Skip to main content

Showing 1–50 of 76 results for author: George, A

  1. arXiv:2407.08640  [pdf, other

    cs.CV

    Modality Agnostic Heterogeneous Face Recognition with Switch Style Modulators

    Authors: Anjith George, Sebastien Marcel

    Abstract: Heterogeneous Face Recognition (HFR) systems aim to enhance the capability of face recognition in challenging cross-modal authentication scenarios. However, the significant domain gap between the source and target modalities poses a considerable challenge for cross-domain matching. Existing literature primarily focuses on developing HFR approaches for specific pairs of face modalities, necessitati… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 8 pages

  2. arXiv:2406.15639  [pdf, other

    cs.RO

    Low Fidelity Visuo-Tactile Pretraining Improves Vision-Only Manipulation Performance

    Authors: Selam Gano, Abraham George, Amir Barati Farimani

    Abstract: Tactile perception is a critical component of solving real-world manipulation tasks, but tactile sensors for manipulation have barriers to use such as fragility and cost. In this work, we engage a robust, low-cost tactile sensor, BeadSight, as an alternative to precise pre-calibrated sensors for a pretraining approach to manipulation. We show that tactile pretraining, even with a low-fidelity sens… ▽ More

    Submitted 25 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

  3. arXiv:2405.13204  [pdf, other

    cs.RO

    BeadSight: An Inexpensive Tactile Sensor Using Hydro-Gel Beads

    Authors: Abraham George, Yibo Chen, Atharva Dikshit, Peter Pak, Amir Barati Farimani

    Abstract: In robotic manipulation, tactile sensors are indispensable, especially when dealing with soft objects, objects of varying dimensions, or those out of the robot's direct line of sight. Traditional tactile sensors often grapple with challenges related to cost and durability. To address these issues, our study introduces a novel approach to visuo-tactile sensing with an emphasis on economy and replac… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: BeadSight code is available at: https://github.com/Abraham190137/BeadSight 7 pages, 8 figures

  4. arXiv:2404.14343  [pdf, other

    cs.CV

    Heterogeneous Face Recognition Using Domain Invariant Units

    Authors: Anjith George, Sebastien Marcel

    Abstract: Heterogeneous Face Recognition (HFR) aims to expand the applicability of Face Recognition (FR) systems to challenging scenarios, enabling the matching of face images across different domains, such as matching thermal images to visible spectra. However, the development of HFR systems is challenging because of the significant domain gap between modalities and the lack of availability of large-scale… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: 6 pages, Accepted ICASSP 2024

  5. From Modalities to Styles: Rethinking the Domain Gap in Heterogeneous Face Recognition

    Authors: Anjith George, Sebastien Marcel

    Abstract: Heterogeneous Face Recognition (HFR) focuses on matching faces from different domains, for instance, thermal to visible images, making Face Recognition (FR) systems more versatile for challenging scenarios. However, the domain gap between these domains and the limited large-scale datasets in the target HFR modalities make it challenging to develop robust HFR models from scratch. In our work, we vi… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: Accepted for publication in IEEE TBIOM

  6. arXiv:2404.10378  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    Second Edition FRCSyn Challenge at CVPR 2024: Face Recognition Challenge in the Era of Synthetic Data

    Authors: Ivan DeAndres-Tame, Ruben Tolosana, Pietro Melzi, Ruben Vera-Rodriguez, Minchul Kim, Christian Rathgeb, Xiaoming Liu, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia, Zhizhou Zhong, Yuge Huang, Yuxi Mi, Shouhong Ding, Shuigeng Zhou, Shuai He, Lingzhi Fu, Heng Cong, Rongyu Zhang, Zhihong Xiao, Evgeny Smirnov, Anton Pimenov, Aleksei Grigorev, Denis Timoshenko, Kaleb Mesfin Asfaw , et al. (33 additional authors not shown)

    Abstract: Synthetic data is gaining increasing relevance for training machine learning models. This is mainly motivated due to several factors such as the lack of real data and intra-class variability, time and errors produced in manual labeling, and in some cases privacy concerns, among others. This paper presents an overview of the 2nd edition of the Face Recognition Challenge in the Era of Synthetic Data… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2311.10476

    Journal ref: IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRw 2024)

  7. arXiv:2404.04580  [pdf, other

    cs.CV

    SDFR: Synthetic Data for Face Recognition Competition

    Authors: Hatef Otroshi Shahreza, Christophe Ecabert, Anjith George, Alexander Unnervik, Sébastien Marcel, Nicolò Di Domenico, Guido Borghi, Davide Maltoni, Fadi Boutros, Julia Vogel, Naser Damer, Ángela Sánchez-Pérez, EnriqueMas-Candela, Jorge Calvo-Zaragoza, Bernardo Biesseck, Pedro Vidal, Roger Granada, David Menotti, Ivan DeAndres-Tame, Simone Maurizio La Cava, Sara Concas, Pietro Melzi, Ruben Tolosana, Ruben Vera-Rodriguez, Gianpaolo Perelli , et al. (3 additional authors not shown)

    Abstract: Large-scale face recognition datasets are collected by crawling the Internet and without individuals' consent, raising legal, ethical, and privacy concerns. With the recent advances in generative models, recently several works proposed generating synthetic face recognition datasets to mitigate concerns in web-crawled face recognition datasets. This paper presents the summary of the Synthetic Data… ▽ More

    Submitted 9 April, 2024; v1 submitted 6 April, 2024; originally announced April 2024.

    Comments: The 18th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2024)

  8. arXiv:2403.11898  [pdf, other

    cs.RO cs.LG

    Visuo-Tactile Pretraining for Cable Plugging

    Authors: Abraham George, Selam Gano, Pranav Katragadda, Amir Barati Farimani

    Abstract: Tactile information is a critical tool for fine-grain manipulation. As humans, we rely heavily on tactile information to understand objects in our environments and how to interact with them. We use touch not only to perform manipulation tasks but also to learn how to perform these tasks. Therefore, to create robotic agents that can learn to complete manipulation tasks at a human or super-human lev… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 8 pages, 6 figures, submitted to IROS 2024

  9. arXiv:2403.08086  [pdf, other

    cs.CV

    Flow-Based Visual Stream Compression for Event Cameras

    Authors: Daniel C. Stumpp, Himanshu Akolkar, Alan D. George, Ryad Benosman

    Abstract: As the use of neuromorphic, event-based vision sensors expands, the need for compression of their output streams has increased. While their operational principle ensures event streams are spatially sparse, the high temporal resolution of the sensors can result in high data rates from the sensor depending on scene dynamics. For systems operating in communication-bandwidth-constrained and power-cons… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 13 pages, 7 figures, 2 tables

  10. arXiv:2402.18718  [pdf, other

    cs.CV cs.CR

    Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification Tasks

    Authors: Alexander Unnervik, Hatef Otroshi Shahreza, Anjith George, Sébastien Marcel

    Abstract: Backdoor attacks allow an attacker to embed a specific vulnerability in a machine learning algorithm, activated when an attacker-chosen pattern is presented, causing a specific misprediction. The need to identify backdoors in biometric scenarios has led us to propose a novel technique with different trade-offs. In this paper we propose to use model pairs on open-set classification tasks for detect… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: Under review

  11. arXiv:2401.10681  [pdf, other

    cs.NI

    Maximizing Real-Time Video QoE via Bandwidth Sharing under Markovian setting

    Authors: Sushi Anna George, Vinay Joseph

    Abstract: We consider the problem of optimizing Quality of Experience (QoE) of clients streaming real-time video, served by networks managed by different operators that can share bandwidth with each other. The abundance of real-time video traffic is evident in the popularity of applications like video conferencing and video streaming of live events, which have increased significantly since the recent pandem… ▽ More

    Submitted 26 January, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2211.06666

  12. arXiv:2312.11663  [pdf, other

    cs.LG stat.ML

    Eliciting Kemeny Rankings

    Authors: Anne-Marie George, Christos Dimitrakakis

    Abstract: We formulate the problem of eliciting agents' preferences with the goal of finding a Kemeny ranking as a Dueling Bandits problem. Here the bandits' arms correspond to alternatives that need to be ranked and the feedback corresponds to a pairwise comparison between alternatives by a randomly sampled agent. We consider both sampling with and without replacement, i.e., the possibility to ask the same… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: This is a long version of the AAAI'24 publication under the same title

  13. arXiv:2312.10857  [pdf, ps, other

    cs.AI cs.DB

    Minimal Macro-Based Rewritings of Formal Languages: Theory and Applications in Ontology Engineering (and beyond)

    Authors: Christian Kindermann, Anne-Marie George, Bijan Parsia, Uli Sattler

    Abstract: In this paper, we introduce the problem of rewriting finite formal languages using syntactic macros such that the rewriting is minimal in size. We present polynomial-time algorithms to solve variants of this problem and show their correctness. To demonstrate the practical relevance of the proposed problems and the feasibility and effectiveness of our algorithms in practice, we apply these to biome… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

    Comments: Extended paper (including supplementary material) accepted at The 38th Annual AAAI Conference on Artificial Intelligence

  14. arXiv:2311.10476  [pdf, other

    cs.CV

    FRCSyn Challenge at WACV 2024:Face Recognition Challenge in the Era of Synthetic Data

    Authors: Pietro Melzi, Ruben Tolosana, Ruben Vera-Rodriguez, Minchul Kim, Christian Rathgeb, Xiaoming Liu, Ivan DeAndres-Tame, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia, Weisong Zhao, Xiangyu Zhu, Zheyu Yan, Xiao-Yu Zhang, Jinlin Wu, Zhen Lei, Suvidha Tripathi, Mahak Kothari, Md Haider Zama, Debayan Deb, Bernardo Biesseck, Pedro Vidal, Roger Granada, Guilherme Fickel, Gustavo Führ , et al. (22 additional authors not shown)

    Abstract: Despite the widespread adoption of face recognition technology around the world, and its remarkable performance on current benchmarks, there are still several challenges that must be covered in more detail. This paper offers an overview of the Face Recognition Challenge in the Era of Synthetic Data (FRCSyn) organized at WACV 2024. This is the first international challenge aiming to explore the use… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 10 pages, 1 figure, WACV 2024 Workshops

  15. arXiv:2309.10175  [pdf, other

    cs.RO cs.AI cs.LG

    One ACT Play: Single Demonstration Behavior Cloning with Action Chunking Transformers

    Authors: Abraham George, Amir Barati Farimani

    Abstract: Learning from human demonstrations (behavior cloning) is a cornerstone of robot learning. However, most behavior cloning algorithms require a large number of demonstrations to learn a task, especially for general tasks that have a large variety of initial conditions. Humans, however, can learn to complete tasks, even complex ones, after only seeing one or two demonstrations. Our work seeks to emul… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 7 pages, 6 figures

  16. arXiv:2309.08892  [pdf, other

    cs.RO

    Pour me a drink: Robotic Precision Pouring Carbonated Beverages into Transparent Containers

    Authors: Feiya Zhu, Shuo Hu, Letian Leng, Alison Bartsch, Abraham George, Amir Barati Farimani

    Abstract: With the growing emphasis on the development and integration of service robots within household environments, we will need to endow robots with the ability to reliably pour a variety of liquids. However, liquid handling and pouring is a challenging task due to the complex dynamics and varying properties of different liquids, the exacting precision required to prevent spills and ensure accurate pou… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 September, 2023; originally announced September 2023.

    Comments: Supplementary materials will be available soon

  17. arXiv:2308.14852  [pdf, other

    cs.CV

    SynthDistill: Face Recognition with Knowledge Distillation from Synthetic Data

    Authors: Hatef Otroshi Shahreza, Anjith George, Sébastien Marcel

    Abstract: State-of-the-art face recognition networks are often computationally expensive and cannot be used for mobile applications. Training lightweight face recognition models also requires large identity-labeled datasets. Meanwhile, there are privacy and ethical concerns with collecting and using large face recognition datasets. While generating synthetic datasets for training face recognition models is… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted in the IEEE International Joint Conference on Biometrics (IJCB 2023)

  18. arXiv:2308.04168  [pdf, other

    cs.CV

    EFaR 2023: Efficient Face Recognition Competition

    Authors: Jan Niklas Kolf, Fadi Boutros, Jurek Elliesen, Markus Theuerkauf, Naser Damer, Mohamad Alansari, Oussama Abdul Hay, Sara Alansari, Sajid Javed, Naoufel Werghi, Klemen Grm, Vitomir Štruc, Fernando Alonso-Fernandez, Kevin Hernandez Diaz, Josef Bigun, Anjith George, Christophe Ecabert, Hatef Otroshi Shahreza, Ketan Kotwal, Sébastien Marcel, Iurii Medvedev, Bo Jin, Diogo Nunes, Ahmad Hassanpour, Pankaj Khatiwada , et al. (2 additional authors not shown)

    Abstract: This paper presents the summary of the Efficient Face Recognition Competition (EFaR) held at the 2023 International Joint Conference on Biometrics (IJCB 2023). The competition received 17 submissions from 6 different teams. To drive further development of efficient face recognition models, the submitted solutions are ranked based on a weighted score of the achieved verification accuracies on a div… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: Accepted at IJCB 2023

  19. arXiv:2308.02715  [pdf, other

    cs.LG

    Fluid Viscosity Prediction Leveraging Computer Vision and Robot Interaction

    Authors: Jong Hoon Park, Gauri Pramod Dalwankar, Alison Bartsch, Abraham George, Amir Barati Farimani

    Abstract: Accurately determining fluid viscosity is crucial for various industrial and scientific applications. Traditional methods of viscosity measurement, though reliable, often require manual intervention and cannot easily adapt to real-time monitoring. With advancements in machine learning and computer vision, this work explores the feasibility of predicting fluid viscosity by analyzing fluid oscillati… ▽ More

    Submitted 2 December, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: 12 pages, 7 figures

  20. arXiv:2307.13159  [pdf, other

    cs.RO

    RoboChop: Autonomous Framework for Fruit and Vegetable Chopping Leveraging Foundational Models

    Authors: Atharva Dikshit, Alison Bartsch, Abraham George, Amir Barati Farimani

    Abstract: With the goal of developing fully autonomous cooking robots, developing robust systems that can chop a wide variety of objects is important. Existing approaches focus primarily on the low-level dynamics of the cutting action, which overlooks some of the practical real-world challenges of implementing autonomous cutting systems. In this work we propose an autonomous framework to sequence together a… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

  21. arXiv:2307.07032  [pdf, other

    cs.CV

    Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation

    Authors: Anjith George, Sebastien Marcel

    Abstract: Heterogeneous Face Recognition (HFR) aims to match face images across different domains, such as thermal and visible spectra, expanding the applicability of Face Recognition (FR) systems to challenging scenarios. However, the domain gap and limited availability of large-scale datasets in the target domain make training robust and invariant HFR models from scratch difficult. In this work, we treat… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: Accepted for publication in IJCB 2023

  22. arXiv:2307.01838  [pdf, other

    cs.CV cs.CR

    EdgeFace: Efficient Face Recognition Model for Edge Devices

    Authors: Anjith George, Christophe Ecabert, Hatef Otroshi Shahreza, Ketan Kotwal, Sebastien Marcel

    Abstract: In this paper, we present EdgeFace, a lightweight and efficient face recognition network inspired by the hybrid architecture of EdgeNeXt. By effectively combining the strengths of both CNN and Transformer models, and a low rank linear layer, EdgeFace achieves excellent face recognition performance optimized for edge devices. The proposed EdgeFace network not only maintains low computational costs… ▽ More

    Submitted 12 January, 2024; v1 submitted 4 July, 2023; originally announced July 2023.

    Comments: 11 pages, Accepted for publication in IEEE Transactions on Biometrics, Behavior, and Identity Science

  23. Feasible Action-Space Reduction as a Metric of Causal Responsibility in Multi-Agent Spatial Interactions

    Authors: Ashwin George, Luciano Cavalcante Siebert, David Abbink, Arkady Zgonnikov

    Abstract: Modelling causal responsibility in multi-agent spatial interactions is crucial for safety and efficiency of interactions of humans with autonomous agents. However, current formal metrics and models of responsibility either lack grounding in ethical and philosophical concepts of responsibility, or cannot be applied to spatial interactions. In this work we propose a metric of causal responsibility w… ▽ More

    Submitted 13 November, 2023; v1 submitted 24 May, 2023; originally announced May 2023.

  24. arXiv:2305.09765  [pdf, other

    cs.RO cs.HC cs.LG

    OpenVR: Teleoperation for Manipulation

    Authors: Abraham George, Alison Bartsch, Amir Barati Farimani

    Abstract: Across the robotics field, quality demonstrations are an integral part of many control pipelines. However, collecting high-quality demonstration trajectories remains time-consuming and difficult, often resulting in the number of demonstrations being the performance bottleneck. To address this issue, we present a method of Virtual Reality (VR) Teleoperation that uses an Oculus VR headset to teleope… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 8 pages, 8 figures, GitHub: https://github.com/Abraham190137/TeleoperationUnity

  25. arXiv:2212.09980  [pdf, ps, other

    cs.LG cs.CR

    Continual Mean Estimation Under User-Level Privacy

    Authors: Anand Jerry George, Lekshmi Ramesh, Aditya Vikram Singh, Himanshu Tyagi

    Abstract: We consider the problem of continually releasing an estimate of the population mean of a stream of samples that is user-level differentially private (DP). At each time instant, a user contributes a sample, and the users can arrive in arbitrary order. Until now these requirements of continual release and user-level privacy were considered in isolation. But, in practice, both these requirements come… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

  26. Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection

    Authors: M. Ibsen, C. Rathgeb, F. Brechtel, R. Klepp, K. Pöppelmann, A. George, S. Marcel, C. Busch

    Abstract: Face recognition systems are widely deployed for biometric authentication. Despite this, it is well-known that, without any safeguards, face recognition systems are highly vulnerable to presentation attacks. In response to this security issue, several promising methods for detecting presentation attacks have been proposed which show high performance on existing benchmarks. However, an ongoing chal… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  27. arXiv:2211.06666  [pdf, other

    cs.NI

    Optimizing Bandwidth Sharing for Real-time Traffic in Wireless Networks

    Authors: Sushi Anna George, Vinay Joseph

    Abstract: We consider the problem of enhancing the delivery of real-time traffic in wireless networks using bandwidth sharing between operators. A key characteristic of real-time traffic is that a packet has to be delivered within a delay deadline for it to be useful. The abundance of real-time traffic is evident in the popularity of applications like video and audio conferencing, which increased significan… ▽ More

    Submitted 24 November, 2022; v1 submitted 12 November, 2022; originally announced November 2022.

  28. arXiv:2210.06529  [pdf, other

    cs.CV cs.CR

    Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles

    Authors: Anjith George, Amir Mohammadi, Sebastien Marcel

    Abstract: Heterogeneous Face Recognition (HFR) refers to matching face images captured in different domains, such as thermal to visible images (VIS), sketches to visible images, near-infrared to visible, and so on. This is particularly useful in matching visible spectrum images to images captured from other modalities. Though highly useful, HFR is challenging because of the domain gap between the source and… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: 16 pages. Accepted for publication in IEEE TIFS

  29. arXiv:2209.11275  [pdf, other

    cs.LG cs.RO

    Minimizing Human Assistance: Augmenting a Single Demonstration for Deep Reinforcement Learning

    Authors: Abraham George, Alison Bartsch, Amir Barati Farimani

    Abstract: The use of human demonstrations in reinforcement learning has proven to significantly improve agent performance. However, any requirement for a human to manually 'teach' the model is somewhat antithetical to the goals of reinforcement learning. This paper attempts to minimize human involvement in the learning process while retaining the performance advantages by using a single human example collec… ▽ More

    Submitted 18 March, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: 7 pages, 10 figures, ICRA 2023 (accepted)

  30. arXiv:2205.07488  [pdf, other

    cs.IT cs.LG math.ST stat.ML

    Robust Testing in High-Dimensional Sparse Models

    Authors: Anand Jerry George, Clément L. Canonne

    Abstract: We consider the problem of robustly testing the norm of a high-dimensional sparse signal vector under two different observation models. In the first model, we are given $n$ i.i.d. samples from the distribution $\mathcal{N}\left(θ,I_d\right)$ (with unknown $θ$), of which a small fraction has been arbitrarily corrupted. Under the promise that $\|θ\|_0\le s$, we want to correctly distinguish whether… ▽ More

    Submitted 4 November, 2022; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: Fixed typos, added a figure and discussion section

  31. arXiv:2204.14094  [pdf, ps, other

    cs.GT

    Single-Peaked Opinion Updates

    Authors: Robert Bredereck, Anne-Marie George, Jonas Israel, Leon Kellerhals

    Abstract: We consider opinion diffusion for undirected networks with sequential updates when the opinions of the agents are single-peaked preference rankings. Our starting point is the study of preserving single-peakedness. We identify voting rules that, when given a single-peaked profile, output at least one ranking that is single peaked w.r.t. a single-peaked axis of the input. For such voting rules we sh… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    Comments: Accepted at IJCAI 2022

  32. arXiv:2202.10286  [pdf, other

    cs.CV

    A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection

    Authors: Anjith George, David Geissbuhler, Sebastien Marcel

    Abstract: The vulnerability against presentation attacks is a crucial problem undermining the wide-deployment of face recognition systems. Though presentation attack detection (PAD) systems try to address this problem, the lack of generalization and robustness continues to be a major concern. Several works have shown that using multi-channel PAD systems could alleviate this vulnerability and result in more… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 16 pages, 11 images

  33. arXiv:2112.07509  [pdf, ps, other

    cs.GT

    Liquid Democracy with Ranked Delegations

    Authors: Markus Brill, Théo Delemazure, Anne-Marie George, Martin Lackner, Ulrike Schmidt-Kraepelin

    Abstract: Liquid democracy is a novel paradigm for collective decision-making that gives agents the choice between casting a direct vote or delegating their vote to another agent. We consider a generalization of the standard liquid democracy setting by allowing agents to specify multiple potential delegates, together with a preference ranking among them. This generalization increases the number of possible… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: Accepted at AAAI 2022

  34. arXiv:2112.07170  [pdf, other

    cs.NI

    Performance evaluation of the QOS provisioning ability of IEEE 802.11e WLAN standard for multimedia traffic

    Authors: Venkata Sitaram. A, Venkatesh. T. G, Arun George, Manivasakan. R, Bhasker Dappuri

    Abstract: This paper presents an analytical model for the average frame transmission delay and the jitter for the different Access Categories (ACs) of the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) mechanism. Following are the salient features of our model. As defined by the standard we consider (1) the virtual collisions among different ACs inside each EDCA station in addition to external coll… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  35. hARMS: A Hardware Acceleration Architecture for Real-Time Event-Based Optical Flow

    Authors: Daniel C. Stumpp, Himanshu Akolkar, Alan D. George, Ryad B. Benosman

    Abstract: Event-based vision sensors produce asynchronous event streams with high temporal resolution based on changes in the visual scene. The properties of these sensors allow for accurate and fast calculation of optical flow as events are generated. Existing solutions for calculating optical flow from event data either fail to capture the true direction of motion due to the aperture problem, do not use t… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 18 pages, 16 figures, 4 tables

  36. arXiv:2111.04698  [pdf, other

    cs.LG cs.GT

    Interactive Inverse Reinforcement Learning for Cooperative Games

    Authors: Thomas Kleine Buening, Anne-Marie George, Christos Dimitrakakis

    Abstract: We study the problem of designing autonomous agents that can learn to cooperate effectively with a potentially suboptimal partner while having no access to the joint reward function. This problem is modeled as a cooperative episodic two-agent Markov decision process. We assume control over only the first of the two agents in a Stackelberg formulation of the game, where the second agent is acting s… ▽ More

    Submitted 13 June, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: ICML 2022

  37. arXiv:2103.00948  [pdf, other

    cs.CV cs.CR cs.LG

    Cross Modal Focal Loss for RGBD Face Anti-Spoofing

    Authors: Anjith George, Sebastien Marcel

    Abstract: Automatic methods for detecting presentation attacks are essential to ensure the reliable use of facial recognition technology. Most of the methods available in the literature for presentation attack detection (PAD) fails in generalizing to unseen attacks. In recent years, multi-channel methods have been proposed to improve the robustness of PAD systems. Often, only a limited amount of data is ava… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: 10 pages, Accepted for publication in CVPR2021

  38. arXiv:2102.11932  [pdf, other

    cs.AI

    On Meritocracy in Optimal Set Selection

    Authors: Thomas Kleine Buening, Meirav Segal, Debabrota Basu, Christos Dimitrakakis, Anne-Marie George

    Abstract: Typically, merit is defined with respect to some intrinsic measure of worth. We instead consider a setting where an individual's worth is \emph{relative}: when a Decision Maker (DM) selects a set of individuals from a population to maximise expected utility, it is natural to consider the \emph{Expected Marginal Contribution} (EMC) of each person to the utility. We show that this notion satisfies a… ▽ More

    Submitted 9 September, 2022; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: EAAMO 2022

  39. arXiv:2101.06453  [pdf, other

    stat.CO cs.IT stat.ML

    An MCMC Method to Sample from Lattice Distributions

    Authors: Anand Jerry George, Navin Kashyap

    Abstract: We introduce a Markov Chain Monte Carlo (MCMC) algorithm to generate samples from probability distributions supported on a $d$-dimensional lattice $Λ= \mathbf{B}\mathbb{Z}^d$, where $\mathbf{B}$ is a full-rank matrix. Specifically, we consider lattice distributions $P_Λ$ in which the probability at a lattice point is proportional to a given probability density function, $f$, evaluated at that poin… ▽ More

    Submitted 26 January, 2021; v1 submitted 16 January, 2021; originally announced January 2021.

    Comments: 11 pages, 7 figures

  40. arXiv:2011.08019  [pdf, other

    cs.CV

    On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing

    Authors: Anjith George, Sebastien Marcel

    Abstract: The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Although various methods have been suggested for detecting such attacks, most of them over-fit the training set and fail in generalizing to unseen a… ▽ More

    Submitted 2 June, 2021; v1 submitted 16 November, 2020; originally announced November 2020.

    Comments: 8 pages, 3 figures, Accepted for Publication in IJCB2021

  41. arXiv:2009.13549  [pdf, other

    cs.NI

    Mez: A Messaging System for Latency-Sensitive Multi-Camera Machine Vision at the IoT Edge

    Authors: Anjus George, Arun Ravindran, Mattias Mendieta, Hamed Tabkhi

    Abstract: Mez is a publish-subscribe messaging system for latency sensitive multi-camera machine vision at the IoT Edge. Unlike existing messaging systems, Mez allows applications to specify latency, and application accuracy bounds. Mez implements a network latency controller that dynamically adjusts the video frame quality to satisfy latency, and application accuracy requirements. Additionally, the design… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Comments: Under review ACM Transactions on Internet of Things

  42. arXiv:2009.09703  [pdf, other

    cs.CV

    The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database

    Authors: Zohreh Mostaani, Anjith George, Guillaume Heusch, David Geissbuhler, Sebastien Marcel

    Abstract: The High-Quality Wide Multi-Channel Attack database (HQ-WMCA) database extends the previous Wide Multi-Channel Attack database(WMCA), with more channels including color, depth, thermal, infrared (spectra), and short-wave infrared (spectra), and also a wide variety of attacks.

    Submitted 21 September, 2020; originally announced September 2020.

  43. arXiv:2007.11469  [pdf, other

    cs.CV

    Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks

    Authors: Guillaume Heusch, Anjith George, David Geissbuhler, Zohreh Mostaani, Sebastien Marcel

    Abstract: This paper addresses the problem of face presentation attack detection using different image modalities. In particular, the usage of short wave infrared (SWIR) imaging is considered. Face presentation attack detection is performed using recent models based on Convolutional Neural Networks using only carefully selected SWIR image differences as input. Conducted experiments show superior performance… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  44. arXiv:2007.11457  [pdf, other

    cs.CV

    Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks

    Authors: Anjith George, Sebastien Marcel

    Abstract: Face recognition has evolved as a widely used biometric modality. However, its vulnerability against presentation attacks poses a significant security threat. Though presentation attack detection (PAD) methods try to address this issue, they often fail in generalizing to unseen attacks. In this work, we propose a new framework for PAD using a one-class classifier, where the representation used is… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

    Comments: 15 pages

  45. arXiv:2006.16836  [pdf, other

    cs.CV

    Can Your Face Detector Do Anti-spoofing? Face Presentation Attack Detection with a Multi-Channel Face Detector

    Authors: Anjith George, Sebastien Marcel

    Abstract: In a typical face recognition pipeline, the task of the face detector is to localize the face region. However, the face detector localizes regions that look like a face, irrespective of the liveliness of the face, which makes the entire system susceptible to presentation attacks. In this work, we try to reformulate the task of the face detector to detect real faces, thus eliminating the threat of… ▽ More

    Submitted 29 July, 2020; v1 submitted 30 June, 2020; originally announced June 2020.

    Comments: 9 pages

    Report number: Idiap-RR-12-2020

  46. arXiv:2006.14749  [pdf, other

    cs.CV cs.LG eess.IV

    Deepfake Detection using Spatiotemporal Convolutional Networks

    Authors: Oscar de Lima, Sean Franklin, Shreshtha Basu, Blake Karwoski, Annet George

    Abstract: Better generative models and larger datasets have led to more realistic fake videos that can fool the human eye but produce temporal and spatial artifacts that deep learning approaches can detect. Most current Deepfake detection methods only use individual video frames and therefore fail to learn from temporal information. We created a benchmark of the performance of spatiotemporal convolutional m… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  47. arXiv:2006.07909  [pdf, ps, other

    cs.LG cs.CL cs.CV stat.ML

    Leveraging Multimodal Behavioral Analytics for Automated Job Interview Performance Assessment and Feedback

    Authors: Anumeha Agrawal, Rosa Anil George, Selvan Sunitha Ravi, Sowmya Kamath S, Anand Kumar M

    Abstract: Behavioral cues play a significant part in human communication and cognitive perception. In most professional domains, employee recruitment policies are framed such that both professional skills and personality traits are adequately assessed. Hiring interviews are structured to evaluate expansively a potential employee's suitability for the position - their professional qualifications, interperson… ▽ More

    Submitted 16 June, 2020; v1 submitted 14 June, 2020; originally announced June 2020.

    Comments: 9 pages, ACL 2020

  48. arXiv:2006.00058  [pdf, other

    cs.LG cs.CV

    Applying the Decisiveness and Robustness Metrics to Convolutional Neural Networks

    Authors: Christopher A. George, Eduardo A. Barrera, Kenric P. Nelson

    Abstract: We review three recently-proposed classifier quality metrics and consider their suitability for large-scale classification challenges such as applying convolutional neural networks to the 1000-class ImageNet dataset. These metrics, referred to as the "geometric accuracy," "decisiveness," and "robustness," are based on the generalized mean ($ρ$ equals 0, 1, and -2/3, respectively) of the classifier… ▽ More

    Submitted 29 May, 2020; originally announced June 2020.

  49. arXiv:2003.03626  [pdf

    q-bio.NC cs.RO

    Discrimination Among Multiple Cutaneous and Proprioceptive Hand Percepts Evoked by Nerve Stimulation with Utah Slanted Electrode Arrays in Human Amputees

    Authors: David M. Page, Suzanne M. Wendelken, Tyler S. Davis, David T. Kluger, Douglas T. Hutchinson, Jacob A. George, Gregory A. Clark

    Abstract: Objective: This paper aims to demonstrate functional discriminability among restored hand sensations with different locations, qualities, and intensities that are evoked by microelectrode stimulation of residual afferent fibers in human amputees. Methods: We implanted a Utah Slanted Electrode Array (USEA) in the median and ulnar residual arm nerves of three transradial amputees and delivered stimu… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

    Comments: 19 pages

  50. arXiv:2003.00070  [pdf

    cs.RO cs.CV q-bio.NC

    Inexpensive surface electromyography sleeve with consistent electrode placement enables dexterous and stable prosthetic control through deep learning

    Authors: Jacob A. George, Anna Neibling, Michael D. Paskett, Gregory A. Clark

    Abstract: The dexterity of conventional myoelectric prostheses is limited in part by the small datasets used to train the control algorithms. Variations in surface electrode positioning make it difficult to collect consistent data and to estimate motor intent reliably over time. To address these challenges, we developed an inexpensive, easy-to-don sleeve that can record robust and repeatable surface electro… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: MEC2020