Search Results for author: Marija Ivanovska

Found 6 papers, 3 papers with code

On the Vulnerability of DeepFake Detectors to Attacks Generated by Denoising Diffusion Models

no code implementations11 Jul 2023 Marija Ivanovska, Vitomir Štruc

The detection of malicious deepfakes is a constantly evolving problem that requires continuous monitoring of detectors to ensure they can detect image manipulations generated by the latest emerging models.

Denoising Face Reenactment +1

TomatoDIFF: On-plant Tomato Segmentation with Denoising Diffusion Models

1 code implementation3 Jul 2023 Marija Ivanovska, Vitomir Struc, Janez Pers

Artificial intelligence applications enable farmers to optimize crop growth and production while reducing costs and environmental impact.

Denoising Segmentation +1

Face Morphing Attack Detection with Denoising Diffusion Probabilistic Models

1 code implementation International Workshop on Biometrics and Forensics (IWBF) 2023 Marija Ivanovska, Vitomir Štruc

Existing MAD techniques predominantly rely on discriminative models that learn from examples of bona fide and morphed images and, as a result, often exhibit sub-optimal generalization performance when confronted with unknown types of morphing attacks.

Denoising Face Morphing Attack Detection +1

Face Morphing Attack Detection Using Privacy-Aware Training Data

no code implementations2 Jul 2022 Marija Ivanovska, Andrej Kronovšek, Peter Peer, Vitomir Štruc, Borut Batagelj

Images of morphed faces pose a serious threat to face recognition--based security systems, as they can be used to illegally verify the identity of multiple people with a single morphed image.

Face Morphing Attack Detection Face Recognition

Y-GAN: Learning Dual Data Representations for Efficient Anomaly Detection

no code implementations28 Sep 2021 Marija Ivanovska, Vitomir Štruc

Due to the separation of semantically-relevant and residual information, Y-GAN is able to derive informative data representations that allow for efficient anomaly detection across a diverse set of anomaly detection tasks.

Anomaly Detection Disentanglement

Cannot find the paper you are looking for? You can Submit a new open access paper.