no code implementations • 17 Oct 2023 • Sherko R. HmaSalah, Aras Asaad
One of the fundamental concepts of ML system design is the ability to generalize effectively to previously unseen data, hence not only we evaluate the performance of CNN models within individual datasets but also explore their performance across combined datasets and investigating each dataset in testing phase only.
1 code implementation • 13 Feb 2023 • Halgurd S. Maghdid, Sheerko R. Hma Salah, Akar T. Hawre, Hassan M. Bayram, Azhin T. Sabir, Kosrat N. Kaka, Salam Ghafour Taher, Ladeh S. Abdulrahman, Abdulbasit K. Al-Talabani, Safar M. Asaad, Aras Asaad
The Wi-Fi access points (WAPs) signal is acquired via equivalent smartphone-embedded Wi-Fi chipsets, and then Channel-State-Information CSI measures are extracted and converted into feature vectors to be used as input for machine learning classification algorithms.
no code implementations • 4 Aug 2022 • Tahir Hassan, Aras Asaad, Dashti Ali, Sabah Jassim
Advances in AI based computer vision has led to a significant growth in synthetic image generation and artificial image tampering with serious implications for unethical exploitations that undermine person identification and could make render AI predictions less explainable. Morphing, Deepfake and other artificial generation of face photographs undermine the reliability of face biometrics authentication using different electronic ID documents. Morphed face photographs on e-passports can fool automated border control systems and human guards. This paper extends our previous work on using the persistent homology (PH) of texture landmarks to detect morphing attacks. We demonstrate that artificial image tampering distorts the spatial distribution of texture landmarks (i. e. their PH) as well as that of a set of image quality characteristics. We shall demonstrate that the tamper caused distortion of these two slim feature vectors provide significant potentials for building explainable (Handcrafted) tamper detectors with low error rates and suitable for implementation on constrained devices.
no code implementations • 7 Jan 2022 • Aras Asaad, Dashti Ali, Taban Majeed, Rasber Rashid
An Important tool in the field topological data analysis is known as persistent Homology (PH) which is used to encode abstract representation of the homology of data at different resolutions in the form of persistence diagram (PD).