no code implementations • ECCV 2020 • Fariborz Taherkhani, Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
Semi-Supervised Learning (SSL) based on Convolutional Neural Networks (CNNs) have recently been proven as powerful tools for standard tasks such as image classification when there is not a sufficient amount of labeled data available during the training.
no code implementations • 18 Oct 2022 • Samuel Price, Sobhan Soleymani, Nasser M. Nasrabadi
Morph images threaten Facial Recognition Systems (FRS) by presenting as multiple individuals, allowing an adversary to swap identities with another subject.
no code implementations • 16 Sep 2022 • Hossein Kashiani, Shoaib Meraj Sami, Sobhan Soleymani, Nasser M. Nasrabadi
In this paper, we intend to learn a morph detection model with high generalization to a wide range of morphing attacks and high robustness against different adversarial attacks.
no code implementations • 7 Sep 2022 • Mohammad Saeed Ebrahimi Saadabadi, Sahar Rahimi Malakshan, Sobhan Soleymani, Moktari Mostofa, Nasser M. Nasrabadi
In this paper, we seek to draw connections between the frontal and profile face images in an abstract embedding space.
no code implementations • 2 Sep 2022 • Ali Dabouei, Fariborz Taherkhani, Sobhan Soleymani, Nasser M. Nasrabadi
This phenomenon hinders the outer optimization in AT since the convergence rate of MSGD is highly dependent on the variance of the gradients.
no code implementations • 25 Aug 2022 • Shoaib Meraj Sami, John McCauley, Sobhan Soleymani, Nasser Nasrabadi, Jeremy Dawson
The proposed network provides a quantitative similarity score for any two given faces and has been applied to large-scale face datasets to identify similar face pairs.
no code implementations • 10 Dec 2021 • Sobhan Soleymani, Ali Dabouei, Fariborz Taherkhani, Seyed Mehdi Iranmanesh, Jeremy Dawson, Nasser M. Nasrabadi
The first loss assures that the representations of modalities for a class have comparable magnitudes to provide a better quality estimation, while the multimodal representations of different classes are distributed to achieve maximum discrimination in the embedding space.
no code implementations • 29 Nov 2021 • Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
As such, instead of using images in the RGB domain, we decompose every image into its wavelet sub-bands using 2D wavelet decomposition and a deep supervised feature selection scheme is employed to find the most discriminative wavelet sub-bands of input images.
no code implementations • 3 Nov 2021 • Kelsey O'Haire, Sobhan Soleymani, Baaria Chaudhary, Poorya Aghdaie, Jeremy Dawson, Nasser M. Nasrabadi
In this paper, we explore combination of two methods for morphed image generation, those of geometric transformation (warping and blending to create morphed images) and photometric perturbation.
no code implementations • 29 Jul 2021 • Fariborz Taherkhani, Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
In this paper, we propose a new method to leverage features from human attributes for person ReID.
no code implementations • 29 Jul 2021 • Fariborz Taherkhani, Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
To address this problem, we use a new Multi-Task Learning (MTL) paradigm in which a facial attribute predictor uses the knowledge of other related attributes to obtain a better generalization performance.
no code implementations • 29 Jun 2021 • Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
Morphed images have exploited loopholes in the face recognition checkpoints, e. g., Credential Authentication Technology (CAT), used by Transportation Security Administration (TSA), which is a non-trivial security concern.
no code implementations • 24 Jun 2021 • Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
For some of the sub-bands, there is a marked difference between the entropy of the sub-band in a bona fide image and the identical sub-band's entropy in a morphed image.
no code implementations • CVPR 2021 • Fariborz Taherkhani, Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
The goal is to use Wasserstein metric to provide pseudo labels for the unlabeled images to train a Convolutional Neural Networks (CNN) in a Semi-Supervised Learning (SSL) manner for the classification task.
no code implementations • 16 Jun 2021 • Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
To detect morphing attacks, we propose a method which is based on a discriminative 2D Discrete Wavelet Transform (2D-DWT).
no code implementations • 2 Dec 2020 • Sobhan Soleymani, Ali Dabouei, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi
The network is trained by triplets of face images, in which the intermediate image inherits the landmarks from one image and the appearance from the other image.
no code implementations • 2 Dec 2020 • Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
Although biometric facial recognition systems are fast becoming part of security applications, these systems are still vulnerable to morphing attacks, in which a facial reference image can be verified as two or more separate identities.
2 code implementations • CVPR 2021 • Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Nasser M. Nasrabadi
On the distillation task, solely classifying images mixed using the teacher's knowledge achieves comparable performance to the state-of-the-art distillation methods.
no code implementations • 13 Jan 2020 • Ali Dabouei, Fariborz Taherkhani, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
We demonstrate that the proposed approach enhances the performance of deep face recognition models by assisting the training process in two ways.
no code implementations • 7 Jan 2020 • Seyed Mehdi Iranmanesh, Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Nasser M. Nasrabadi
In this work, we present a practical approach to the problem of facial landmark detection.
1 code implementation • 8 Oct 2019 • Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi
Deep neural networks are susceptible to adversarial manipulations in the input domain.
no code implementations • 8 Aug 2019 • Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
Deep neural networks have presented impressive performance in biometric applications.
no code implementations • 21 Jun 2019 • Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
Therefore, to compensate for this shortcoming, we propose to train a deep auto-encoder surrogate network to mimic the conventional iris code generation procedure.
no code implementations • 11 Feb 2019 • Veeru Talreja, Sobhan Soleymani, Matthew C. Valenti, Nasser M. Nasrabadi
The MDHND consists of two separate modules: a multimodal deep hashing (MDH) module, which is used for feature-level fusion and binarization of multiple biometrics, and a neural network decoder (NND) module, which is used to refine the intermediate binary codes generated by the MDH and compensate for the difference between enrollment and probe biometrics (variations in pose, illumination, etc.).
2 code implementations • 7 Jan 2019 • Amirsina Torfi, Rouzbeh A. Shirvani, Sobhan Soleymani, Naser M. Nasrabadi
The main goal of network pruning is imposing sparsity on the neural network by increasing the number of parameters with zero value in order to reduce the architecture size and the computational speedup.
no code implementations • NeurIPS 2018 • Hadi Kazemi, Sobhan Soleymani, Fariborz Taherkhani, Seyed Mehdi Iranmanesh, Nasser M. Nasrabadi
These approaches usually fail to model domain-specific information which has no representation in the target domain.
1 code implementation • 24 Sep 2018 • Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
The state-of-the-art performance of deep learning algorithms has led to a considerable increase in the utilization of machine learning in security-sensitive and critical applications.
no code implementations • 31 Jul 2018 • Seyed Mehdi Iranmanesh, Hadi Kazemi, Sobhan Soleymani, Ali Dabouei, Nasser M. Nasrabadi
The proposed Attribute-Assisted Deep Con- volutional Neural Network (AADCNN) method exploits the facial attributes and leverages the loss functions from the facial attributes identification and face verification tasks in order to learn rich discriminative features in a common em- bedding subspace.
no code implementations • 31 Jul 2018 • Sobhan Soleymani, Ali Dabouei, Seyed Mehdi Iranmanesh, Hadi Kazemi, Jeremy Dawson, Nasser M. Nasrabadi
In this paper a novel cross-device text-independent speaker verification architecture is proposed.
no code implementations • 31 Jul 2018 • Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremy Dawson, Nasser M. Nasrabadi
We achieved the rank-10 accuracy of 88. 02\% on the IIIT-Delhi latent fingerprint database for the task of latent-to-latent matching and rank-50 accuracy of 70. 89\% on the IIIT-Delhi MOLF database for the task of latent-to-sensor matching.
no code implementations • 3 Jul 2018 • Sobhan Soleymani, Ali Dabouei, Hadi Kazemi, Jeremy Dawson, Nasser M. Nasrabadi
Multiple features are extracted at several different convolutional layers from each modality-specific CNN for joint feature fusion, optimization, and classification.
no code implementations • 3 Jul 2018 • Sobhan Soleymani, Amirsina Torfi, Jeremy Dawson, Nasser M. Nasrabadi
We demonstrate that, rather than spatial fusion at the convolutional layers, the fusion can be performed on the outputs of the fully-connected layers of the modality-specific CNNs without any loss of performance and with significant reduction in the number of parameters.
no code implementations • 9 Apr 2018 • Hadi Kazemi, Sobhan Soleymani, Ali Dabouei, Mehdi Iranmanesh, Nasser M. Nasrabadi
Specifically, an attribute-centered loss is proposed which learns several distinct centers, in a shared embedding space, for photos and sketches with different combinations of attributes.
1 code implementation • 13 Feb 2018 • Amirsina Torfi, Rouzbeh A. Shirvani, Sobhan Soleymani, Nasser M. Nasrabadi
Network pruning is aimed at imposing sparsity in a neural network architecture by increasing the portion of zero-valued weights for reducing its size regarding energy-efficiency consideration and increasing evaluation speed.