pith. machine review for the scientific record. sign in

arxiv: 1411.7923 · v1 · submitted 2014-11-28 · 💻 cs.CV

Recognition: unknown

Learning Face Representation from Scratch

Dong Yi, Shengcai Liao, Stan Z. Li, Zhen Lei

classification 💻 cs.CV
keywords facelargerecognitionscalecasiawebfacedatadatasetfield
0
0 comments X
read the original abstract

Pushing by big data and deep convolutional neural network (CNN), the performance of face recognition is becoming comparable to human. Using private large scale training datasets, several groups achieve very high performance on LFW, i.e., 97% to 99%. While there are many open source implementations of CNN, none of large scale face dataset is publicly available. The current situation in the field of face recognition is that data is more important than algorithm. To solve this problem, this paper proposes a semi-automatical way to collect face images from Internet and builds a large scale dataset containing about 10,000 subjects and 500,000 images, called CASIAWebFace. Based on the database, we use a 11-layer CNN to learn discriminative representation and obtain state-of-theart accuracy on LFW and YTF. The publication of CASIAWebFace will attract more research groups entering this field and accelerate the development of face recognition in the wild.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 8 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. PreFIQs: Face Image Quality Is What Survives Pruning

    cs.CV 2026-05 unverdicted novelty 7.0

    Face image quality is quantified as the Euclidean distance between embeddings from a pre-trained face recognition model and its pruned version, achieving competitive or superior results without training or supervision.

  2. StyleID: A Perception-Aware Dataset and Metric for Stylization-Agnostic Facial Identity Recognition

    cs.GR 2026-04 unverdicted novelty 7.0

    StyleID supplies human-perception-aligned benchmarks and fine-tuned encoders that improve facial identity recognition robustness across stylization types and strengths.

  3. BID-LoRA: A Parameter-Efficient Framework for Continual Learning and Unlearning

    cs.LG 2026-04 unverdicted novelty 6.0

    BID-LoRA uses bi-directional low-rank adapters with retain/new/unlearn pathways and escape unlearning to enable continual learning and unlearning while minimizing knowledge leakage and parameter updates.

  4. On the Impact of Face Segmentation-Based Background Removal on Recognition and Morphing Attack Detection

    cs.CV 2026-04 unverdicted novelty 5.0

    Face segmentation for background removal systematically impacts both face recognition performance and morphing attack detection in unconstrained scenarios.

  5. Reinforcement-Guided Synthetic Data Generation for Privacy-Sensitive Identity Recognition

    cs.CV 2026-04 unverdicted novelty 5.0

    A reinforcement learning approach adapts general generative models to produce synthetic data that boosts identity recognition accuracy and generalization under privacy constraints.

  6. Are Face Embeddings Compatible Across Deep Neural Network Models?

    cs.CV 2026-04 unverdicted novelty 5.0

    Simple affine transformations align face embeddings across different DNN models, substantially improving cross-model identification and verification performance.

  7. Lightweight Cross-Spectral Face Recognition via Contrastive Alignment and Distillation

    cs.CV 2026-05 unverdicted novelty 4.0

    A lightweight hybrid CNN-Transformer framework for heterogeneous face recognition achieves competitive performance on cross-spectral benchmarks and standard RGB tasks using contrastive alignment and distillation.

  8. SoK: A Comprehensive Analysis of the Current Status of Neural Tangent Generalization Attacks with Research Directions

    cs.LG 2026-05 accept novelty 3.0

    NTGA is the first clean-label generalization attack under black-box settings but is vulnerable to adversarial training and image transformations, with newer attacks outperforming it.