Skip to main content

Showing 1–47 of 47 results for author: Boult, T

.
  1. arXiv:2502.03359  [pdf, other

    cs.CV cs.AI cs.LG

    GHOST: Gaussian Hypothesis Open-Set Technique

    Authors: Ryan Rabinowitz, Steve Cruz, Manuel Günther, Terrance E. Boult

    Abstract: Evaluations of large-scale recognition methods typically focus on overall performance. While this approach is common, it often fails to provide insights into performance across individual classes, which can lead to fairness issues and misrepresentation. Addressing these gaps is crucial for accurately assessing how well methods handle novel or unseen classes and ensuring a fair evaluation. To addre… ▽ More

    Submitted 10 February, 2025; v1 submitted 5 February, 2025; originally announced February 2025.

    Comments: Accepted at AAAI Conference on Artificial Intelligence 2025

  2. SMART-Vision: Survey of Modern Action Recognition Techniques in Vision

    Authors: Ali K. AlShami, Ryan Rabinowitz, Khang Lam, Yousra Shleibik, Melkamu Mersha, Terrance Boult, Jugal Kalita

    Abstract: Human Action Recognition (HAR) is a challenging domain in computer vision, involving recognizing complex patterns by analyzing the spatiotemporal dynamics of individuals' movements in videos. These patterns arise in sequential data, such as video frames, which are often essential to accurately distinguish actions that would be ambiguous in a single image. HAR has garnered considerable interest due… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

    Journal ref: Multimedia Tools and Applications, Springer, 2024, pp. 1-72

  3. arXiv:2412.05462  [pdf, other

    cs.CV

    COOOL: Challenge Of Out-Of-Label A Novel Benchmark for Autonomous Driving

    Authors: Ali K. AlShami, Ananya Kalita, Ryan Rabinowitz, Khang Lam, Rishabh Bezbarua, Terrance Boult, Jugal Kalita

    Abstract: As the Computer Vision community rapidly develops and advances algorithms for autonomous driving systems, the goal of safer and more efficient autonomous transportation is becoming increasingly achievable. However, it is 2024, and we still do not have fully self-driving cars. One of the remaining core challenges lies in addressing the novelty problem, where self-driving systems still struggle to h… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

  4. Pose2Trajectory: Using Transformers on Body Pose to Predict Tennis Player's Trajectory

    Authors: Ali K. AlShami, Terrance Boult, Jugal Kalita

    Abstract: Tracking the trajectory of tennis players can help camera operators in production. Predicting future movement enables cameras to automatically track and predict a player's future trajectory without human intervention. Predicting future human movement in the context of complex physical tasks is also intellectually satisfying. Swift advancements in sports analytics and the wide availability of video… ▽ More

    Submitted 7 November, 2024; originally announced November 2024.

    Journal ref: J. Vis. Commun. Image R. 92 (2023)

  5. arXiv:2409.07220  [pdf, other

    cs.CV

    Watchlist Challenge: 3rd Open-set Face Detection and Identification

    Authors: Furkan Kasım, Terrance E. Boult, Rensso Mora, Bernardo Biesseck, Rafael Ribeiro, Jan Schlueter, Tomáš Repák, Rafael Henrique Vareto, David Menotti, William Robson Schwartz, Manuel Günther

    Abstract: In the current landscape of biometrics and surveillance, the ability to accurately recognize faces in uncontrolled settings is paramount. The Watchlist Challenge addresses this critical need by focusing on face detection and open-set identification in real-world surveillance scenarios. This paper presents a comprehensive evaluation of participating algorithms, using the enhanced UnConstrained Coll… ▽ More

    Submitted 11 September, 2024; originally announced September 2024.

    Comments: Accepted for presentation at IJCB 2024

  6. arXiv:2311.00400  [pdf, other

    cs.CV

    Open-Set Face Recognition with Maximal Entropy and Objectosphere Loss

    Authors: Rafael Henrique Vareto, Yu Linghu, Terrance E. Boult, William Robson Schwartz, Manuel Günther

    Abstract: Open-set face recognition characterizes a scenario where unknown individuals, unseen during the training and enrollment stages, appear on operation time. This work concentrates on watchlists, an open-set task that is expected to operate at a low False Positive Identification Rate and generally includes only a few enrollment samples per identity. We introduce a compact adapter network that benefits… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: Accepted for publication in Image and Vision Computing 2023

  7. arXiv:2307.14278  [pdf, other

    cs.CV

    Large-scale Fully-Unsupervised Re-Identification

    Authors: Gabriel Bertocco, Fernanda Andaló, Terrance E. Boult, Anderson Rocha

    Abstract: Fully-unsupervised Person and Vehicle Re-Identification have received increasing attention due to their broad applicability in surveillance, forensics, event understanding, and smart cities, without requiring any manual annotation. However, most of the prior art has been evaluated in datasets that have just a couple thousand samples. Such small-data setups often allow the use of costly techniques… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: This paper has been submitted for possible publication in an IEEE Transactions

  8. arXiv:2302.05753  [pdf, other

    cs.CV

    DaliID: Distortion-Adaptive Learned Invariance for Identification Models

    Authors: Wes Robbins, Gabriel Bertocco, Terrance E. Boult

    Abstract: In unconstrained scenarios, face recognition and person re-identification are subject to distortions such as motion blur, atmospheric turbulence, or upsampling artifacts. To improve robustness in these scenarios, we propose a methodology called Distortion-Adaptive Learned Invariance for Identification (DaliID) models. We contend that distortion augmentations, which degrade image quality, can be su… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  9. arXiv:2210.07356  [pdf, other

    cs.CV

    Consistency and Accuracy of CelebA Attribute Values

    Authors: Haiyu Wu, Grace Bezold, Manuel Günther, Terrance Boult, Michael C. King, Kevin W. Bowyer

    Abstract: We report the first systematic analysis of the experimental foundations of facial attribute classification. Two annotators independently assigning attribute values shows that only 12 of 40 common attributes are assigned values with >= 95% consistency, and three (high cheekbones, pointed nose, oval face) have essentially random consistency. Of 5,068 duplicate face appearances in CelebA, attributes… ▽ More

    Submitted 16 April, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

  10. arXiv:2201.07894  [pdf, other

    cs.CV cs.AI

    Enhanced Performance of Pre-Trained Networks by Matched Augmentation Distributions

    Authors: Touqeer Ahmad, Mohsen Jafarzadeh, Akshay Raj Dhamija, Ryan Rabinowitz, Steve Cruz, Chunchun Li, Terrance E. Boult

    Abstract: There exists a distribution discrepancy between training and testing, in the way images are fed to modern CNNs. Recent work tried to bridge this gap either by fine-tuning or re-training the network at different resolutions. However re-training a network is rarely cheap and not always viable. To this end, we propose a simple solution to address the train-test distributional shift and enhance the pe… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    MSC Class: 68T45 ACM Class: I.4.8

  11. arXiv:2112.03692  [pdf

    cs.CR cs.DC

    Blockchain Synchronous Trust Consensus Model

    Authors: Christopher Gorog, Terrance E. Boult

    Abstract: This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeav… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: Publication TBD

  12. arXiv:2102.07848  [pdf, other

    cs.CV cs.LG

    Self-Supervised Features Improve Open-World Learning

    Authors: Akshay Raj Dhamija, Touqeer Ahmad, Jonathan Schwan, Mohsen Jafarzadeh, Chunchun Li, Terrance E. Boult

    Abstract: This paper identifies the flaws in existing open-world learning approaches and attempts to provide a complete picture in the form of \textbf{True Open-World Learning}. We accomplish this by proposing a comprehensive generalize-able open-world learning protocol capable of evaluating various components of open-world learning in an operational setting. We argue that in true open-world learning, the u… ▽ More

    Submitted 29 April, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

    MSC Class: 68T45 ACM Class: I.4.8

  13. arXiv:2012.04226  [pdf, other

    cs.AI cs.CV cs.LG

    A Unifying Framework for Formal Theories of Novelty:Framework, Examples and Discussion

    Authors: T. E. Boult, P. A. Grabowicz, D. S. Prijatelj, R. Stern, L. Holder, J. Alspector, M. Jafarzadeh, T. Ahmad, A. R. Dhamija, C. Li, S. Cruz, A. Shrivastava, C. Vondrick, W. J. Scheirer

    Abstract: Managing inputs that are novel, unknown, or out-of-distribution is critical as an agent moves from the lab to the open world. Novelty-related problems include being tolerant to novel perturbations of the normal input, detecting when the input includes novel items, and adapting to novel inputs. While significant research has been undertaken in these areas, a noticeable gap exists in the lack of a f… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: Extended version/preprint of a AAAI 2021 paper

  14. arXiv:2011.12906  [pdf, other

    cs.CV cs.AI cs.LG eess.IV eess.SP

    A Review of Open-World Learning and Steps Toward Open-World Learning Without Labels

    Authors: Mohsen Jafarzadeh, Akshay Raj Dhamija, Steve Cruz, Chunchun Li, Touqeer Ahmad, Terrance E. Boult

    Abstract: In open-world learning, an agent starts with a set of known classes, detects, and manages things that it does not know, and learns them over time from a non-stationary stream of data. Open-world learning is related to but also distinct from a multitude of other learning problems and this paper briefly analyzes the key differences between a wide range of problems including incremental learning, gen… ▽ More

    Submitted 3 January, 2022; v1 submitted 25 November, 2020; originally announced November 2020.

    MSC Class: 68T45 ACM Class: I.4.8

  15. arXiv:2011.05506  [pdf, other

    cs.CV cs.LG eess.IV eess.SP

    Automatic Open-World Reliability Assessment

    Authors: Mohsen Jafarzadeh, Touqeer Ahmad, Akshay Raj Dhamija, Chunchun Li, Steve Cruz, Terrance E. Boult

    Abstract: Image classification in the open-world must handle out-of-distribution (OOD) images. Systems should ideally reject OOD images, or they will map atop of known classes and reduce reliability. Using open-set classifiers that can reject OOD inputs can help. However, optimal accuracy of open-set classifiers depend on the frequency of OOD data. Thus, for either standard or open-set classifiers, it is im… ▽ More

    Submitted 13 December, 2020; v1 submitted 10 November, 2020; originally announced November 2020.

    Comments: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV)

    MSC Class: 68T45 ACM Class: I.4.8

    Journal ref: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV)

  16. arXiv:2004.08443  [pdf, other

    cs.CV

    Adversarial Attack on Deep Learning-Based Splice Localization

    Authors: Andras Rozsa, Zheng Zhong, Terrance E. Boult

    Abstract: Regarding image forensics, researchers have proposed various approaches to detect and/or localize manipulations, such as splices. Recent best performing image-forensics algorithms greatly benefit from the application of deep learning, but such tools can be vulnerable to adversarial attacks. Due to the fact that most of the proposed adversarial example generation techniques can be used only on end-… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: This is a pre-print of the original paper accepted at the CVPR Workshop on Media Forensics 2020

  17. To Beta or Not To Beta: Information Bottleneck for DigitaL Image Forensics

    Authors: Aurobrata Ghosh, Zheng Zhong, Steve Cruz, Subbu Veeravasarapu, Terrance E Boult, Maneesh Singh

    Abstract: We consider an information theoretic approach to address the problem of identifying fake digital images. We propose an innovative method to formulate the issue of localizing manipulated regions in an image as a deep representation learning problem using the Information Bottleneck (IB), which has recently gained popularity as a framework for interpreting deep neural networks. Tampered images pose a… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

    Comments: 10 pages

    Journal ref: 2020 IEEE International Conference on Image Processing (ICIP)

  18. arXiv:1908.02435  [pdf, other

    cs.CV cs.LG

    Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations

    Authors: Andras Rozsa, Terrance E. Boult

    Abstract: Adversarial examples contain small perturbations that can remain imperceptible to human observers but alter the behavior of even the best performing deep learning models and yield incorrect outputs. Since their discovery, adversarial examples have drawn significant attention in machine learning: researchers try to reveal the reasons for their existence and improve the robustness of machine learnin… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  19. arXiv:1906.11663  [pdf, other

    cs.CV

    SpliceRadar: A Learned Method For Blind Image Forensics

    Authors: Aurobrata Ghosh, Zheng Zhong, Terrance E Boult, Maneesh Singh

    Abstract: Detection and localization of image manipulations like splices are gaining in importance with the easy accessibility of image editing softwares. While detection generates a verdict for an image it provides no insight into the manipulation. Localization helps explain a positive detection by identifying the pixels of the image which have been tampered. We propose a deep learning based method for spl… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: CVPR 2019, Workshop on Media Forensics, 8 pages

  20. arXiv:1811.04358  [pdf, other

    cs.CV

    Neural Generative Models for 3D Faces with Application in 3D Texture Free Face Recognition

    Authors: Ahmed ElSayed, Elif Kongar, Ausif Mahmood, Tarek Sobh, Terrance Boult

    Abstract: Using heterogeneous depth cameras and 3D scanners in 3D face verification causes variations in the resolution of the 3D point clouds. To solve this issue, previous studies use 3D registration techniques. Out of these proposed techniques, detecting points of correspondence is proven to be an efficient method given that the data belongs to the same individual. However, if the data belongs to differe… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

  21. arXiv:1811.04110  [pdf, other

    cs.CV

    Reducing Network Agnostophobia

    Authors: Akshay Raj Dhamija, Manuel Günther, Terrance E. Boult

    Abstract: Agnostophobia, the fear of the unknown, can be experienced by deep learning engineers while applying their networks to real-world applications. Unfortunately, network behavior is not well defined for inputs far from a networks training set. In an uncontrolled environment, networks face many instances that are not of interest to them and have to be rejected in order to avoid a false positive. This… ▽ More

    Submitted 22 December, 2018; v1 submitted 9 November, 2018; originally announced November 2018.

    Comments: Neural Information Processing Systems (NeurIPS) 2018

  22. Facial Attributes: Accuracy and Adversarial Robustness

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability… ▽ More

    Submitted 20 April, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

    Comments: arXiv admin note: text overlap with arXiv:1605.05411

    Journal ref: Pattern Recognition Letters, 2017, ISSN 0167-8655

  23. arXiv:1708.06997  [pdf, other

    cs.CV

    The Unconstrained Ear Recognition Challenge

    Authors: Žiga Emeršič, Dejan Štepec, Vitomir Štruc, Peter Peer, Anjith George, Adil Ahmad, Elshibani Omar, Terrance E. Boult, Reza Safdari, Yuxiang Zhou, Stefanos Zafeiriou, Dogucan Yaman, Fevziye I. Eyiokur, Hazim K. Ekenel

    Abstract: In this paper we present the results of the Unconstrained Ear Recognition Challenge (UERC), a group benchmarking effort centered around the problem of person recognition from ear images captured in uncontrolled conditions. The goal of the challenge was to assess the performance of existing ear recognition techniques on a challenging large-scale dataset and identify open problems that need to be ad… ▽ More

    Submitted 1 February, 2019; v1 submitted 23 August, 2017; originally announced August 2017.

    Comments: International Joint Conference on Biometrics 2017

  24. Unconstrained Face Detection and Open-Set Face Recognition Challenge

    Authors: Manuel Günther, Peiyun Hu, Christian Herrmann, Chi Ho Chan, Min Jiang, Shufan Yang, Akshay Raj Dhamija, Deva Ramanan, Jürgen Beyerer, Josef Kittler, Mohamad Al Jazaery, Mohammad Iqbal Nouyed, Guodong Guo, Cezary Stankiewicz, Terrance E. Boult

    Abstract: Face detection and recognition benchmarks have shifted toward more difficult environments. The challenge presented in this paper addresses the next step in the direction of automatic detection and identification of people from outdoor surveillance cameras. While face detection has shown remarkable success in images collected from the web, surveillance cameras include more diverse occlusions, poses… ▽ More

    Submitted 25 September, 2018; v1 submitted 7 August, 2017; originally announced August 2017.

    Comments: This is an ERRATA version of the paper originally presented at the International Joint Conference on Biometrics. Due to a bug in our evaluation code, the results of the participants changed. The final conclusion, however, is still the same

  25. arXiv:1708.01697  [pdf, other

    cs.CV

    Adversarial Robustness: Softmax versus Openmax

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks (DNNs) provide state-of-the-art results on various tasks and are widely used in real world applications. However, it was discovered that machine learning models, including the best performing DNNs, suffer from a fundamental problem: they can unexpectedly and confidently misclassify examples formed by slightly perturbing otherwise correctly recognized inputs. Various approaches… ▽ More

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: Accepted to British Machine Vision Conference (BMVC) 2017

  26. arXiv:1705.01567  [pdf, other

    cs.CV

    Toward Open-Set Face Recognition

    Authors: Manuel Günther, Steve Cruz, Ethan M. Rudd, Terrance E. Boult

    Abstract: Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects that are enrolled in the gallery. Real systems, however, where only a fraction of probe sample identities are enrol… ▽ More

    Submitted 18 May, 2017; v1 submitted 3 May, 2017; originally announced May 2017.

    Comments: Accepted for Publication in CVPR 2017 Biometrics Workshop

  27. arXiv:1703.02248  [pdf, other

    cs.CR

    Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters

    Authors: Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult

    Abstract: The U.S Government has been the target for cyber-attacks from all over the world. Just recently, former President Obama accused the Russian government of the leaking emails to Wikileaks and declared that the U.S. might be forced to respond. While Russia denied involvement, it is clear that the U.S. has to take some defensive measures to protect its data infrastructure. Insider threats have been th… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Pre-print of camera-ready copy accepted to the 2017 IEEE Homeland Security Technologies (HST) conference

  28. arXiv:1703.02244  [pdf, other

    cs.CR

    Open Set Intrusion Recognition for Fine-Grained Attack Categorization

    Authors: Steve Cruz, Cora Coleman, Ethan M. Rudd, Terrance E. Boult

    Abstract: Confidently distinguishing a malicious intrusion over a network is an important challenge. Most intrusion detection system evaluations have been performed in a closed set protocol in which only classes seen during training are considered during classification. Thus far, there has been no realistic application in which novel types of behaviors unseen at training -- unknown classes as it were -- mus… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Pre-print of camera-ready version to appear at the IEEE Homeland Security Technologies (HST) 2017 Conference

  29. arXiv:1612.00138  [pdf, other

    cs.CV

    Towards Robust Deep Neural Networks with BANG

    Authors: Andras Rozsa, Manuel Gunther, Terrance E. Boult

    Abstract: Machine learning models, including state-of-the-art deep neural networks, are vulnerable to small perturbations that cause unexpected classification errors. This unexpected lack of robustness raises fundamental questions about their generalization properties and poses a serious concern for practical deployments. As such perturbations can remain imperceptible - the formed adversarial examples demon… ▽ More

    Submitted 30 January, 2018; v1 submitted 30 November, 2016; originally announced December 2016.

    Comments: Accepted to the IEEE Winter Conference on Applications of Computer Vision (WACV), 2018

  30. arXiv:1611.06179  [pdf, other

    cs.CV

    LOTS about Attacking Deep Features

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks provide state-of-the-art performance on various tasks and are, therefore, widely used in real world applications. DNNs are becoming frequently utilized in biometrics for extracting deep features, which can be used in recognition systems for enrolling and recognizing new individuals. It was revealed that deep neural networks suffer from a fundamental problem, namely, they can u… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: Accepted to the International Joint Conference on Biometrics (IJCB) 2017

  31. arXiv:1611.06158  [pdf, other

    cs.CV

    AFFACT - Alignment-Free Facial Attribute Classification Technique

    Authors: Manuel Günther, Andras Rozsa, Terrance E. Boult

    Abstract: Facial attributes are soft-biometrics that allow limiting the search space, e.g., by rejecting identities with non-matching facial characteristics such as nose sizes or eyebrow shapes. In this paper, we investigate how the latest versions of deep convolutional neural networks, ResNets, perform on the facial attribute classification task. We test two loss functions: the sigmoid cross-entropy loss a… ▽ More

    Submitted 4 August, 2017; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: This is a pre-print of the original paper accepted for oral presentation at the International Joint Conference on Biometrics (IJCB) 2017

  32. arXiv:1610.06856  [pdf, other

    cs.CR cs.AI cs.CL cs.CY

    Automated Big Text Security Classification

    Authors: Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow

    Abstract: In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution f… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: Pre-print of Best Paper Award IEEE Intelligence and Security Informatics (ISI) 2016 Manuscript

    Journal ref: 2016 IEEE International Conference on Intelligence and Security Informatics (ISI)

  33. Are Accuracy and Robustness Correlated?

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Machine learning models are vulnerable to adversarial examples formed by applying small carefully chosen perturbations to inputs that cause unexpected classification errors. In this paper, we perform experiments on various adversarial example generation approaches with multiple deep convolutional neural networks including Residual Networks, the best performing models on ImageNet Large-Scale Visual… ▽ More

    Submitted 30 November, 2016; v1 submitted 14 October, 2016; originally announced October 2016.

    Comments: Accepted for publication at ICMLA 2016

  34. arXiv:1610.04256  [pdf, other

    cs.CV

    Assessing Threat of Adversarial Examples on Deep Neural Networks

    Authors: Abigail Graese, Andras Rozsa, Terrance E. Boult

    Abstract: Deep neural networks are facing a potential security threat from adversarial examples, inputs that look normal but cause an incorrect classification by the deep neural network. For example, the proposed threat could result in hand-written digits on a scanned check being incorrectly classified but looking normal when humans see them. This research assesses the extent to which adversarial examples p… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

    Comments: This is a pre-print version to appear in IEEE ICMLA 2016

  35. Open-Set Support Vector Machines

    Authors: Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha

    Abstract: Often, when dealing with real-world recognition problems, we do not need, and often cannot have, knowledge of the entire set of possible classes that might appear during operational testing. In such cases, we need to think of robust classification methods able to deal with the "unknown" and properly reject samples belonging to classes never seen during training. Notwithstanding, existing classifie… ▽ More

    Submitted 21 February, 2022; v1 submitted 12 June, 2016; originally announced June 2016.

    Comments: Version accepted for publication in IEEE Transactions on Systems, Man, and Cybernetics: Systems

  36. arXiv:1605.05411  [pdf, other

    cs.CV

    Are Facial Attributes Adversarially Robust?

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial attributes must be extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution for automatic facial attribute extraction by training a deep convolutional neural network (DC… ▽ More

    Submitted 16 September, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: Pre-print of article accepted to the International Conference on Pattern Recognition (ICPR) 2016. 7 pages total

  37. arXiv:1605.03124  [pdf, other

    cs.CV

    PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses

    Authors: Ethan M. Rudd, Manuel Gunther, Terrance E. Boult

    Abstract: For applications such as airport border control, biometric technologies that can process many capture subjects quickly, efficiently, with weak supervision, and with minimal discomfort are desirable. Facial recognition is particularly appealing because it is minimally invasive yet offers relatively good recognition performance. Unfortunately, the combination of weak supervision and minimal invasive… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 Biometrics Workshop

  38. arXiv:1605.03116  [pdf, other

    cs.CR

    CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

    Authors: Ethan M. Rudd, Terrance E. Boult

    Abstract: Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages service/application access is not fake. In this paper, we introduce the CALIPER protocol, in which a separate Continuous Access Verification Entity (C… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 Biometrics Workshop

  39. arXiv:1605.01775  [pdf, other

    cs.CV

    Adversarial Diversity and Hard Positive Generation

    Authors: Andras Rozsa, Ethan M. Rudd, Terrance E. Boult

    Abstract: State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present a new psychometric perceptual adversarial similarity score (PASS) measure for quantifying adversarial images, introduce the notion of hard positive generation, and use a diverse set of adversarial perturbations -… ▽ More

    Submitted 16 May, 2016; v1 submitted 5 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 DeepVision Workshop

  40. MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes

    Authors: Ethan Rudd, Manuel Günther, Terrance Boult

    Abstract: Attribute recognition, particularly facial, extracts many labels for each image. While some multi-task vision problems can be decomposed into separate tasks and stages, e.g., training independent models for each task, for a growing set of problems joint optimization across all tasks has been shown to improve performance. We show that for deep convolutional neural network (DCNN) facial attribute ex… ▽ More

    Submitted 21 October, 2016; v1 submitted 22 March, 2016; originally announced March 2016.

    Comments: Post-print of manuscript accepted to the European Conference on Computer Vision (ECCV) 2016 http://link.springer.com/chapter/10.1007%2F978-3-319-46454-1_2

  41. arXiv:1603.06028  [pdf, other

    cs.CR cs.CV

    A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

    Authors: Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild fo… ▽ More

    Submitted 2 December, 2016; v1 submitted 18 March, 2016; originally announced March 2016.

    Comments: Pre-Print of a manuscript Accepted to IEEE Communications Surveys and Tutorials (COMST) on December 1, 2016

  42. arXiv:1511.06233  [pdf, other

    cs.CV cs.LG

    Towards Open Set Deep Networks

    Authors: Abhijit Bendale, Terrance Boult

    Abstract: Deep networks have produced significant gains for various visual recognition problems, leading to high impact academic and commercial applications. Recent work in deep networks highlighted that it is easy to generate images that humans would never classify as a particular object class, yet networks classify such images high confidence as that given class - deep network are easily fooled with image… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

  43. The Extreme Value Machine

    Authors: Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult

    Abstract: It is often desirable to be able to recognize when inputs to a recognition function learned in a supervised manner correspond to classes unseen at training time. With this ability, new class labels could be assigned to these inputs by a human operator, allowing them to be incorporated into the recognition function --- ideally under an efficient incremental update mechanism. While good algorithms t… ▽ More

    Submitted 20 May, 2017; v1 submitted 19 June, 2015; originally announced June 2015.

    Comments: Pre-print of a manuscript accepted to the IEEE Transactions on Pattern Analysis and Machine Intelligence (T-PAMI) journal

  44. Towards Open World Recognition

    Authors: Abhijit Bendale, Terrance Boult

    Abstract: With the of advent rich classification models and high computational power visual recognition systems have found many operational applications. Recognition in the real world poses multiple challenges that are not apparent in controlled lab environments. The datasets are dynamic and novel categories must be continuously detected and then added. At prediction time, a trained system has to deal with… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Journal ref: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2015) 1893 - 1902

  45. arXiv:1304.1112  [pdf

    cs.AI

    Pruning Bayesian Networks for Efficient Computation

    Authors: Michelle Baker, Terrance E. Boult

    Abstract: This paper analyzes the circumstances under which Bayesian networks can be pruned in order to reduce computational complexity without altering the computation for variables of interest. Given a problem instance which consists of a query and evidence for a set of nodes in the network, it is possible to delete portions of the network which do not participate in the computation for the query. Savin… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)

    Report number: UAI-P-1990-PG-257-264

  46. arXiv:1302.4673  [pdf, other

    cs.CV

    Good Recognition is Non-Metric

    Authors: Walter J. Scheirer, Michael J. Wilber, Michael Eckmann, Terrance E. Boult

    Abstract: Recognition is the fundamental task of visual cognition, yet how to formalize the general recognition problem for computer vision remains an open issue. The problem is sometimes reduced to the simplest case of recognizing matching pairs, often structured to allow for metric constraints. However, visual recognition is broader than just pair matching -- especially when we consider multi-class traini… ▽ More

    Submitted 19 February, 2013; originally announced February 2013.

    Comments: 9 pages, 5 figures

  47. Secure voice based authentication for mobile devices: Vaulted Voice Verification

    Authors: R. C. Johnson, Walter J. Scheirer, Terrance E. Boult

    Abstract: As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phon… ▽ More

    Submitted 30 November, 2012; originally announced December 2012.