Search Results for author: Jerone T. A. Andrews

Found 7 papers, 4 papers with code

A View From Somewhere: Human-Centric Face Representations

1 code implementation30 Mar 2023 Jerone T. A. Andrews, Przemyslaw Joniak, Alice Xiang

Few datasets contain self-identified sensitive attributes, inferring attributes risks introducing additional biases, and collecting attributes can carry legal risks.

Attribute Decision Making

Ethical Considerations for Responsible Data Curation

1 code implementation NeurIPS 2023 Jerone T. A. Andrews, Dora Zhao, William Thong, Apostolos Modas, Orestis Papakyriakopoulos, Alice Xiang

Human-centric computer vision (HCCV) data curation practices often neglect privacy and bias concerns, leading to dataset retractions and unfair models.

Fairness

Men Also Do Laundry: Multi-Attribute Bias Amplification

1 code implementation21 Oct 2022 Dora Zhao, Jerone T. A. Andrews, Alice Xiang

We show models can learn to exploit correlations with respect to multiple attributes (e. g., {$\texttt{computer}$, $\texttt{keyboard}$}), which are not accounted for by current metrics.

Attribute

I call BS: Fraud Detection in Crowdfunding Campaigns

no code implementations30 Jun 2020 Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis

Donations to charity-based crowdfunding environments have been on the rise in the last few years.

Blocking Fraud Detection

Conditional Adversarial Camera Model Anonymization

1 code implementation18 Feb 2020 Jerone T. A. Andrews, Yidan Zhang, Lewis D. Griffin

Model anonymization is the process of transforming these artifacts such that the apparent capture model is changed.

Multiple-Identity Image Attacks Against Face-based Identity Verification

no code implementations20 Jun 2019 Jerone T. A. Andrews, Thomas Tanay, Lewis D. Griffin

New quantitative results are presented that support an explanation in terms of the geometry of the representations spaces used by the verification systems.

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

no code implementations19 Jun 2018 Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin

Designing models that are robust to small adversarial perturbations of their inputs has proven remarkably difficult.

Cannot find the paper you are looking for? You can Submit a new open access paper.