Skip to main content

Showing 1–27 of 27 results for author: Oliveira, L S

Searching in archive cs. Search in all archives.
.
  1. Vehicle Occurrence-based Parking Space Detection

    Authors: Paulo R. Lisboa de Almeida, Jeovane Honório Alves, Luiz S. Oliveira, Andre Gustavo Hochuli, João V. Fröhlich, Rodrigo A. Krauel

    Abstract: Smart-parking solutions use sensors, cameras, and data analysis to improve parking efficiency and reduce traffic congestion. Computer vision-based methods have been used extensively in recent years to tackle the problem of parking lot management, but most of the works assume that the parking spots are manually labeled, impacting the cost and feasibility of deployment. To fill this gap, this work p… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: Accepted for presentation at the 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2023)

  2. arXiv:2208.14375  [pdf

    eess.IV cs.CV cs.LG cs.NE

    Automated recognition of the pericardium contour on processed CT images using genetic algorithms

    Authors: E. O. Rodrigues, L. O. Rodrigues, L. S. N. Oliveira, A. Conci, P. Liatsis

    Abstract: This work proposes the use of Genetic Algorithms (GA) in tracing and recognizing the pericardium contour of the human heart using Computed Tomography (CT) images. We assume that each slice of the pericardium can be modelled by an ellipse, the parameters of which need to be optimally determined. An optimal ellipse would be one that closely follows the pericardium contour and, consequently, separate… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Journal ref: Computers in Biology and Medicine, Volume 87, 2017, Pages 38-45, ISSN 0010-4825

  3. Fast & Furious: Modelling Malware Detection as Evolving Data Streams

    Authors: Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio

    Abstract: Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in losses every year. The constant increase of malware infections has been motivating popular antiviruses (AVs) to develop dedicated detection strategies, which include meticulously crafted machine learning (ML) pipelines. However, malware dev… ▽ More

    Submitted 15 August, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

  4. arXiv:2202.08176  [pdf, other

    cs.LG cs.AI

    Bias and unfairness in machine learning models: a systematic literature review

    Authors: Tiago Palma Pagano, Rafael Bessa Loureiro, Fernanda Vitória Nascimento Lisboa, Gustavo Oliveira Ramos Cruz, Rodrigo Matos Peixoto, Guilherme Aragão de Sousa Guimarães, Lucas Lisboa dos Santos, Maira Matos Araujo, Marco Cruz, Ewerton Lopes Silva de Oliveira, Ingrid Winkler, Erick Giovani Sperandio Nascimento

    Abstract: One of the difficulties of artificial intelligence is to ensure that model decisions are fair and free of bias. In research, datasets, metrics, techniques, and tools are applied to detect and mitigate algorithmic unfairness and bias. This study aims to examine existing knowledge on bias and unfairness in Machine Learning models, identifying mitigation methods, fairness metrics, and supporting tool… ▽ More

    Submitted 3 November, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

  5. arXiv:2011.01908  [pdf, other

    cs.LG cs.CV

    Classifier Pool Generation based on a Two-level Diversity Approach

    Authors: Marcos Monteiro, Alceu S. Britto Jr, Jean P. Barddal, Luiz S. Oliveira, Robert Sabourin

    Abstract: This paper describes a classifier pool generation method guided by the diversity estimated on the data complexity and classifier decisions. First, the behavior of complexity measures is assessed by considering several subsamples of the dataset. The complexity measures with high variability across the subsamples are selected for posterior pool adaptation, where an evolutionary algorithm optimizes d… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  6. arXiv:2010.16045  [pdf, other

    cs.CR cs.LG

    Machine Learning (In) Security: A Stream of Problems

    Authors: Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio

    Abstract: Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges faced in security may not appear in other areas. One of these challenges is the concept drift, which increases the existing arms race between attackers… ▽ More

    Submitted 4 September, 2023; v1 submitted 29 October, 2020; originally announced October 2020.

    Journal ref: Digital Threats 2023

  7. arXiv:2010.15904  [pdf, other

    cs.CV

    A Comprehensive Comparison of End-to-End Approaches for Handwritten Digit String Recognition

    Authors: Andre G. Hochuli, Alceu S. Britto Jr, David A. Saji, Jose M. Saavedra, Robert Sabourin, Luiz S. Oliveira

    Abstract: Over the last decades, most approaches proposed for handwritten digit string recognition (HDSR) have resorted to digit segmentation, which is dominated by heuristics, thereby imposing substantial constraints on the final performance. Few of them have been based on segmentation-free strategies where each pixel column has a potential cut location. Recently, segmentation-free strategies has added ano… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Journal ref: Expert System with Applications (2020)

  8. Legal Document Classification: An Application to Law Area Prediction of Petitions to Public Prosecution Service

    Authors: Mariana Y. Noguti, Eduardo Vellasques, Luiz S. Oliveira

    Abstract: In recent years, there has been an increased interest in the application of Natural Language Processing (NLP) to legal documents. The use of convolutional and recurrent neural networks along with word embedding techniques have presented promising results when applied to textual classification problems, such as sentiment analysis and topic segmentation of documents. This paper proposes the use of N… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  9. arXiv:2010.06663  [pdf, other

    cs.CV cs.LG

    Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation

    Authors: Teruo M. Maruyama, Luiz S. Oliveira, Alceu S. Britto Jr, Robert Sabourin

    Abstract: Usually, in a real-world scenario, few signature samples are available to train an automatic signature verification system (ASVS). However, such systems do indeed need a lot of signatures to achieve an acceptable performance. Neuromotor signature duplication methods and feature space augmentation methods may be used to meet the need for an increase in the number of samples. Such techniques manuall… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: 16 pages, 11 figures, To appear in the IEEE Transactions on Information Forensics & Security

  10. arXiv:2009.09780  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Impact of lung segmentation on the diagnosis and explanation of COVID-19 in chest X-ray images

    Authors: Lucas O. Teixeira, Rodolfo M. Pereira, Diego Bertolini, Luiz S. Oliveira, Loris Nanni, George D. C. Cavalcanti, Yandre M. G. Costa

    Abstract: COVID-19 frequently provokes pneumonia, which can be diagnosed using imaging exams. Chest X-ray (CXR) is often useful because it is cheap, fast, widespread, and uses less radiation. Here, we demonstrate the impact of lung segmentation in COVID-19 identification using CXR images and evaluate which contents of the image influenced the most. Semantic segmentation was performed using a U-Net CNN archi… ▽ More

    Submitted 13 September, 2021; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: Submitted to Sensors

  11. arXiv:2005.08424  [pdf

    cs.CV

    Single-sample writers -- "Document Filter" and their impacts on writer identification

    Authors: Fabio Pinhelli, Alceu S. Britto Jr, Luiz S. Oliveira, Yandre M. G. Costa, Diego Bertolini

    Abstract: The writing can be used as an important biometric modality which allows to unequivocally identify an individual. It happens because the writing of two different persons present differences that can be explored both in terms of graphometric properties or even by addressing the manuscript as a digital image, taking into account the use of image processing techniques that can properly capture differe… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

  12. arXiv:2001.10581  [pdf, other

    cs.SI cs.AI cs.CY

    Facebook Ads Monitor: An Independent Auditing System for Political Ads on Facebook

    Authors: Márcio Silva, Lucas Santos de Oliveira, Athanasios Andreou, Pedro Olmo Vaz de Melo, Oana Goga, Fabrício Benevenuto

    Abstract: The 2016 United States presidential election was marked by the abuse of targeted advertising on Facebook. Concerned with the risk of the same kind of abuse to happen in the 2018 Brazilian elections, we designed and deployed an independent auditing system to monitor political ads on Facebook in Brazil. To do that we first adapted a browser plugin to gather ads from the timeline of volunteers using… ▽ More

    Submitted 31 January, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  13. Ocular Recognition Databases and Competitions: A Survey

    Authors: Luiz A. Zanlorensi, Rayson Laroca, Eduardo Luz, Alceu S. Britto Jr., Luiz S. Oliveira, David Menotti

    Abstract: The use of the iris and periocular region as biometric traits has been extensively investigated, mainly due to the singularity of the iris features and the use of the periocular region when the image resolution is not sufficient to extract iris information. In addition to providing information about an individual's identity, features extracted from these traits can also be explored to obtain other… ▽ More

    Submitted 4 February, 2022; v1 submitted 21 November, 2019; originally announced November 2019.

    Comments: Artificial Intelligence Review, vol. 55, pp. 129-180, 2022

  14. arXiv:1910.08060  [pdf, other

    cs.CV

    Meta-learning for fast classifier adaptation to new users of Signature Verification systems

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: Offline Handwritten Signature verification presents a challenging Pattern Recognition problem, where only knowledge of the positive class is available for training. While classifiers have access to a few genuine signatures for training, during generalization they also need to discriminate forgeries. This is particularly challenging for skilled forgeries, where a forger practices imitating the user… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

    Comments: Accepted for the IEEE Transactions on Information Forensics and Security

  15. arXiv:1906.09513  [pdf

    cs.CV

    Image Retrieval and Pattern Spotting using Siamese Neural Network

    Authors: Kelly L. Wiggers, Alceu S. Britto Jr., Laurent Heutte, Alessandro L. Koerich, Luiz S. Oliveira

    Abstract: This paper presents a novel approach for image retrieval and pattern spotting in document image collections. The manual feature engineering is avoided by learning a similarity-based representation using a Siamese Neural Network trained on a previously prepared subset of image pairs from the ImageNet dataset. The learned representation is used to provide the similarity-based feature maps used to fi… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.

    Comments: Accepted for IJCNN 2019

  16. arXiv:1904.04645  [pdf, other

    cs.LG stat.ML

    Evaluating Competence Measures for Dynamic Regressor Selection

    Authors: Thiago J. M. Moura, George D. C. Cavalcanti, Luiz S. Oliveira

    Abstract: Dynamic regressor selection (DRS) systems work by selecting the most competent regressors from an ensemble to estimate the target value of a given test pattern. This competence is usually quantified using the performance of the regressors in local regions of the feature space around the test pattern. However, choosing the best measure to calculate the level of competence correctly is not straightf… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

  17. Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: The phenomenon of Adversarial Examples is attracting increasing interest from the Machine Learning community, due to its significant impact to the security of Machine Learning systems. Adversarial examples are similar (from a perceptual notion of similarity) to samples from the data distribution, that "fool" a machine learning classifier. For computer vision applications, these are images with car… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: Accepted for the IEEE Transactions on Information Forensics and Security

  18. arXiv:1811.09600  [pdf, other

    cs.CV cs.CR cs.LG

    Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses

    Authors: Jérôme Rony, Luiz G. Hafemann, Luiz S. Oliveira, Ismail Ben Ayed, Robert Sabourin, Eric Granger

    Abstract: Research on adversarial examples in computer vision tasks has shown that small, often imperceptible changes to an image can induce misclassification, which has security implications for a wide range of image processing systems. Considering $L_2$ norm distortions, the Carlini and Wagner attack is presently the most effective white-box attack in the literature. However, this method is slow since it… ▽ More

    Submitted 3 April, 2019; v1 submitted 23 November, 2018; originally announced November 2018.

    Comments: Accepted as a conference paper to the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR oral presentation)

  19. The Impact of Preprocessing on Deep Representations for Iris Recognition on Unconstrained Environments

    Authors: Luiz A. Zanlorensi, Eduardo Luz, Rayson Laroca, Alceu S. Britto Jr., Luiz S. Oliveira, David Menotti

    Abstract: The use of iris as a biometric trait is widely used because of its high level of distinction and uniqueness. Nowadays, one of the major research challenges relies on the recognition of iris images obtained in visible spectrum under unconstrained environments. In this scenario, the acquired iris are affected by capture distance, rotation, blur, motion blur, low contrast and specular reflection, cre… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: Accepted for presentation at the Conference on Graphics, Patterns and Images (SIBGRAPI) 2018

  20. arXiv:1805.01589  [pdf, other

    cs.SI cs.CL

    When Politicians Talk About Politics: Identifying Political Tweets of Brazilian Congressmen

    Authors: Lucas S. Oliveira, Pedro O. S. Vaz de Melo, Marcelo S. Amaral, José Antônio. G. Pinho

    Abstract: Since June 2013, when Brazil faced the largest and most significant mass protests in a generation, a political crisis is in course. In midst of this crisis, Brazilian politicians use social media to communicate with the electorate in order to retain or to grow their political capital. The problem is that many controversial topics are in course and deputies may prefer to avoid such themes in their… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

    Comments: 4 pages, 7 figures, 2 tables

    Journal ref: 2018, THE 12TH INTERNATIONAL AAAI CONFERENCE ON WEB AND SOCIAL MEDIA (ICWSM-18)

  21. Fixed-sized representation learning from Offline Handwritten Signatures of different sizes

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: Methods for learning feature representations for Offline Handwritten Signature Verification have been successfully proposed in recent literature, using Deep Convolutional Neural Networks to learn representations from signature pixels. Such methods reported large performance improvements compared to handcrafted feature extractors. However, they also introduced an important constraint: the inputs to… ▽ More

    Submitted 24 April, 2018; v1 submitted 2 April, 2018; originally announced April 2018.

    Comments: This is a pre-print of an article published in the International Journal on Document Analysis and Recognition

  22. A Robust Real-Time Automatic License Plate Recognition Based on the YOLO Detector

    Authors: Rayson Laroca, Evair Severo, Luiz A. Zanlorensi, Luiz S. Oliveira, Gabriel Resende Gonçalves, William Robson Schwartz, David Menotti

    Abstract: Automatic License Plate Recognition (ALPR) has been a frequent topic of research due to many practical applications. However, many of the current solutions are still not robust in real-world situations, commonly depending on many constraints. This paper presents a robust and efficient ALPR system based on the state-of-the-art YOLO object detector. The Convolutional Neural Networks (CNNs) are train… ▽ More

    Submitted 28 April, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: Accepted for presentation at the International Joint Conference on Neural Networks (IJCNN) 2018

  23. arXiv:1709.04056  [pdf, other

    cs.CV

    Multi-scale Forest Species Recognition Systems for Reduced Cost

    Authors: Paulo R. Cavalin, Marcelo N. Kapp, Luiz S. Oliveira

    Abstract: This work focuses on cost reduction methods for forest species recognition systems. Current state-of-the-art shows that the accuracy of these systems have increased considerably in the past years, but the cost in time to perform the recognition of input samples has also increased proportionally. For this reason, in this work we focus on investigating methods for cost reduction locally (at either f… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

  24. Learning Features for Offline Handwritten Signature Verification using Deep Convolutional Neural Networks

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: Verifying the identity of a person using handwritten signatures is challenging in the presence of skilled forgeries, where a forger has access to a person's signature and deliberately attempt to imitate it. In offline (static) signature verification, the dynamic information of the signature writing process is lost, and it is difficult to design good feature extractors that can distinguish genuine… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

  25. Analyzing features learned for Offline Signature Verification using Deep CNNs

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: Research on Offline Handwritten Signature Verification explored a large variety of handcrafted feature extractors, ranging from graphology, texture descriptors to interest points. In spite of advancements in the last decades, performance of such systems is still far from optimal when we test the systems against skilled forgeries - signature forgeries that target a particular individual. In previou… ▽ More

    Submitted 26 August, 2016; v1 submitted 15 July, 2016; originally announced July 2016.

    Comments: Accepted as a conference paper to ICPR 2016

  26. Writer-independent Feature Learning for Offline Signature Verification using Deep Convolutional Neural Networks

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: Automatic Offline Handwritten Signature Verification has been researched over the last few decades from several perspectives, using insights from graphology, computer vision, signal processing, among others. In spite of the advancements on the field, building classifiers that can separate between genuine signatures and skilled forgeries (forgeries made targeting a particular signature) is still ha… ▽ More

    Submitted 4 April, 2016; originally announced April 2016.

    Comments: Accepted as a conference paper to The International Joint Conference on Neural Networks (IJCNN) 2016

  27. Offline Handwritten Signature Verification - Literature Review

    Authors: Luiz G. Hafemann, Robert Sabourin, Luiz S. Oliveira

    Abstract: The area of Handwritten Signature Verification has been broadly researched in the last decades, but remains an open research problem. The objective of signature verification systems is to discriminate if a given signature is genuine (produced by the claimed individual), or a forgery (produced by an impostor). This has demonstrated to be a challenging task, in particular in the offline (static) sce… ▽ More

    Submitted 16 October, 2017; v1 submitted 28 July, 2015; originally announced July 2015.

    Comments: Accepted to the International Conference on Image Processing Theory, Tools and Applications (IPTA 2017)

    ACM Class: I.5.4