no code implementations • 16 Feb 2024 • Hae Jin Song, Mahyar Khayatkhoei, Wael AbdAlmageed
Recent works have shown that generative models leave traces of their underlying generative process on the generated samples, broadly referred to as fingerprints of a generative model, and have studied their utility in detecting synthetic images from real ones.
no code implementations • 28 Nov 2023 • Mulin Tian, Mahyar Khayatkhoei, Joe Mathai, Wael AbdAlmageed
Deepfake videos present an increasing threat to society with potentially negative impact on criminal justice, democracy, and personal safety and privacy.
1 code implementation • 13 Nov 2023 • Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E. Hussein, Wael AbdAlmageed
To that end, in this work, we mathematically and empirically reveal the limitation of existing attribute bias removal methods in presence of strong bias and propose a new method that can mitigate this limitation.
1 code implementation • 8 Oct 2023 • Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E. Hussein, Wael AbdAlmageed
Ensuring a neural network is not relying on protected attributes (e. g., race, sex, age) for predictions is crucial in advancing fair and trustworthy AI.
1 code implementation • 10 Aug 2023 • Jiageng Zhu, Hanchen Xie, Jianhua Wu, Jiazhi Li, Mahyar Khayatkhoei, Mohamed E. Hussein, Wael AbdAlmageed
Most causal representation learning (CRL) methods are fully supervised, which is impractical due to costly labeling.
1 code implementation • 16 Jun 2023 • Mahyar Khayatkhoei, Wael AbdAlmageed
Precision and Recall are two prominent metrics of generative performance, which were proposed to separately measure the fidelity and diversity of generative models.
no code implementations • 8 Jun 2023 • Mohamed E. Hussein, Sudharshan Subramaniam Janakiraman, Wael AbdAlmageed
TRIGS delivers the best performance on the new dataset, surpassing the baseline methods by a large margin.
1 code implementation • 12 May 2023 • Hanchen Xie, Jiageng Zhu, Mahyar Khayatkhoei, Jiazhi Li, Mohamed E. Hussein, Wael AbdAlmageed
In this paper, we investigate two challenging conditions for environment misalignment: Cross-Domain and Cross-Context by proposing four datasets that are designed for these challenges: SimB-Border, SimB-Split, BlenB-Border, and BlenB-Split.
no code implementations • 19 Jul 2022 • Ekraam Sabir, Soumyaroop Nandi, Wael AbdAlmageed, Prem Natarajan
Manipulation of biomedical images to misrepresent experimental results has plagued the biomedical community for a while.
no code implementations • 4 Jun 2022 • Hae Jin Song, Wael AbdAlmageed
We then improve the stability and attributability of the fingerprints by proposing a new learning method based on set-encoding and contrastive training.
no code implementations • 3 Jun 2022 • Jiageng Zhu, Hanchen Xie, Wael AbdAlmageed
Causal representation learning has been proposed to encode relationships between factors presented in the high dimensional data.
no code implementations • 1 Jun 2022 • Jiaxin Cheng, Mohamed Hussein, Jay Billa, Wael AbdAlmageed
The growing number of adversarial attacks in recent years gives attackers an advantage over defenders, as defenders must train detectors after knowing the types of attacks, and many models need to be maintained to ensure good performance in detecting any upcoming attacks.
no code implementations • 30 Sep 2021 • Mohamed E. Hussein, Wael AbdAlmageed
The function can also be extended to the case of multi-class classification, and used as an alternative to the standard softmax function.
1 code implementation • ICCV 2021 • Ekraam Sabir, Soumyaroop Nandi, Wael AbdAlmageed, Prem Natarajan
Our results and analysis show that existing algorithms developed on common computer vision datasets are not robust when applied to biomedical images, validating that more research is required to address the unique challenges of biomedical image forensics.
no code implementations • 23 Nov 2020 • Ekraam Sabir, Ayush Jaiswal, Wael AbdAlmageed, Prem Natarajan
The problem setup requires algorithms to perform multimodal semantic forensics to authenticate a query multimedia package using a reference dataset of potentially related packages as evidences.