

Open-Set Face Identification with Sequential Analysis and Out-of-Distribution Data Detection

.
Sokolova A., Savchenko A.

One of the main issues in face identification is to create a real-time application with high accuracy. Images are presented by high-dimensional feature vectors that are produced by convolutional neural networks. In order to effectively process such vectors, the hierarchical algorithm was proposed in this paper that applies sequential analysis to search the nearest neighbors among the reference images of the most reliable classes selected at a certain algorithm level. Principal component analysis was also applied to select the most significant part of feature vectors. Moreover, another issue of face recognition was investigated: the lack of training data of specific types (bad quality image, different scale or illumination, children/old people, etc.), The recognition accuracy may be low for input images that are not similar to the majority of images in the dataset used to train the feature extractors. Therefore, we propose the level of preprocessing input images by detection of rare data. In this paper datasets such as VGGFace2, MS-Celeb-1M, All ages faces, Large age gap face, and different facial descriptors were used for the testing goal. Also, we provide a procedure to collect a special dataset for a given training set by using different transformations and automatic detection of anomalies.

Language: English
DOI
Text on another site
Keywords: face recognitionanomaly detection

In book

2022 International Joint Conference on Neural Networks (IJCNN)
Institute of Electrical and Electronics Engineers Inc., 2022.
Similar publications
Refrigerant Leak Detection in Data Centers Using Topologically Determined Graph Neural Networks
Ivanov S., Borisov V., Ali S. et al., , in: 2025 IEEE XVII International Scientific and Technical Conference on Actual Problems of Electronic Instrument Engineering (APEIE).: IEEE, 2025. Ch. 127 P. 1–7.
This paper investigates the problem of detecting slow refrigerant leaks in a data center cooling system using a graph neural network. The study addresses the challenge of early fault identification, proposing a method for constructing a topological graph based on the engineering diagram, the physical layout, and the cause-and-effect relationships in the cooling system. This ...
Added: December 19, 2025
SensorDBSCAN: Semi-Supervised Active Learning Powered Method for Anomaly Detection and Diagnosis
Ivanov P., Shtark M., Kozhevnikov A. et al., IEEE Access 2025 Vol. 13 P. 25186–25197
Fault detection and diagnosis (FDD) is a critical challenge in industrial processes aimed at minimizing risks such as safety hazards, costly downtime, and suboptimal production. Traditional supervised FDD methods offer great performance while heavily relying on large volumes of labeled data, whereas unsupervised methods do not depend on labeled data, though are inferior in performance ...
Added: April 29, 2025
Outliers resistant image classification by anomaly detection
Sergeev A., Minchenkov V., Soldatov A. et al., ADVANCES IN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING 2025 No. 1 P. 3344–3355
The automatic monitoring of manual assembly processes in production settings increasingly relies on advanced technologies, including computer vision models. These models are designed to detect and classify events such as the presence of components in an assembly area and the connection of these components. However, a significant challenge for detection and classification algorithms is their vulnerability ...
Added: April 2, 2025
Prediction of Industrial Cyber Attacks Using Normalizing Flows
V.P. Stepashkina, M.I. Hushchyn, Doklady Mathematics 2024 Vol. 110 No. 1 P. S95–S102
This paper presents the development and evaluation of methods for detecting cyberattacks on industrial systems using neural network approaches. The focus is on the task of detecting anomalies in multivariate time series, where the diversity and complexity of potential attack scenarios require the use of advanced models. To address these challenges, a transformer-based autoencoder architecture ...
Added: March 25, 2025
Device-Specific Facial Descriptors: Winning a Lottery with a SuperNet
Savchenko A., Maslov D., Makarov I., , in: ECAI 2024. 27th European Conference on Artificial Intelligence, October 19 – 24 October 2024, Santiago de Compostela, Spain – Including 13th Conference on Prestigious Applications of Intelligent Systems (PAIS 2024).: IOS Press, 2024. P. 4439–4442.
Added: February 15, 2025
Fast Search of Face Recognition Model for a Mobile Device Based on Neural Architecture Comparator
Savchenko A., Savchenko L., Makarov I., IEEE Access 2023 Vol. 11 P. 65977–65990
This paper addresses the face recognition task for offline mobile applications. Using AutoML techniques, a novel technological framework is proposed to develop a fast neural network-based facial feature extractor for a concrete device. First, the Once-for-All SuperNet is trained on a large facial dataset. Each device is characterized by its lookup table, which contains the ...
Added: August 28, 2023
Effective face recognition based on anomaly image detection and sequential analysis of neural descriptors
Sokolova A., Savchenko A., , in: 2023 IX International Conference on Information Technology and Nanotechnology (ITNT).: IEEE, 2023. P. 1–5.
In this paper, we explore the possibility to improve efficiency of face recognition using information about anomaly input images. Indeed, modern publicly-available datasets typically contain images of mostly middle-aged and Caucasian people, which cause most algorithms to fail on photos of older people or children, rarer ethnicities, poor-quality images, etc. Detection of such anomaly data ...
Added: June 13, 2023
A standalone software for real-time facial analysis in online conferences and e-lessons
Churaev E., Savchenko A., Software Impacts 2023 Vol. 16 Article 100507
Nowadays, many meetings, lessons, conferences, and presentations are organized online, where it is complicated to communicate with an audience and control their engagement and emotions. In this article, we present a novel C++ application that is led to help estimate facial identities and expressions. It captures a screen with a window of an arbitrary online ...
Added: May 18, 2023
Overview of Face Recognition Algorithms for Person Identification
Alexandrov D., Программная инженерия 2022 Vol. 13 No. 7 P. 331–343
Trends in computer vision and pattern recognition and capabilities of modern computers contributed to a consid- erable amount of research of these areas application in facial recognition systems. The purpose of this paper is to investigate the most significant methods of face recognition. In the first two sections of current paper, the methods of face ...
Added: October 31, 2022
Face Recognition from Video using Deep Learning
Manna S., Ghildiyal S., Bhimani K. R., IEEE Access 2020 Article 1
Face recognition (FR) and verification is the immeasurable technology to encounter any criminal activities nowadays. With the remarkable applications extending from criminal ID, security, and observation to amusement sites. This system (recognition of faces) is exceptionally helpful in banks, air terminals, and different associations for screening customers. In deep learning, convolutional neural networks (CNN) have ...
Added: October 14, 2022
Neural network model for video-based facial expression recognition in-the-wild on mobile devices
Demochkina P., Savchenko A., , in: 2021 International Conference on Information Technology and Nanotechnology (ITNT).: IEEE, 2021. P. 1–5.
In this paper, we propose to solve the problem of facial expression recognition in videos by implementing a two-stage procedure, in which, firstly, facial features are extracted from all frames using an EfficientNet-based model. The latter is pre-trained to identify facial attributes and further fine-tuned on an external dataset for the emotion classification task. Secondly, ...
Added: April 10, 2022
Pattern Recognition. ICPR International Workshops and Challenges. Virtual Event, January 10–15, 2021, Proceedings, Part V
Springer, 2021.
This 8-volumes set constitutes the refereed of the 25th International Conference on Pattern Recognition Workshops, ICPR 2020, held virtually in Milan, Italy and rescheduled to January 10 - 11, 2021 due to Covid-19 pandemic. The 416 full papers presented in these 8 volumes were carefully reviewed and selected from about 700 submissions. The 46 workshops cover ...
Added: April 10, 2022
Marine mammal calls detection in acoustic signals via gradient boosting model
Салин М. Б., Ponomarenko A., , in: Proceedings of Meetings on AcousticsVol. 44. Issue 1: 6th Underwater Acoustics Conference and Exhibition.: [б.и.], 2021.
This paper is devoted to methods of processing hydrophone records in order to identify specific signals, produced by marine mammals. The aim of processing is to detect a signal according to a certain pattern against the background of non-stationary noise. Development of a robust detection algorithm is of great interest because it could help to ...
Added: December 10, 2021
NFAD: fixing anomaly detection using normalizing flows
Ryzhikov A., Borisyak M., Ustyuzhanin A. et al., PeerJ Computer Science 2021 Vol. 7 Article e757
Anomaly detection is a challenging task that frequently arises in practically all areas of industry and science, from fraud detection and data quality monitoring to finding rare cases of diseases and searching for new physics. Most of the conventional approaches to anomaly detection, such as one-class SVM and Robust Auto-Encoder, are one-class classification methods, i.e., focus ...
Added: November 30, 2021
Video Stream Object Recognition Module for Intelligence Buildings
Markvirer V., Ulitina S., , in: Development of Science = Развитие науки : материалы конкурса исследовательских работ на английском языке (2020–2021 г.).: ПГКУБ им. А. М. Горького, 2021. P. 66–72.
The article presents analytical review of existed solutions and technologies applied in computer vision control access systems, video monitoring and analysis areas. Such technologies are parts of the smart city concept and commonly used for recognition of faces in modern office buildings and business centers. Face recognition is used to distinct employees and guests, separated ...
Added: September 20, 2021
An automated deep learning based anomaly detection in pedestrian walkways for vulnerable road users safety
Pustokhina, I.V., Pustokhin D. A., Vaiyapuri T. et al., Safety Science 2021 Vol. 142 Article 105356
Anomaly detection in pedestrian walkways is an important research topic, commonly used to improve the safety of pedestrians. Due to the wide utilization of video surveillance systems and the increased quantity of captured videos, the traditional manual examination of labeling abnormal events is a tiresome task. So, an automated surveillance system that detects anomalies becomes ...
Added: September 20, 2021
Efficient video face recognition based on frame selection and quality assessment
Kharchevnikova A., Savchenko A., PeerJ Computer Science 2021 Vol. 7:e391 P. 1–18
The article is considering the problem of increasing the performance and accuracy of video face identification. We examine the selection of the several best video frames using various techniques for assessing the quality of images. In contrast to traditional methods with estimation of image brightness/contrast, we propose to utilize the deep learning techniques that estimate ...
Added: February 25, 2021
Crowd scenes analysis using multiple sliding windows classifiers and Histogram of Oriented Gradient
Shalileh S., Shahdi S. O., , in: 2017 10th Iranian Conference on Machine Vision and Image Processing (MVIP).: IEEE, 2017. P. 31–38.
In recent years many research works have been devoted either to anomaly detection or anomaly classification. However, very few of them address both of them simultaneously. In this paper, we introduced a new method not only to detect and localize the abnormalities in crowded scenes but also to determine the class of abnormality. In This ...
Added: January 13, 2021
Using Large-Scale Anomaly Detection on Code to Improve Kotlin Compiler
Bryksin T., Petukhov V., Alexin I. et al., , in: MSR '20: Proceedings of the 17th International Conference on Mining Software Repositories.: ACM Press, 2020. P. 455–465.
In this work, we apply anomaly detection to source code and byte-code to facilitate the development of a programming language and its compiler. We define anomaly as a code fragment that is different from typical code written in a particular programming language. Identifying such code fragments is beneficial to both language developers and end users, ...
Added: November 17, 2020
Own-race and other-race face recognition problems without visual expertise problems in dyslexic readers
Sigurdardottir H. M., Hjartarson K. H., Gudmundsson G. L. et al., Vision Research 2019 Vol. 158 P. 146–156
Both intact and deficient neural processing of faces has been found in dyslexic readers. Similarly, behavioral studies have shown both normal and abnormal face processing in developmental dyslexia. We tested whether dyslexic adults are impaired in tests of own-race and other-race face recognition. As both face and word recognition rely considerably on visual expertise, we ...
Added: June 24, 2020
(1 + ε)-class Classification: an Anomaly Detection Method for Highly Imbalanced or Incomplete Data Sets
Maxim Borisyak, Artem Ryzhikov, Ustyuzhanin A. et al., Journal of Machine Learning Research 2020 Vol. 21 P. 1–22
Anomaly detection is not an easy problem since distribution of anomalous samples is unknown a priori. We explore a novel method that gives a trade-off possibility between one-class and two-class approaches, and leads to a better performance on anomaly detection problems with small or non-representative anomalous samples. The method is evaluated using several data sets ...
Added: March 13, 2020
Face anti-spoofing with joint spoofing medium detection and eye blinking analysis
Nikitin M. Y., Konushin V. S., Konushin A., Computer Optics 2019 Vol. 43 No. 4 P. 618–626
Modern biometric systems based on face recognition demonstrate high recognition quality, but they are vulnerable to face presentation attacks, such as photo or replay attack. Existing face anti-spoofing methods are mostly based on texture analysis and due to lack of training data either use hand-crafted features or fine-tuned pretrained deep models. In this paper we ...
Added: October 31, 2019
  • About
  • About
  • Key Figures & Facts
  • Sustainability at HSE University
  • Faculties & Departments
  • International Partnerships
  • Faculty & Staff
  • HSE Buildings
  • HSE University for Persons with Disabilities
  • Public Enquiries
  • Studies
  • Admissions
  • Programme Catalogue
  • Undergraduate
  • Graduate
  • Exchange Programmes
  • Summer University
  • Summer Schools
  • Semester in Moscow
  • Business Internship
  • Research
  • International Laboratories
  • Research Centres
  • Research Projects
  • Monitoring Studies
  • Conferences & Seminars
  • Academic Jobs
  • Yasin (April) International Academic Conference on Economic and Social Development
  • Media & Resources
  • Publications by staff
  • HSE Journals
  • Publishing House
  • iq.hse.ru: commentary by HSE experts
  • Library
  • Economic & Social Data Archive
  • Video
  • HSE Repository of Socio-Economic Information
  • HSE1993–2026
  • Contacts
  • Copyright
  • Privacy Policy
  • Site Map
Edit