Skip to main content

Showing 1–18 of 18 results for author: Lau, C P

  1. An In-Depth Survey on Virtualization Technologies in 6G Integrated Terrestrial and Non-Terrestrial Networks

    Authors: Sahar Ammar, Chun Pong Lau, Basem Shihada

    Abstract: 6G networks are envisioned to deliver a large diversity of applications and meet stringent quality of service (QoS) requirements. Hence, integrated terrestrial and non-terrestrial networks (TN-NTNs) are anticipated to be key enabling technologies. However, the TN-NTNs integration faces a number of challenges that could be addressed through network virtualization technologies such as Software-Defin… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  2. arXiv:2311.17074  [pdf, other

    cs.CV

    Self-Supervised Learning of Whole and Component-Based Semantic Representations for Person Re-Identification

    Authors: Siyuan Huang, Yifan Zhou, Ram Prabhakar, Xijun Liu, Yuxiang Guo, Hongrui Yi, Cheng Peng, Rama Chellappa, Chun Pong Lau

    Abstract: Person Re-Identification (ReID) is a challenging problem, focusing on identifying individuals across diverse settings. However, previous ReID methods primarily concentrated on a single domain or modality, such as Clothes-Changing ReID (CC-ReID) and video ReID. Real-world ReID is not constrained by factors like clothes or input types. Recent approaches emphasize on learning semantics through pre-tr… ▽ More

    Submitted 14 March, 2024; v1 submitted 27 November, 2023; originally announced November 2023.

  3. arXiv:2311.15551  [pdf, other

    cs.CV cs.AI cs.CR cs.LG eess.IV

    Instruct2Attack: Language-Guided Semantic Adversarial Attacks

    Authors: Jiang Liu, Chen Wei, Yuxiang Guo, Heng Yu, Alan Yuille, Soheil Feizi, Chun Pong Lau, Rama Chellappa

    Abstract: We propose Instruct2Attack (I2A), a language-guided semantic attack that generates semantically meaningful perturbations according to free-form language instructions. We make use of state-of-the-art latent diffusion models, where we adversarially guide the reverse diffusion process to search for an adversarial latent code conditioned on the input image and text instruction. Compared to existing no… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

    Comments: under submission, code coming soon

  4. arXiv:2311.05725  [pdf, other

    cs.CV

    Whole-body Detection, Recognition and Identification at Altitude and Range

    Authors: Siyuan Huang, Ram Prabhakar Kathirvel, Chun Pong Lau, Rama Chellappa

    Abstract: In this paper, we address the challenging task of whole-body biometric detection, recognition, and identification at distances of up to 500m and large pitch angles of up to 50 degree. We propose an end-to-end system evaluated on diverse datasets, including the challenging Biometric Recognition and Identification at Range (BRIAR) dataset. Our approach involves pre-training the detector on common im… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  5. arXiv:2307.14578  [pdf, other

    cs.CV

    GADER: GAit DEtection and Recognition in the Wild

    Authors: Yuxiang Guo, Cheng Peng, Ram Prabhakar, Chun Pong Lau, Rama Chellappa

    Abstract: Gait recognition holds the promise of robustly identifying subjects based on their walking patterns instead of color information. While previous approaches have performed well for curated indoor scenes, they have significantly impeded applicability in unconstrained situations, e.g. outdoor, long distance scenes. We propose an end-to-end GAit DEtection and Recognition (GADER) algorithm for human au… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  6. arXiv:2305.13625  [pdf, other

    cs.CV cs.CR

    DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection

    Authors: Jiang Liu, Chun Pong Lau, Rama Chellappa

    Abstract: The increasingly pervasive facial recognition (FR) systems raise serious concerns about personal privacy, especially for billions of users who have publicly shared their photos on social media. Several attempts have been made to protect individuals from being identified by unauthorized FR systems utilizing adversarial attacks to generate encrypted face images. However, existing methods suffer from… ▽ More

    Submitted 28 May, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: Code will be available at https://github.com/joellliu/DiffProtect/

  7. arXiv:2305.13548  [pdf, ps, other

    cs.CV cs.CR

    Attribute-Guided Encryption with Facial Texture Masking

    Authors: Chun Pong Lau, Jiang Liu, Rama Chellappa

    Abstract: The increasingly pervasive facial recognition (FR) systems raise serious concerns about personal privacy, especially for billions of users who have publicly shared their photos on social media. Several attempts have been made to protect individuals from unauthorized FR systems utilizing adversarial attacks to generate encrypted face images to protect users from being identified by FR systems. Howe… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  8. arXiv:2210.04050  [pdf, other

    cs.CV

    Multi-Modal Human Authentication Using Silhouettes, Gait and RGB

    Authors: Yuxiang Guo, Cheng Peng, Chun Pong Lau, Rama Chellappa

    Abstract: Whole-body-based human authentication is a promising approach for remote biometrics scenarios. Current literature focuses on either body recognition based on RGB images or gait recognition based on body shapes and walking patterns; both have their advantages and drawbacks. In this work, we propose Dual-Modal Ensemble (DME), which combines both RGB and silhouette data to achieve more robust perform… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  9. Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses

    Authors: Chun Pong Lau, Jiang Liu, Hossein Souri, Wei-An Lin, Soheil Feizi, Rama Chellappa

    Abstract: Adversarial training (AT) is considered to be one of the most reliable defenses against adversarial attacks. However, models trained with AT sacrifice standard accuracy and do not generalize well to novel attacks. Recent works show generalization improvement with adversarial samples under novel threat models such as on-manifold threat model or neural perceptual threat model. However, the former re… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: Under submission

  10. Mutual Adversarial Training: Learning together is better than going alone

    Authors: Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa

    Abstract: Recent studies have shown that robustness to adversarial attacks can be transferred across networks. In other words, we can make a weak model more robust with the help of a strong teacher model. We ask if instead of learning from a static teacher, can models "learn together" and "teach each other" to achieve better robustness? In this paper, we study how interactions among models affect robustness… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    Comments: Under submission

  11. arXiv:2112.04532  [pdf, other

    cs.CV cs.CR eess.IV

    Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection

    Authors: Jiang Liu, Alexander Levine, Chun Pong Lau, Rama Chellappa, Soheil Feizi

    Abstract: Object detection plays a key role in many security-critical systems. Adversarial patch attacks, which are easy to implement in the physical world, pose a serious threat to state-of-the-art object detectors. Developing reliable defenses for object detectors against patch attacks is critical but severely understudied. In this paper, we propose Segment and Complete defense (SAC), a general framework… ▽ More

    Submitted 2 May, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: CVPR 2022 camera ready

  12. arXiv:2110.06802  [pdf, other

    cs.LG cs.CR cs.CV

    Identification of Attack-Specific Signatures in Adversarial Examples

    Authors: Hossein Souri, Pirazh Khorramshahi, Chun Pong Lau, Micah Goldblum, Rama Chellappa

    Abstract: The adversarial attack literature contains a myriad of algorithms for crafting perturbations which yield pathological behavior in neural networks. In many cases, multiple algorithms target the same tasks and even enforce the same constraints. In this work, we show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they q… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  13. arXiv:2009.02470  [pdf, other

    cs.CV

    Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp Adversarial Attacks

    Authors: Wei-An Lin, Chun Pong Lau, Alexander Levine, Rama Chellappa, Soheil Feizi

    Abstract: Adversarial training is a popular defense strategy against attack threat models with bounded Lp norms. However, it often degrades the model performance on normal images and the defense does not generalize well to novel attacks. Given the success of deep generative models such as GANs and VAEs in characterizing the underlying manifold of images, we investigate whether or not the aforementioned prob… ▽ More

    Submitted 5 September, 2020; originally announced September 2020.

  14. ATFaceGAN: Single Face Image Restoration and Recognition from Atmospheric Turbulence

    Authors: Chun Pong Lau, Hossein Souri, Rama Chellappa

    Abstract: Image degradation due to atmospheric turbulence is common while capturing images at long ranges. To mitigate the degradation due to turbulence which includes deformation and blur, we propose a generative single frame restoration algorithm which disentangles the blur and deformation due to turbulence and reconstructs a restored image. The disentanglement is achieved by decomposing the distortion du… ▽ More

    Submitted 8 May, 2020; v1 submitted 7 October, 2019; originally announced October 2019.

    Comments: 8 pages, 7 figures

  15. arXiv:1807.04418  [pdf, other

    cs.CV

    Subsampled Turbulence Removal Network

    Authors: Wai Ho Chak, Chun Pong Lau, Lok Ming Lui

    Abstract: We present a deep-learning approach to restore a sequence of turbulence-distorted video frames from turbulent deformations and space-time varying blurs. Instead of requiring a massive training sample size in deep networks, we purpose a training strategy that is based on a new data augmentation method to model turbulence from a relatively small dataset. Then we introduce a subsampled method to enha… ▽ More

    Submitted 13 August, 2018; v1 submitted 12 July, 2018; originally announced July 2018.

  16. arXiv:1712.03825  [pdf, other

    cs.CV

    Variational models for joint subsampling and reconstruction of turbulence-degraded images

    Authors: Chun Pong Lau, Yu Hin Lai, Lok Ming Lui

    Abstract: Turbulence-degraded image frames are distorted by both turbulent deformations and space-time-varying blurs. To suppress these effects, we propose a multi-frame reconstruction scheme to recover a latent image from the observed image sequence. Recent approaches are commonly based on registering each frame to a reference image, by which geometric turbulent deformations can be estimated and a sharp im… ▽ More

    Submitted 8 December, 2017; originally announced December 2017.

    Comments: arXiv admin note: text overlap with arXiv:1704.03140

  17. arXiv:1710.04034  [pdf, other

    cs.CV cs.GR

    Image retargeting via Beltrami representation

    Authors: Chun Pong Lau, Chun Pang Yung, Lok Ming Lui

    Abstract: Image retargeting aims to resize an image to one with a prescribed aspect ratio. Simple scaling inevitably introduces unnatural geometric distortions on the important content of the image. In this paper, we propose a simple and yet effective method to resize an image, which preserves the geometry of the important content, using the Beltrami representation. Our algorithm allows users to interactive… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

    Comments: 13pages, 13 figures

  18. arXiv:1704.03140  [pdf, other

    cs.CV cs.CG cs.GR

    Restoration of Atmospheric Turbulence-distorted Images via RPCA and Quasiconformal Maps

    Authors: Chun Pong Lau, Yu Hin Lai, Lok Ming Lui

    Abstract: We address the problem of restoring a high-quality image from an observed image sequence strongly distorted by atmospheric turbulence. A novel algorithm is proposed in this paper to reduce geometric distortion as well as space-and-time-varying blur due to strong turbulence. By considering a suitable energy functional, our algorithm first obtains a sharp reference image and a subsampled image seque… ▽ More

    Submitted 18 September, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 21 pages, 24 figures