Search Results for author: Wael Abd-Almageed

Found 33 papers, 10 papers with code

Information-Theoretic Bias Assessment Of Learned Representations Of Pretrained Face Recognition

no code implementations8 Nov 2021 Jiazhi Li, Wael Abd-Almageed

As equality issues in the use of face recognition have garnered a lot of attention lately, greater efforts have been made to debiased deep learning models to improve fairness to minorities.

Face Recognition Fairness

Partner-Assisted Learning for Few-Shot Image Classification

no code implementations ICCV 2021 Jiawei Ma, Hanchen Xie, Guangxing Han, Shih-Fu Chang, Aram Galstyan, Wael Abd-Almageed

In this paper, we focus on the design of training strategy to obtain an elemental representation such that the prototype of each novel class can be estimated from a few labeled samples.

Classification Few-Shot Image Classification

Detection and Continual Learning of Novel Face Presentation Attacks

no code implementations ICCV 2021 Mohammad Rostami, Leonidas Spinoulas, Mohamed Hussein, Joe Mathai, Wael Abd-Almageed

Advances in deep learning, combined with availability of large datasets, have led to impressive improvements in face presentation attack detection research.

Continual Learning Face Presentation Attack Detection

MUSCLE: Strengthening Semi-Supervised Learning Via Concurrent Unsupervised Learning Using Mutual Information Maximization

no code implementations30 Nov 2020 Hanchen Xie, Mohamed E. Hussein, Aram Galstyan, Wael Abd-Almageed

We also show that MUSCLE has the potential to boost the classification performance when used in the fine-tuning phase for a model pre-trained only on unlabeled data.

Adversarial Attack and Defense Strategies for Deep Speaker Recognition Systems

1 code implementation18 Aug 2020 Arindam Jati, Chin-Cheng Hsu, Monisankha Pal, Raghuveer Peri, Wael Abd-Almageed, Shrikanth Narayanan

Robust speaker recognition, including in the presence of malicious attacks, is becoming increasingly important and essential, especially due to the proliferation of several smart speakers and personal agents that interact with an individual's voice commands to perform diverse, and even sensitive tasks.

Adversarial Attack Adversarial Robustness +1

Two-branch Recurrent Network for Isolating Deepfakes in Videos

no code implementations ECCV 2020 Iacopo Masi, Aditya Killekar, Royston Marian Mascarenhas, Shenoy Pratik Gurudatt, Wael Abd-Almageed

The current spike of hyper-realistic faces artificially generated using deepfakes calls for media forensics solutions that are tailored to video streams and work reliably with a low false alarm rate at the video level.

DeepFake Detection Face Swapping

CORD19STS: COVID-19 Semantic Textual Similarity Dataset

no code implementations5 Jul 2020 Xiao Guo, Hengameh Mirzaalian, Ekraam Sabir, Ayush Jaiswal, Wael Abd-Almageed

To overcome this gap, we introduce CORD19STS dataset which includes 13, 710 annotated sentence pairs collected from COVID-19 open research dataset (CORD-19) challenge.

Information Retrieval Language Modelling +3

Multispectral Biometrics System Framework: Application to Presentation Attack Detection

no code implementations12 Jun 2020 Leonidas Spinoulas, Mohamed Hussein, David Geissbühler, Joe Mathai, Oswin G. Almeida, Guillaume Clivaz, Sébastien Marcel, Wael Abd-Almageed

In this work, we present a general framework for building a biometrics system capable of capturing multispectral data from a series of sensors synchronized with active illumination sources.

Multi-Modal Fingerprint Presentation Attack Detection: Evaluation On A New Dataset

1 code implementation12 Jun 2020 Leonidas Spinoulas, Hengameh Mirzaalian, Mohamed Hussein, Wael Abd-Almageed

Our evaluation compares different combination of the new sensing modalities to legacy data from one of our collections as well as the public LivDet2015 dataset, showing the superiority of the new sensing modalities in most cases.

Discovery and Separation of Features for Invariant Representation Learning

no code implementations2 Dec 2019 Ayush Jaiswal, Rob Brekelmans, Daniel Moyer, Greg Ver Steeg, Wael Abd-Almageed, Premkumar Natarajan

Supervised machine learning models often associate irrelevant nuisance factors with the prediction target, which hurts generalization.

Representation Learning

Invariant Representations through Adversarial Forgetting

no code implementations11 Nov 2019 Ayush Jaiswal, Daniel Moyer, Greg Ver Steeg, Wael Abd-Almageed, Premkumar Natarajan

We propose a novel approach to achieving invariance for deep neural networks in the form of inducing amnesia to unwanted factors of data through a new adversarial forgetting mechanism.

Towards Learning Structure via Consensus for Face Segmentation and Parsing

1 code implementation CVPR 2020 Iacopo Masi, Joe Mathai, Wael Abd-Almageed

Face segmentation is the task of densely labeling pixels on the face according to their semantics.

Does Generative Face Completion Help Face Recognition?

1 code implementation7 Jun 2019 Joe Mathai, Iacopo Masi, Wael Abd-Almageed

Face occlusions, covering either the majority or discriminative parts of the face, can break facial perception and produce a drastic loss of information.

Face Recognition Facial Inpainting

Unified Adversarial Invariance

no code implementations7 May 2019 Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan

We present a unified invariance framework for supervised neural networks that can induce independence to nuisance factors of data without using any nuisance annotations, but can additionally use labeled information about biasing factors to force their removal from the latent embedding for making fair predictions.

Disentanglement Fairness

Recurrent Convolutional Strategies for Face Manipulation Detection in Videos

1 code implementation2 May 2019 Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael Abd-Almageed, Iacopo Masi, Prem Natarajan

The spread of misinformation through synthetically generated yet realistic images and videos has become a significant problem, calling for robust manipulation detection methods.

Face Swapping Misinformation

QATM: Quality-Aware Template Matching For Deep Learning

2 code implementations CVPR 2019 Jiaxin Cheng, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan

Finding a template in a search image is one of the core problems many computer vision, such as semantic image semantic, image-to-GPS verification \etc.

Image-To-Gps Verification Template Matching

RoPAD: Robust Presentation Attack Detection through Unsupervised Adversarial Invariance

no code implementations8 Mar 2019 Ayush Jaiswal, Shuai Xia, Iacopo Masi, Wael Abd-Almageed

For enterprise, personal and societal applications, there is now an increasing demand for automated authentication of identity from images using computer vision.

AIRD: Adversarial Learning Framework for Image Repurposing Detection

1 code implementation CVPR 2019 Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Iacopo Masi, Premkumar Natarajan

Image repurposing is a commonly used method for spreading misinformation on social media and online forums, which involves publishing untampered images with modified metadata to create rumors and further propaganda.

Misinformation

Image-to-GPS Verification Through A Bottom-Up Pattern Matching Network

no code implementations18 Nov 2018 Jiaxin Cheng, Yue Wu, Wael Abd-Almageed, Prem Natarajan

The image-to-GPS verification problem asks whether a given image is taken at a claimed GPS location.

Image-To-Gps Verification

Unsupervised Adversarial Invariance

no code implementations NeurIPS 2018 Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan

Data representations that contain all the information about target variables but are invariant to nuisance factors benefit supervised learning algorithms by preventing them from learning associations between these factors and the targets, thus reducing overfitting.

Data Augmentation Disentanglement +3

BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization

1 code implementation ECCV 2018 Yue Wu, Wael Abd-Almageed, Prem Natarajan

We introduce a novel deep neural architecture for image copy-move forgery detection (CMFD), code-named BusterNet.

Deep Multimodal Image-Repurposing Detection

1 code implementation20 Aug 2018 Ekraam Sabir, Wael Abd-Almageed, Yue Wu, Prem Natarajan

Nefarious actors on social media and other platforms often spread rumors and falsehoods through images whose metadata (e. g., captions) have been modified to provide visual substantiation of the rumor/falsehood.

Adversarial Auto-encoders for Speech Based Emotion Recognition

no code implementations6 Jun 2018 Saurabh Sahu, Rahul Gupta, Ganesh Sivaraman, Wael Abd-Almageed, Carol Espy-Wilson

Recently, generative adversarial networks and adversarial autoencoders have gained a lot of attention in machine learning community due to their exceptional performance in tasks such as digit classification and face recognition.

Emotion Recognition Face Recognition

CapsuleGAN: Generative Adversarial Capsule Network

1 code implementation17 Feb 2018 Ayush Jaiswal, Wael Abd-Almageed, Yue Wu, Premkumar Natarajan

We provide guidelines for designing CapsNet discriminators and the updated GAN objective function, which incorporates the CapsNet margin loss, for training CapsuleGAN models.

General Classification Semi-Supervised Image Classification

Bidirectional Conditional Generative Adversarial Networks

no code implementations20 Nov 2017 Ayush Jaiswal, Wael Abd-Almageed, Yue Wu, Premkumar Natarajan

Conditional Generative Adversarial Networks (cGANs) are generative models that can produce data samples ($x$) conditioned on both latent variables ($z$) and known auxiliary information ($c$).

Multimedia Semantic Integrity Assessment Using Joint Embedding Of Images And Text

no code implementations6 Jul 2017 Ayush Jaiswal, Ekraam Sabir, Wael Abd-Almageed, Premkumar Natarajan

In this paper, we present a novel deep learning-based approach for assessing the semantic integrity of multimedia packages containing images and captions, using a reference set of multimedia packages.

Representation Learning

Deep Matching and Validation Network -- An End-to-End Solution to Constrained Image Splicing Localization and Detection

no code implementations27 May 2017 Yue Wu, Wael Abd-Almageed, Prem Natarajan

Here the task is to estimate the probability that the donor image has been used to splice the query image, and obtain the splicing masks for both the query and donor images.

Image Manipulation

Face Recognition Using Deep Multi-Pose Representations

no code implementations23 Mar 2016 Wael Abd-Almageed, Yue Wua, Stephen Rawlsa, Shai Harel, Tal Hassner, Iacopo Masi, Jongmoo Choi, Jatuporn Toy Leksut, Jungyeon Kim, Prem Natarajan, Ram Nevatia, Gerard Medioni

In our representation, a face image is processed by several pose-specific deep convolutional neural network (CNN) models to generate multiple pose-specific features.

Face Recognition Face Verification +1

A Graphical Model Approach for Matching Partial Signatures

no code implementations CVPR 2015 Xianzhi Du, David Doermann, Wael Abd-Almageed

In this paper, we present a novel partial signature matching method using graphical models.

Learning Document Image Binarization from Data

no code implementations4 May 2015 Yue Wu, Stephen Rawls, Wael Abd-Almageed, Premkumar Natarajan

In this paper we present a fully trainable binarization solution for degraded document images.

Binarization

Cannot find the paper you are looking for? You can Submit a new open access paper.