no code implementations • 30 Jul 2024 • Jiageng Zhu, Hanchen Xie, Jiazhi Li, Wael Abd-Almageed
Accurate estimation of counterfactual outcomes in high-dimensional data is crucial for decision-making and understanding causal relationships and intervention outcomes in various domains, including healthcare, economics, and social sciences.
no code implementations • 10 Aug 2023 • Soumyaroop Nandi, Prem Natarajan, Wael Abd-Almageed
The evaluation datasets and metrics for image manipulation detection and localization (IMDL) research have been standardized.
no code implementations • 21 Sep 2022 • Jiageng Zhu, Hanchen Xie, Wael Abd-Almageed
However, the training process without utilizing any supervision signal have been proved to be inadequate for disentanglement representation learning.
no code implementations • 15 Sep 2022 • Jiageng Zhu, Hanchen Xie, Wael Abd-Almageed
Disentangled and invariant representations are two critical goals of representation learning and many approaches have been proposed to achieve either one of them.
no code implementations • 14 Sep 2022 • Jiazhi Li, Wael Abd-Almageed
As the social impact of visual recognition has been under scrutiny, several protected-attribute balanced datasets emerged to address dataset bias in imbalanced datasets.
no code implementations • 28 May 2022 • Gourav Datta, Souvik Kundu, Zihan Yin, Joe Mathai, Zeyu Liu, Zixu Wang, Mulin Tian, Shunlin Lu, Ravi T. Lakkireddy, Andrew Schmidt, Wael Abd-Almageed, Ajey P. Jacob, Akhilesh R. Jaiswal, Peter A. Beerel
The designs also reduce the sensor and total energy (obtained from in-house circuit simulations at Globalfoundries 22nm technology node) per frame by 5. 7x and 1. 14x, respectively.
no code implementations • 8 Nov 2021 • Hengameh Mirzaalian, Mohamed E. Hussein, Leonidas Spinoulas, Jonathan May, Wael Abd-Almageed
Due to the limited amount of annotated data in our study, we apply a light-weight LSTM network as our natural language generation model.
no code implementations • 8 Nov 2021 • Jiazhi Li, Wael Abd-Almageed
As equality issues in the use of face recognition have garnered a lot of attention lately, greater efforts have been made to debiased deep learning models to improve fairness to minorities.
no code implementations • ICCV 2021 • Jiawei Ma, Hanchen Xie, Guangxing Han, Shih-Fu Chang, Aram Galstyan, Wael Abd-Almageed
In this paper, we focus on the design of training strategy to obtain an elemental representation such that the prototype of each novel class can be estimated from a few labeled samples.
no code implementations • ICCV 2021 • Mohammad Rostami, Leonidas Spinoulas, Mohamed Hussein, Joe Mathai, Wael Abd-Almageed
Advances in deep learning, combined with availability of large datasets, have led to impressive improvements in face presentation attack detection research.
no code implementations • ICCV 2021 • Jiaxin Cheng, Soumyaroop Nandi, Prem Natarajan, Wael Abd-Almageed
Unlike conventional zero-shot classification, zero-shot semantic segmentation predicts a class label at the pixel level instead of the image level.
Ranked #13 on
Zero-Shot Semantic Segmentation
on COCO-Stuff
no code implementations • 30 Nov 2020 • Hanchen Xie, Mohamed E. Hussein, Aram Galstyan, Wael Abd-Almageed
We also show that MUSCLE has the potential to boost the classification performance when used in the fine-tuning phase for a model pre-trained only on unlabeled data.
1 code implementation • 18 Aug 2020 • Arindam Jati, Chin-Cheng Hsu, Monisankha Pal, Raghuveer Peri, Wael Abd-Almageed, Shrikanth Narayanan
Robust speaker recognition, including in the presence of malicious attacks, is becoming increasingly important and essential, especially due to the proliferation of several smart speakers and personal agents that interact with an individual's voice commands to perform diverse, and even sensitive tasks.
no code implementations • ECCV 2020 • Iacopo Masi, Aditya Killekar, Royston Marian Mascarenhas, Shenoy Pratik Gurudatt, Wael Abd-Almageed
The current spike of hyper-realistic faces artificially generated using deepfakes calls for media forensics solutions that are tailored to video streams and work reliably with a low false alarm rate at the video level.
no code implementations • 5 Jul 2020 • Xiao Guo, Hengameh Mirzaalian, Ekraam Sabir, Ayush Jaiswal, Wael Abd-Almageed
To overcome this gap, we introduce CORD19STS dataset which includes 13, 710 annotated sentence pairs collected from COVID-19 open research dataset (CORD-19) challenge.
no code implementations • 12 Jun 2020 • Leonidas Spinoulas, Mohamed Hussein, David Geissbühler, Joe Mathai, Oswin G. Almeida, Guillaume Clivaz, Sébastien Marcel, Wael Abd-Almageed
In this work, we present a general framework for building a biometrics system capable of capturing multispectral data from a series of sensors synchronized with active illumination sources.
1 code implementation • 12 Jun 2020 • Leonidas Spinoulas, Hengameh Mirzaalian, Mohamed Hussein, Wael Abd-Almageed
Our evaluation compares different combination of the new sensing modalities to legacy data from one of our collections as well as the public LivDet2015 dataset, showing the superiority of the new sensing modalities in most cases.
no code implementations • 2 Dec 2019 • Ayush Jaiswal, Rob Brekelmans, Daniel Moyer, Greg Ver Steeg, Wael Abd-Almageed, Premkumar Natarajan
Supervised machine learning models often associate irrelevant nuisance factors with the prediction target, which hurts generalization.
no code implementations • 11 Nov 2019 • Ayush Jaiswal, Daniel Moyer, Greg Ver Steeg, Wael Abd-Almageed, Premkumar Natarajan
We propose a novel approach to achieving invariance for deep neural networks in the form of inducing amnesia to unwanted factors of data through a new adversarial forgetting mechanism.
1 code implementation • CVPR 2020 • Iacopo Masi, Joe Mathai, Wael Abd-Almageed
Face segmentation is the task of densely labeling pixels on the face according to their semantics.
1 code implementation • 7 Jun 2019 • Joe Mathai, Iacopo Masi, Wael Abd-Almageed
Face occlusions, covering either the majority or discriminative parts of the face, can break facial perception and produce a drastic loss of information.
no code implementations • 6 Jun 2019 • Hengameh Mirzaalian, Mohamed Hussein, Wael Abd-Almageed
To examine the effect of the presence of an unseen attack, we apply a leave-one-attack out strategy.
no code implementations • 7 May 2019 • Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan
We present a unified invariance framework for supervised neural networks that can induce independence to nuisance factors of data without using any nuisance annotations, but can additionally use labeled information about biasing factors to force their removal from the latent embedding for making fair predictions.
1 code implementation • 2 May 2019 • Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael Abd-Almageed, Iacopo Masi, Prem Natarajan
The spread of misinformation through synthetically generated yet realistic images and videos has become a significant problem, calling for robust manipulation detection methods.
2 code implementations • CVPR 2019 • Jiaxin Cheng, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan
Finding a template in a search image is one of the core problems many computer vision, such as semantic image semantic, image-to-GPS verification \etc.
no code implementations • 8 Mar 2019 • Ayush Jaiswal, Shuai Xia, Iacopo Masi, Wael Abd-Almageed
For enterprise, personal and societal applications, there is now an increasing demand for automated authentication of identity from images using computer vision.
1 code implementation • CVPR 2019 • Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Iacopo Masi, Premkumar Natarajan
Image repurposing is a commonly used method for spreading misinformation on social media and online forums, which involves publishing untampered images with modified metadata to create rumors and further propaganda.
no code implementations • 18 Nov 2018 • Jiaxin Cheng, Yue Wu, Wael Abd-Almageed, Prem Natarajan
The image-to-GPS verification problem asks whether a given image is taken at a claimed GPS location.
no code implementations • NeurIPS 2018 • Ayush Jaiswal, Yue Wu, Wael Abd-Almageed, Premkumar Natarajan
Data representations that contain all the information about target variables but are invariant to nuisance factors benefit supervised learning algorithms by preventing them from learning associations between these factors and the targets, thus reducing overfitting.
1 code implementation • ECCV 2018 • Yue Wu, Wael Abd-Almageed, Prem Natarajan
We introduce a novel deep neural architecture for image copy-move forgery detection (CMFD), code-named BusterNet.
1 code implementation • 20 Aug 2018 • Ekraam Sabir, Wael Abd-Almageed, Yue Wu, Prem Natarajan
Nefarious actors on social media and other platforms often spread rumors and falsehoods through images whose metadata (e. g., captions) have been modified to provide visual substantiation of the rumor/falsehood.
no code implementations • 6 Jun 2018 • Saurabh Sahu, Rahul Gupta, Ganesh Sivaraman, Wael Abd-Almageed, Carol Espy-Wilson
Recently, generative adversarial networks and adversarial autoencoders have gained a lot of attention in machine learning community due to their exceptional performance in tasks such as digit classification and face recognition.
1 code implementation • 17 Feb 2018 • Ayush Jaiswal, Wael Abd-Almageed, Yue Wu, Premkumar Natarajan
We provide guidelines for designing CapsNet discriminators and the updated GAN objective function, which incorporates the CapsNet margin loss, for training CapsuleGAN models.
no code implementations • 20 Nov 2017 • Ayush Jaiswal, Wael Abd-Almageed, Yue Wu, Premkumar Natarajan
Conditional Generative Adversarial Networks (cGANs) are generative models that can produce data samples ($x$) conditioned on both latent variables ($z$) and known auxiliary information ($c$).
no code implementations • 6 Jul 2017 • Ayush Jaiswal, Ekraam Sabir, Wael Abd-Almageed, Premkumar Natarajan
In this paper, we present a novel deep learning-based approach for assessing the semantic integrity of multimedia packages containing images and captions, using a reference set of multimedia packages.
no code implementations • 27 May 2017 • Yue Wu, Wael Abd-Almageed, Prem Natarajan
Here the task is to estimate the probability that the donor image has been used to splice the query image, and obtain the splicing masks for both the query and donor images.
no code implementations • 23 Mar 2016 • Wael Abd-Almageed, Yue Wua, Stephen Rawlsa, Shai Harel, Tal Hassner, Iacopo Masi, Jongmoo Choi, Jatuporn Toy Leksut, Jungyeon Kim, Prem Natarajan, Ram Nevatia, Gerard Medioni
In our representation, a face image is processed by several pose-specific deep convolutional neural network (CNN) models to generate multiple pose-specific features.
Ranked #15 on
Face Verification
on IJB-A
no code implementations • CVPR 2015 • Xianzhi Du, David Doermann, Wael Abd-Almageed
In this paper, we present a novel partial signature matching method using graphical models.
no code implementations • 4 May 2015 • Yue Wu, Stephen Rawls, Wael Abd-Almageed, Premkumar Natarajan
In this paper we present a fully trainable binarization solution for degraded document images.