Skip to main content

Showing 1–29 of 29 results for author: Deb, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.02083  [pdf, other

    cs.CV eess.IV

    Improving Power Plant CO2 Emission Estimation with Deep Learning and Satellite/Simulated Data

    Authors: Dibyabha Deb, Kamal Das

    Abstract: CO2 emissions from power plants, as significant super emitters, contribute substantially to global warming. Accurate quantification of these emissions is crucial for effective climate mitigation strategies. While satellite-based plume inversion offers a promising approach, challenges arise from data limitations and the complexity of atmospheric conditions. This study addresses these challenges by… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  2. arXiv:2501.14338  [pdf, other

    cs.CV eess.IV

    Correlation-Based Band Selection for Hyperspectral Image Classification

    Authors: Dibyabha Deb, Ujjwal Verma

    Abstract: Hyperspectral images offer extensive spectral information about ground objects across multiple spectral bands. However, the large volume of data can pose challenges during processing. Typically, adjacent bands in hyperspectral data are highly correlated, leading to the use of only a few selected bands for various applications. In this work, we present a correlation-based band selection approach fo… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

    Comments: 5 pages, 1 figure

  3. arXiv:2311.10476  [pdf, other

    cs.CV

    FRCSyn Challenge at WACV 2024:Face Recognition Challenge in the Era of Synthetic Data

    Authors: Pietro Melzi, Ruben Tolosana, Ruben Vera-Rodriguez, Minchul Kim, Christian Rathgeb, Xiaoming Liu, Ivan DeAndres-Tame, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia, Weisong Zhao, Xiangyu Zhu, Zheyu Yan, Xiao-Yu Zhang, Jinlin Wu, Zhen Lei, Suvidha Tripathi, Mahak Kothari, Md Haider Zama, Debayan Deb, Bernardo Biesseck, Pedro Vidal, Roger Granada, Guilherme Fickel, Gustavo Führ , et al. (22 additional authors not shown)

    Abstract: Despite the widespread adoption of face recognition technology around the world, and its remarkable performance on current benchmarks, there are still several challenges that must be covered in more detail. This paper offers an overview of the Face Recognition Challenge in the Era of Synthetic Data (FRCSyn) organized at WACV 2024. This is the first international challenge aiming to explore the use… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 10 pages, 1 figure, WACV 2024 Workshops

  4. arXiv:2310.02753  [pdf, other

    cs.CV cs.AI cs.GR cs.LG

    MUNCH: Modelling Unique 'N Controllable Heads

    Authors: Debayan Deb, Suvidha Tripathi, Pranit Puri

    Abstract: The automated generation of 3D human heads has been an intriguing and challenging task for computer vision researchers. Prevailing methods synthesize realistic avatars but with limited control over the diversity and quality of rendered outputs and suffer from limited correlation between shape and texture of the character. We propose a method that offers quality, diversity, control, and realism alo… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  5. arXiv:2301.03966  [pdf, other

    cs.CV

    AdvBiom: Adversarial Attacks on Biometric Matchers

    Authors: Debayan Deb, Vishesh Mistry, Rahul Parthe

    Abstract: With the advent of deep learning models, face recognition systems have achieved impressive recognition rates. The workhorses behind this success are Convolutional Neural Networks (CNNs) and the availability of large training datasets. However, we show that small human-imperceptible changes to face samples can evade most prevailing face recognition systems. Even more alarming is the fact that the s… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:1908.05008

  6. arXiv:2108.09713  [pdf, other

    cs.CV

    Robustness-via-Synthesis: Robust Training with Generative Adversarial Perturbations

    Authors: Inci M. Baytas, Debayan Deb

    Abstract: Upon the discovery of adversarial attacks, robust models have become obligatory for deep learning-based systems. Adversarial training with first-order attacks has been one of the most effective defenses against adversarial perturbations to this day. The majority of the adversarial training approaches focus on iteratively perturbing each pixel with the gradient of the loss function with respect to… ▽ More

    Submitted 22 August, 2021; originally announced August 2021.

  7. arXiv:2105.06625  [pdf, other

    cs.CV

    Biometrics: Trust, but Verify

    Authors: Anil K. Jain, Debayan Deb, Joshua J. Engelsma

    Abstract: Over the past two decades, biometric recognition has exploded into a plethora of different applications around the globe. This proliferation can be attributed to the high levels of authentication accuracy and user convenience that biometric recognition systems afford end-users. However, in-spite of the success of biometric recognition systems, there are a number of outstanding problems and concern… ▽ More

    Submitted 31 May, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: 20 pages, 15 figures

  8. arXiv:2104.10611  [pdf, other

    eess.IV cs.CV cs.LG

    FourierNets enable the design of highly non-local optical encoders for computational imaging

    Authors: Diptodip Deb, Zhenfei Jiao, Ruth Sims, Alex B. Chen, Michael Broxton, Misha B. Ahrens, Kaspar Podgorski, Srinivas C. Turaga

    Abstract: Differentiable simulations of optical systems can be combined with deep learning-based reconstruction networks to enable high performance computational imaging via end-to-end (E2E) optimization of both the optical encoder and the deep decoder. This has enabled imaging applications such as 3D localization microscopy, depth estimation, and lensless photography via the optimization of local optical e… ▽ More

    Submitted 2 November, 2022; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: Accepted to NeurIPS 2022

  9. arXiv:2104.02156  [pdf, other

    cs.CV

    Unified Detection of Digital and Physical Face Attacks

    Authors: Debayan Deb, Xiaoming Liu, Anil K. Jain

    Abstract: State-of-the-art defense mechanisms against face attacks achieve near perfect accuracies within one of three attack categories, namely adversarial, digital manipulation, or physical spoofs, however, they fail to generalize well when tested across all three categories. Poor generalization can be attributed to learning incoherent attacks jointly. To overcome this shortcoming, we propose a unified at… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  10. arXiv:2011.14220  [pdf, other

    eess.SP cs.LG

    Machine Intelligent Techniques for Ramp Event Prediction in Offshore and Onshore Wind Farms

    Authors: Harsh S. Dhiman, Dipankar Deb

    Abstract: Globally, wind energy has lessened the burden on conventional fossil fuel based power generation. Wind resource assessment for onshore and offshore wind farms aids in accurate forecasting and analyzing nature of ramp events. From an industrial point of view, a large ramp event in a short time duration is likely to cause damage to the wind farm connected to the utility grid. In this manuscript, ram… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: 9 Pages

  11. arXiv:2011.14218  [pdf, other

    cs.CV

    FaceGuard: A Self-Supervised Defense Against Adversarial Face Images

    Authors: Debayan Deb, Xiaoming Liu, Anil K. Jain

    Abstract: Prevailing defense mechanisms against adversarial face images tend to overfit to the adversarial perturbations in the training set and fail to generalize to unseen adversarial attacks. We propose a new self-supervised adversarial defense framework, namely FaceGuard, that can automatically detect, localize, and purify a wide variety of adversarial faces without utilizing pre-computed adversarial tr… ▽ More

    Submitted 5 April, 2021; v1 submitted 28 November, 2020; originally announced November 2020.

  12. arXiv:2010.03624  [pdf, other

    cs.CV

    Infant-ID: Fingerprints for Global Good

    Authors: Joshua J. Engelsma, Debayan Deb, Kai Cao, Anjoo Bhatnagar, Prem S. Sudhish, Anil K. Jain

    Abstract: In many of the least developed and developing countries, a multitude of infants continue to suffer and die from vaccine-preventable diseases and malnutrition. Lamentably, the lack of official identification documentation makes it exceedingly difficult to track which infants have been vaccinated and which infants have received nutritional supplements. Answering these questions could prevent this in… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 16 pages, 16 figures

  13. arXiv:2006.02834  [pdf, other

    cs.CV

    Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach

    Authors: Debayan Deb, Anil K. Jain

    Abstract: State-of-the-art spoof detection methods tend to overfit to the spoof types seen during training and fail to generalize to unknown spoof types. Given that face anti-spoofing is inherently a local task, we propose a face anti-spoofing framework, namely Self-Supervised Regional Fully Convolutional Network (SSR-FCN), that is trained to learn local discriminative cues from a face image in a self-super… ▽ More

    Submitted 15 June, 2020; v1 submitted 4 June, 2020; originally announced June 2020.

  14. arXiv:2003.08788  [pdf, other

    cs.CV

    Child Face Age-Progression via Deep Feature Aging

    Authors: Debayan Deb, Divyansh Aggarwal, Anil K. Jain

    Abstract: Given a gallery of face images of missing children, state-of-the-art face recognition systems fall short in identifying a child (probe) recovered at a later age. We propose a feature aging module that can age-progress deep face features output by a face matcher. In addition, the feature aging module guides age-progression in the image space such that synthesized aged faces can be utilized to enhan… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1911.07538

  15. arXiv:1911.07538  [pdf, other

    cs.CV

    Finding Missing Children: Aging Deep Face Features

    Authors: Debayan Deb, Divyansh Aggarwal, Anil K. Jain

    Abstract: Given a gallery of face images of missing children, state-of-the-art face recognition systems fall short in identifying a child (probe) recovered at a later age. We propose an age-progression module that can age-progress deep face features output by any commodity face matcher. For time lapses larger than 10 years (the missing child is found after 10 or more years), the proposed age-progression mod… ▽ More

    Submitted 18 November, 2019; v1 submitted 18 November, 2019; originally announced November 2019.

  16. arXiv:1909.08072  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

    Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain

    Abstract: Deep neural networks (DNN) have achieved unprecedented success in numerous machine learning tasks in various domains. However, the existence of adversarial examples has raised concerns about applying deep learning to safety-critical applications. As a result, we have witnessed increasing interests in studying attack and defense mechanisms for DNN models on different data types, such as images, gra… ▽ More

    Submitted 9 October, 2019; v1 submitted 17 September, 2019; originally announced September 2019.

    Comments: survey, adversarial attacks, defenses

  17. arXiv:1908.05008  [pdf, other

    cs.CV

    AdvFaces: Adversarial Face Synthesis

    Authors: Debayan Deb, Jianbang Zhang, Anil K. Jain

    Abstract: Face recognition systems have been shown to be vulnerable to adversarial examples resulting from adding small perturbations to probe images. Such adversarial images can lead state-of-the-art face recognition systems to falsely reject a genuine subject (obfuscation attack) or falsely match to an impostor (impersonation attack). Current approaches to crafting adversarial face images lack perceptual… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  18. arXiv:1904.01091  [pdf, other

    cs.CV

    Infant-Prints: Fingerprints for Reducing Infant Mortality

    Authors: Joshua J. Engelsma, Debayan Deb, Anil K. Jain, Prem S. Sudhish, Anjoo Bhatnager

    Abstract: In developing countries around the world, a multitude of infants continue to suffer and die from vaccine-preventable diseases, and malnutrition. Lamentably, the lack of any official identification documentation makes it exceedingly difficult to prevent these infant deaths. To solve this global crisis, we propose Infant-Prints which is comprised of (i) a custom, compact, low-cost (85 USD), high-res… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  19. arXiv:1901.05107  [pdf, other

    cs.CV eess.IV

    Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features

    Authors: Debayan Deb, Arun Ross, Anil K. Jain, Kwaku Prakah-Asante, K. Venkatesh Prasad

    Abstract: Prevailing user authentication schemes on smartphones rely on explicit user interaction, where a user types in a passcode or presents a biometric cue such as face, fingerprint, or iris. In addition to being cumbersome and obtrusive to the users, such authentication mechanisms pose security and privacy concerns. Passive authentication systems can tackle these challenges by frequently and unobtrusiv… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

  20. arXiv:1811.10100  [pdf, other

    cs.CV

    WarpGAN: Automatic Caricature Generation

    Authors: Yichun Shi, Debayan Deb, Anil K. Jain

    Abstract: We propose, WarpGAN, a fully automatic network that can generate caricatures given an input face photo. Besides transferring rich texture styles, WarpGAN learns to automatically predict a set of control points that can warp the photo into a caricature, while preserving identity. We introduce an identity-preserving adversarial loss that aids the discriminator to distinguish between different subjec… ▽ More

    Submitted 16 April, 2019; v1 submitted 25 November, 2018; originally announced November 2018.

  21. arXiv:1805.00911  [pdf, other

    cs.CV

    Altered Fingerprints: Detection and Localization

    Authors: Elham Tabassi, Tarang Chugh, Debayan Deb, Anil K. Jain

    Abstract: Fingerprint alteration, also referred to as obfuscation presentation attack, is to intentionally tamper or damage the real friction ridge patterns to avoid identification by an AFIS. This paper proposes a method for detection and localization of fingerprint alterations. Our main contributions are: (i) design and train CNN models on fingerprint images and minutiae-centered local patches in the imag… ▽ More

    Submitted 18 September, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

  22. arXiv:1804.08790  [pdf, other

    cs.CV

    Face Recognition: Primates in the Wild

    Authors: Debayan Deb, Susan Wiper, Alexandra Russo, Sixue Gong, Yichun Shi, Cori Tymoszek, Anil Jain

    Abstract: We present a new method of primate face recognition, and evaluate this method on several endangered primates, including golden monkeys, lemurs, and chimpanzees. The three datasets contain a total of 11,637 images of 280 individual primates from 14 species. Primate face recognition performance is evaluated using two existing state-of-the-art open-source systems, (i) FaceNet and (ii) SphereFace, (ii… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

    Comments: 8 pages, 12 figures

  23. arXiv:1804.08122  [pdf, other

    cs.CV

    Matching Fingerphotos to Slap Fingerprint Images

    Authors: Debayan Deb, Tarang Chugh, Joshua Engelsma, Kai Cao, Neeta Nain, Jake Kendall, Anil K. Jain

    Abstract: We address the problem of comparing fingerphotos, fingerprint images from a commodity smartphone camera, with the corresponding legacy slap contact-based fingerprint images. Development of robust versions of these technologies would enable the use of the billions of standard Android phones as biometric readers through a simple software download, dramatically lowering the cost and complexity of dep… ▽ More

    Submitted 22 April, 2018; originally announced April 2018.

    Comments: 9 pages, 16 figures, 5 tables, conference

  24. arXiv:1804.07821  [pdf, other

    cs.CV

    An Aggregated Multicolumn Dilated Convolution Network for Perspective-Free Counting

    Authors: Diptodip Deb, Jonathan Ventura

    Abstract: We propose the use of dilated filters to construct an aggregation module in a multicolumn convolutional neural network for perspective-free counting. Counting is a common problem in computer vision (e.g. traffic on the street or pedestrians in a crowd). Modern approaches to the counting problem involve the production of a density map via regression whose integral is equal to the number of objects… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

    Comments: CVPR 2018 Workshop On Visual Understanding of Humans in Crowd Scene

  25. arXiv:1711.03990  [pdf, other

    cs.CV

    Longitudinal Study of Child Face Recognition

    Authors: Debayan Deb, Neeta Nain, Anil K. Jain

    Abstract: We present a longitudinal study of face recognition performance on Children Longitudinal Face (CLF) dataset containing 3,682 face images of 919 subjects, in the age group [2, 18] years. Each subject has at least four face images acquired over a time span of up to six years. Face comparison scores are obtained from (i) a state-of-the-art COTS matcher (COTS-A), (ii) an open-source matcher (FaceNet),… ▽ More

    Submitted 10 November, 2017; originally announced November 2017.

  26. arXiv:1411.3111  [pdf, other

    cs.RO

    Prefrontal Cortex Motivated Cognitive Architecture for Multiple Robots

    Authors: Amit Kumar Mishra, Abhishek Kumar, Dipankar Deb

    Abstract: In this paper, we introduce a cerebral cortex inspired architecture for robots in which we have mapped hierarchical cortical representation of human brain to logic flow and decision making process. Our work focuses on the two major features of human cognitive process, viz. the perception action cycle and its hierarchical organization, and the decision making process. To prove the effectiveness of… ▽ More

    Submitted 12 November, 2014; originally announced November 2014.

  27. Self-Healing by Means of Runtime Execution Profiling

    Authors: Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek

    Abstract: A self-healing application brings itself into a stable state after a failure put the software into an unstable state. For such self-healing software application, finding fix for a previously unseen fault is a grand challenge. Asking the user to provide fixes for every fault is bad for productivity, especially when the users are non-savvy in technical aspect of computing. If failure scenarios come… ▽ More

    Submitted 26 March, 2012; originally announced March 2012.

    Comments: Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh

  28. arXiv:1103.5760  [pdf

    cs.DC

    Triangular Dynamic Architecture for Distributed Computing in a LAN Environment

    Authors: M. Shahriar Hossain, Kazi Muhammad Najmul Hasan Khan, M. Muztaba Fuad, Debzani Deb

    Abstract: A computationally intensive large job, granulized to concurrent pieces and operating in a dynamic environment should reduce the total processing time. However, distributing jobs across a networked environment is a tedious and difficult task. Job distribution in a Local Area Network based on Triangular Dynamic Architecture (TDA) is a mechanism that establishes a dynamic environment for job distribu… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: Published

    Journal ref: 6th International Conference on Computer and Information Technology, Dhaka, Bangladesh, 2003, Pages 481-486

  29. arXiv:1103.5743  [pdf

    cs.DC

    Load Balancing in a Networked Environment through Homogenization

    Authors: M. Shahriar Hossain, M. Muztaba Fuad, Debzani Deb, Kazi Muhammad Najmul Hasan Khan, Md. Mahbubul Alam Joarder

    Abstract: Distributed processing across a networked environment suffers from unpredictable behavior of speedup due to heterogeneous nature of the hardware and software in the remote machines. It is challenging to get a better performance from a distributed system by distributing task in an intelligent manner such that the heterogeneous nature of the system do not have any effect on the speedup ratio. This p… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: International Conference on Cybernetics and Information Technologies, Orlando, USA, July 21-25, 2004, Pages 99-104

    Journal ref: International Conference on Cybernetics and Information Technologies, Systems and Applications Orlando, USA, July 21-25, CITSA 2004, Pages: 99-104