
-
Deep Learning in the Era of Edge Computing: Challenges and Opportunities
The era of edge computing has arrived. Although the Internet is the back...
read it
-
Transfer Learning in Deep Reinforcement Learning: A Survey
This paper surveys the field of transfer learning in the problem setting...
read it
-
Aging Deep Face Features: Finding Missing Children
Given a gallery of face images of missing children, state-of-the-art fac...
read it
-
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
DeepRobust is a PyTorch adversarial learning library which aims to build...
read it
-
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
Prevailing defense mechanisms against adversarial face images tend to ov...
read it
-
XGNN: Towards Model-Level Explanations of Graph Neural Networks
Graphs neural networks (GNNs) learn node features by aggregating and com...
read it
-
Finding Missing Children: Aging Deep Face Features
Given a gallery of face images of missing children, state-of-the-art fac...
read it
-
Towards High-fidelity Nonlinear 3D Face Morphable Model
Embedding 3D morphable basis functions into deep neural networks opens g...
read it
-
Does Unsupervised Architecture Representation Learning Help Neural Architecture Search?
Existing Neural Architecture Search (NAS) methods either encode neural a...
read it
-
Using Persistent Homology to Quantify a Diurnal Cycle in Hurricane Felix
The diurnal cycle of tropical cyclones (TCs) is a daily cycle in clouds ...
read it
-
Probabilistic Face Embeddings
Embedding methods have achieved success in face recognition by comparing...
read it
-
Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study
Deep neural networks (DNNs) have achieved significant performance in var...
read it
-
Self-supervised Learning on Graphs: Deep Insights and New Direction
The success of deep learning notoriously requires larger amounts of cost...
read it
-
CLOCs: Camera-LiDAR Object Candidates Fusion for 3D Object Detection
There have been significant advances in neural networks for both 3D obje...
read it
-
Multi-Agent Deep Reinforcement Learning for Large-scale Traffic Signal Control
Reinforcement learning (RL) is a promising data-driven approach for adap...
read it
-
Fingerprints: Fixed Length Representation via Deep Networks and Domain Knowledge
We learn a discriminative fixed length feature representation of fingerp...
read it
-
Learning a Fixed-Length Fingerprint Representation
We present DeepPrint, a deep network, which learns to extract fixed-leng...
read it
-
Recurrent Embedding Aggregation Network for Video Face Recognition
Recurrent networks have been successful in analyzing temporal data and h...
read it
-
FlowSAN: Privacy-enhancing Semi-Adversarial Networks to Confound Arbitrary Face-based Gender Classifiers
Privacy concerns in the modern digital age have prompted researchers to ...
read it
-
Wavelet Scattering Networks for Atomistic Systems with Extrapolation of Material Properties
The dream of machine learning in materials science is for a model to lea...
read it
-
Mitigating Face Recognition Bias via Group Adaptive Classifier
Face recognition is known to exhibit bias - subjects in certain demograp...
read it
-
Fingerprint Spoof Generalization
We present a style-transfer based wrapper, called Universal Material Gen...
read it
-
Fairness Perception from a Network-Centric Perspective
Algorithmic fairness is a major concern in recent years as the influence...
read it
-
Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features
Prevailing user authentication schemes on smartphones rely on explicit u...
read it
-
Can Transfer Entropy Infer Causality in Neuronal Circuits for Cognitive Processing?
Finding the causes to observed effects and establishing causal relations...
read it
-
Gait Recognition via Disentangled Representation Learning
Gait, the walking pattern of individuals, is one of the most important b...
read it
-
Fingerprint Spoof Detection: Temporal Analysis of Image Sequence
We utilize the dynamics involved in the imaging of a fingerprint on a to...
read it
-
Machine learning based non-Newtonian fluid model with molecular fidelity
We introduce a machine-learning-based framework for constructing continu...
read it
-
Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
The vulnerability of automated fingerprint recognition systems to presen...
read it
-
On Learning Disentangled Representations for Gait Recognition
Gait, the walking pattern of individuals, is one of the important biomet...
read it
-
Graph Similarity Using PageRank and Persistent Homology
The PageRank of a graph is a scalar function defined on the node set of ...
read it
-
Tattoo Image Search at Scale: Joint Detection and Compact Representation Learning
The explosive growth of digital images in video surveillance and social ...
read it
-
Deep Tree Learning for Zero-shot Face Anti-Spoofing
Face anti-spoofing is designed to keep face recognition systems from rec...
read it
-
On Transfer Learning For Chatter Detection in Turning Using Wavelet Packet Transform and Empirical Mode Decomposition
The increasing availability of sensor data at machine tools makes automa...
read it
-
Universal Material Translator: Towards Spoof Fingerprint Generalization
Spoof detectors are classifiers that are trained to distinguish spoof fi...
read it
-
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach
State-of-the-art spoof detection methods tend to overfit to the spoof ty...
read it
-
DebFace: De-biasing Face Recognition
We address the problem of bias in automated face recognition algorithms,...
read it
-
Fingerprint Presentation Attack Detection: Generalization and Efficiency
We study the problem of fingerprint presentation attack detection (PAD) ...
read it
-
Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier
Prevailing fingerprint recognition systems are vulnerable to spoof attac...
read it
-
Infant-Prints: Fingerprints for Reducing Infant Mortality
In developing countries around the world, a multitude of infants continu...
read it
-
FAN: Feature Adaptation Network for Surveillance Face Recognition and Normalization
This paper studies face recognition (FR) and normalization in surveillan...
read it
-
A Non-Dominated Sorting Based Customized Random-Key Genetic Algorithm for the Bi-Objective Traveling Thief Problem
In this paper, we propose a method to solve a bi-objective variant of th...
read it
-
Child Face Age-Progression via Deep Feature Aging
Given a gallery of face images of missing children, state-of-the-art fac...
read it
-
White-Box Evaluation of Fingerprint Recognition Systems
Typical evaluations of fingerprint recognition systems consist of end-to...
read it
-
Chatter Detection in Turning Using Machine Learning and Similarity Measures of Time Series via Dynamic Time Warping
Chatter detection from sensor signals has been an active field of resear...
read it
-
The Edge of Depth: Explicit Constraints between Segmentation and Depth
In this work we study the mutual benefits of two common computer vision ...
read it
-
Depth Coefficients for Depth Completion
Depth completion involves estimating a dense depth image from sparse dep...
read it
-
Automated Non-Destructive Inspection of Fused Filament Fabrication Components Using Thermographic Signal Reconstruction
Manufacturers struggle to produce low-cost, robust and complex component...
read it
-
Generalizing Face Representation with Unlabeled Data
In recent years, significant progress has been made in face recognition ...
read it
-
Graph Structure Learning for Robust Graph Neural Networks
Graph Neural Networks (GNNs) are powerful tools in representation learni...
read it