Skip to main content

Showing 1–32 of 32 results for author: Woo, S S

  1. arXiv:2407.10399  [pdf, other

    cs.CV

    Exploring the Impact of Moire Pattern on Deepfake Detectors

    Authors: Razaib Tariq, Shahroz Tariq, Simon S. Woo

    Abstract: Deepfake detection is critical in mitigating the societal threats posed by manipulated videos. While various algorithms have been developed for this purpose, challenges arise when detectors operate externally, such as on smartphones, when users take a photo of deepfake images and upload on the Internet. One significant challenge in such scenarios is the presence of Moiré patterns, which degrade im… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

    Comments: 7 page, 4 figures, 1 table, Accepted for publication in IEEE International Conference on Image Processing (ICIP 2024)

  2. arXiv:2407.10277  [pdf, other

    cs.CV cs.AI cs.LG

    Disrupting Diffusion-based Inpainters with Semantic Digression

    Authors: Geonho Son, Juhun Lee, Simon S. Woo

    Abstract: The fabrication of visual misinformation on the web and social media has increased exponentially with the advent of foundational text-to-image diffusion models. Namely, Stable Diffusion inpainters allow the synthesis of maliciously inpainted images of personal and private figures, and copyrighted contents, also known as deepfakes. To combat such generations, a disruption framework, namely Photogua… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

    Comments: 16 pages, 13 figures, IJCAI 2024

  3. arXiv:2405.01934  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Impact of Architectural Modifications on Deep Learning Adversarial Robustness

    Authors: Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K Thiruvathukal, Tamer Abuhmed

    Abstract: Rapid advancements of deep learning are accelerating adoption in a wide variety of applications, including safety-critical applications such as self-driving vehicles, drones, robots, and surveillance systems. These advancements include applying variations of sophisticated techniques that improve the performance of models. However, such models are not immune to adversarial manipulations, which can… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  4. arXiv:2402.18817  [pdf, other

    cs.CV

    Gradient Alignment for Cross-Domain Face Anti-Spoofing

    Authors: Binh M. Le, Simon S. Woo

    Abstract: Recent advancements in domain generalization (DG) for face anti-spoofing (FAS) have garnered considerable attention. Traditional methods have focused on designing learning objectives and additional modules to isolate domain-specific features while retaining domain-invariant characteristics in their representations. However, such approaches often lack guarantees of consistent maintenance of domain-… ▽ More

    Submitted 11 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Journal ref: The IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024

  5. arXiv:2402.18293  [pdf, other

    cs.CV

    Continuous Memory Representation for Anomaly Detection

    Authors: Joo Chan Lee, Taejune Kim, Eunbyung Park, Simon S. Woo, Jong Hwan Ko

    Abstract: There have been significant advancements in anomaly detection in an unsupervised manner, where only normal images are available for training. Several recent methods aim to detect anomalies based on a memory, comparing or reconstructing the input with directly stored normal features (or trained features with normal images). However, such memory-based approaches operate on a discrete feature space i… ▽ More

    Submitted 10 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: Project page: https://tae-mo.github.io/crad/

  6. arXiv:2401.04364  [pdf, other

    cs.CV cs.CR cs.LG

    SoK: Facial Deepfake Detectors

    Authors: Binh M. Le, Jiwon Kim, Shahroz Tariq, Kristen Moore, Alsharif Abuadbba, Simon S. Woo

    Abstract: Deepfakes have rapidly emerged as a profound and serious threat to society, primarily due to their ease of creation and dissemination. This situation has triggered an accelerated development of deepfake detection technologies. However, many existing detectors rely heavily on lab-generated datasets for validation, which may not effectively prepare them for novel, emerging, and real-world deepfake t… ▽ More

    Submitted 25 June, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 18 pages, 6 figures, 5 table, under peer-review

  7. arXiv:2401.02113  [pdf, other

    cs.CV

    Source-Free Online Domain Adaptive Semantic Segmentation of Satellite Images under Image Degradation

    Authors: Fahim Faisal Niloy, Kishor Kumar Bhaumik, Simon S. Woo

    Abstract: Online adaptation to distribution shifts in satellite image segmentation stands as a crucial yet underexplored problem. In this paper, we address source-free and online domain adaptation, i.e., test-time adaptation (TTA), for satellite images, with the focus on mitigating distribution shifts caused by various forms of image degradation. Towards achieving this goal, we propose a novel TTA approach… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: ICASSP 2024

  8. arXiv:2312.16823  [pdf, other

    cs.LG cs.CR

    Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

    Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo

    Abstract: Recently, serious concerns have been raised about the privacy issues related to training datasets in machine learning algorithms when including personal data. Various regulations in different countries, including the GDPR grant individuals to have personal data erased, known as 'the right to be forgotten' or 'the right to erasure'. However, there has been less research on effectively and practical… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

  9. arXiv:2312.12807  [pdf, other

    cs.CV cs.AI

    All but One: Surgical Concept Erasing with Model Preservation in Text-to-Image Diffusion Models

    Authors: Seunghoo Hong, Juhun Lee, Simon S. Woo

    Abstract: Text-to-Image models such as Stable Diffusion have shown impressive image generation synthesis, thanks to the utilization of large-scale datasets. However, these datasets may contain sexually explicit, copyrighted, or undesirable content, which allows the model to directly generate them. Given that retraining these large models on individual concept deletion requests is infeasible, fine-tuning alg… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: Main paper with supplementary materials

  10. arXiv:2309.05911  [pdf, other

    cs.CV cs.AI

    Quality-Agnostic Deepfake Detection with Intra-model Collaborative Learning

    Authors: Binh M. Le, Simon S. Woo

    Abstract: Deepfake has recently raised a plethora of societal concerns over its possible security threats and dissemination of fake information. Much research on deepfake detection has been undertaken. However, detecting low quality as well as simultaneously detecting different qualities of deepfakes still remains a grave challenge. Most SOTA approaches are limited by using a single specific model for detec… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Journal ref: International Conference on Computer Vision 2023

  11. arXiv:2307.11906  [pdf, other

    cs.CV cs.CR cs.LG

    Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning has been rapidly employed in many applications revolutionizing many industries, but it is known to be vulnerable to adversarial attacks. Such attacks pose a serious threat to deep learning-based systems compromising their integrity, reliability, and trust. Interpretable Deep Learning Systems (IDLSes) are designed to make the system more transparent and explainable, but they are also… ▽ More

    Submitted 21 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.06496

  12. arXiv:2307.11052  [pdf, other

    cs.CV

    HRFNet: High-Resolution Forgery Network for Localizing Satellite Image Manipulation

    Authors: Fahim Faisal Niloy, Kishor Kumar Bhaumik, Simon S. Woo

    Abstract: Existing high-resolution satellite image forgery localization methods rely on patch-based or downsampling-based training. Both of these training methods have major drawbacks, such as inaccurate boundaries between pristine and forged regions, the generation of unwanted artifacts, etc. To tackle the aforementioned challenges, inspired by the high-resolution image segmentation literature, we propose… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: ICIP 2023

  13. arXiv:2307.06496  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning models are susceptible to adversarial samples in white and black-box environments. Although previous studies have shown high attack success rates, coupling DNN models with interpretation models could offer a sense of security when a human expert is involved, who can identify whether a given sample is benign or malicious. However, in white-box environments, interpretable deep learning… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  14. arXiv:2303.11793  [pdf, other

    cs.CV

    Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense

    Authors: Binh M. Le, Shahroz Tariq, Simon S. Woo

    Abstract: Deep neural networks, particularly in vision tasks, are notably susceptible to adversarial perturbations. To overcome this challenge, developing a robust classifier is crucial. In light of the recent advancements in the robustness of classifiers, we delve deep into the intricacies of adversarial training and Jacobian regularization, two pivotal defenses. Our work is the first carefully analyzes an… ▽ More

    Submitted 12 February, 2024; v1 submitted 21 March, 2023; originally announced March 2023.

  15. arXiv:2211.15926  [pdf, other

    cs.CR cs.CV cs.LG

    Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed

    Abstract: Deep learning methods have gained increased attention in various applications due to their outstanding performance. For exploring how this high performance relates to the proper use of data artifacts and the accurate problem formulation of a given task, interpretation models have become a crucial component in developing deep learning-based systems. Interpretation models enable the understanding of… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  16. arXiv:2210.02182  [pdf, other

    cs.CV

    CFL-Net: Image Forgery Localization Using Contrastive Learning

    Authors: Fahim Faisal Niloy, Kishor Kumar Bhaumik, Simon S. Woo

    Abstract: Conventional forgery localizing methods usually rely on different forgery footprints such as JPEG artifacts, edge inconsistency, camera noise, etc., with cross-entropy loss to locate manipulated regions. However, these methods have the disadvantage of over-fitting and focusing on only a few specific forgery footprints. On the other hand, real-life manipulated images are generated via a wide variet… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: WACV 2023

  17. Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability

    Authors: Shahroz Tariq, Binh M. Le, Simon S. Woo

    Abstract: Time series anomaly detection is extensively studied in statistics, economics, and computer science. Over the years, numerous methods have been proposed for time series anomaly detection using deep learning-based methods. Many of these methods demonstrate state-of-the-art performance on benchmark datasets, giving the false impression that these systems are robust and deployable in many practical a… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Part of Proceedings of the 31st ACM International Conference on Information and Knowledge Management (CIKM '22)

  18. arXiv:2202.11359   

    cs.CV cs.AI cs.LG

    Deepfake Detection for Facial Images with Facemasks

    Authors: Donggeun Ko, Sangjun Lee, Jinyong Park, Saebyeol Shin, Donghee Hong, Simon S. Woo

    Abstract: Hyper-realistic face image generation and manipulation have givenrise to numerous unethical social issues, e.g., invasion of privacy,threat of security, and malicious political maneuvering, which re-sulted in the development of recent deepfake detection methods with the rising demands of deepfake forensics. Proposed deepfake detection methods to date have shown remarkable detection performance and… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

    Comments: This submission has been removed by arXiv administrators because the submitter did not have the authority to grant the license at the time of submission

  19. arXiv:2201.07394  [pdf, other

    cs.CV

    KappaFace: Adaptive Additive Angular Margin Loss for Deep Face Recognition

    Authors: Chingis Oinar, Binh M. Le, Simon S. Woo

    Abstract: Feature learning is a widely used method employed for large-scale face recognition. Recently, large-margin softmax loss methods have demonstrated significant enhancements on deep face recognition. These methods propose fixed positive margins in order to enforce intra-class compactness and inter-class diversity. However, the majority of the proposed methods do not consider the class imbalance issue… ▽ More

    Submitted 6 December, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  20. arXiv:2112.12001  [pdf, other

    cs.CV

    DA-FDFtNet: Dual Attention Fake Detection Fine-tuning Network to Detect Various AI-Generated Fake Images

    Authors: Young Oh Bang, Simon S. Woo

    Abstract: Due to the advancement of Generative Adversarial Networks (GAN), Autoencoders, and other AI technologies, it has been much easier to create fake images such as "Deepfakes". More recent research has introduced few-shot learning, which uses a small amount of training data to produce fake images and videos more effectively. Therefore, the ease of generating manipulated images and the difficulty of di… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  21. arXiv:2112.08050  [pdf, other

    cs.CV cs.CY

    Exploring the Asynchronous of the Frequency Spectra of GAN-generated Facial Images

    Authors: Binh M. Le, Simon S. Woo

    Abstract: The rapid progression of Generative Adversarial Networks (GANs) has raised a concern of their misuse for malicious purposes, especially in creating fake face images. Although many proposed methods succeed in detecting GAN-based synthetic images, they are still limited by the need for large quantities of the training fake image dataset and challenges for the detector's generalizability to unknown f… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: International Workshop on Safety and Security of Deep Learning IJCAI, 2021

  22. arXiv:2112.03553  [pdf, other

    cs.CV

    ADD: Frequency Attention and Multi-View based Knowledge Distillation to Detect Low-Quality Compressed Deepfake Images

    Authors: Binh M. Le, Simon S. Woo

    Abstract: Despite significant advancements of deep learning-based forgery detectors for distinguishing manipulated deepfake images, most detection approaches suffer from moderate to significant performance degradation with low-quality compressed deepfake images. Because of the limited information in low-quality images, detecting low-quality deepfake remains an important challenge. In this work, we apply fre… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Journal ref: Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

  23. arXiv:2109.02993  [pdf, other

    cs.CV cs.MM cs.SD eess.AS eess.IV

    Evaluation of an Audio-Video Multimodal Deepfake Dataset using Unimodal and Multimodal Detectors

    Authors: Hasam Khalid, Minha Kim, Shahroz Tariq, Simon S. Woo

    Abstract: Significant advancements made in the generation of deepfakes have caused security and privacy issues. Attackers can easily impersonate a person's identity in an image by replacing his face with the target person's face. Moreover, a new domain of cloning human voices using deep-learning technologies is also emerging. Now, an attacker can generate realistic cloned voices of humans using only a few s… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 2 Figures, 2 Tables, Accepted for publication at the 1st Workshop on Synthetic Multimedia - Audiovisual Deepfake Generation and Detection (ADGD '21) at ACM MM 2021

    ACM Class: I.4.9; I.5.4

  24. arXiv:2108.05080  [pdf, other

    cs.CV cs.MM cs.SD eess.AS

    FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset

    Authors: Hasam Khalid, Shahroz Tariq, Minha Kim, Simon S. Woo

    Abstract: While the significant advancements have made in the generation of deepfakes using deep learning technologies, its misuse is a well-known issue now. Deepfakes can cause severe security and privacy issues as they can be used to impersonate a person's identity in a video by replacing his/her face with another person's face. Recently, a new problem of generating synthesized human voice of a person is… ▽ More

    Submitted 1 March, 2022; v1 submitted 11 August, 2021; originally announced August 2021.

    Comments: Part of Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks (NeurIPS Datasets and Benchmarks 2021)

    ACM Class: I.4.9; I.5.4

  25. arXiv:2107.02408  [pdf, other

    cs.CV cs.CR cs.LG cs.MM

    CoReD: Generalizing Fake Media Detection with Continual Representation using Distillation

    Authors: Minha Kim, Shahroz Tariq, Simon S. Woo

    Abstract: Over the last few decades, artificial intelligence research has made tremendous strides, but it still heavily relies on fixed datasets in stationary environments. Continual learning is a growing field of research that examines how AI systems can learn sequentially from a continuous stream of linked data in the same way that biological systems do. Simultaneously, fake media such as deepfakes and sy… ▽ More

    Submitted 5 August, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 13 pages, 7 Figures, 13 Tables, Accepted for publication in the 29th ACM International Conference on Multimedia (ACMMM '21)

    ACM Class: I.4.9; I.5.4

  26. arXiv:2105.13617  [pdf, other

    cs.CV

    FReTAL: Generalizing Deepfake Detection using Knowledge Distillation and Representation Learning

    Authors: Minha Kim, Shahroz Tariq, Simon S. Woo

    Abstract: As GAN-based video and image manipulation technologies become more sophisticated and easily accessible, there is an urgent need for effective deepfake detection technologies. Moreover, various deepfake generation techniques have emerged over the past few years. While many deepfake detection methods have been proposed, their performance suffers from new types of deepfake methods on which they are n… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

    Comments: 12 pages, 2 figures, 5 tables, accepted for publication at the Workshop on Media Forensics 2021

    ACM Class: I.4.9; I.5.4

  27. arXiv:2105.06117  [pdf, other

    cs.CV

    TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning

    Authors: Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo

    Abstract: Deepfakes have become a critical social problem, and detecting them is of utmost importance. Also, deepfake generation methods are advancing, and it is becoming harder to detect. While many deepfake detection models can detect different types of deepfakes separately, they perform poorly on generalizing the detection performance over multiple types of deepfake. This motivates us to develop a genera… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    Comments: 16 pages, 3 figures, to be published in IFIP-SEC 2021

  28. One Detector to Rule Them All: Towards a General Deepfake Attack Detection Framework

    Authors: Shahroz Tariq, Sangyup Lee, Simon S. Woo

    Abstract: Deep learning-based video manipulation methods have become widely accessible to the masses. With little to no effort, people can quickly learn how to generate deepfake (DF) videos. While deep learning-based detection methods have been proposed to identify specific types of DFs, their performance suffers for other types of deepfake methods, including real-world deepfakes, on which they are not suff… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: 14 pages, 8 Figures, 6 Tables, Accepted for publication in The Web Conference WWW 2021

    ACM Class: I.4.9; I.5.4

  29. arXiv:2103.00847  [pdf, other

    cs.CV cs.AI cs.CR cs.CY cs.LG

    Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack

    Authors: Shahroz Tariq, Sowon Jeon, Simon S. Woo

    Abstract: Recently, significant advancements have been made in face recognition technologies using Deep Neural Networks. As a result, companies such as Microsoft, Amazon, and Naver offer highly accurate commercial face recognition web services for diverse applications to meet the end-user needs. Naturally, however, such technologies are threatened persistently, as virtually any individual can quickly implem… ▽ More

    Submitted 2 March, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: 27 pages, preprint

    ACM Class: I.4.9; I.5.4; K.4.2

  30. arXiv:2009.07480  [pdf, other

    cs.CV cs.MM

    A Convolutional LSTM based Residual Network for Deepfake Video Detection

    Authors: Shahroz Tariq, Sangyup Lee, Simon S. Woo

    Abstract: In recent years, deep learning-based video manipulation methods have become widely accessible to masses. With little to no effort, people can easily learn how to generate deepfake videos with only a few victims or target images. This creates a significant social problem for everyone whose photos are publicly available on the Internet, especially on social media websites. Several deep learning-base… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    ACM Class: I.4.9; I.5.4

  31. arXiv:2008.04115  [pdf, other

    cs.CV

    T-GD: Transferable GAN-generated Images Detection Framework

    Authors: Hyeonseong Jeon, Youngoh Bang, Junyaup Kim, Simon S. Woo

    Abstract: Recent advancements in Generative Adversarial Networks (GANs) enable the generation of highly realistic images, raising concerns about their misuse for malicious purposes. Detecting these GAN-generated images (GAN-images) becomes increasingly challenging due to the significant reduction of underlying artifacts and specific patterns. The absence of such traces can hinder detection algorithms from i… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: ICML 2020

  32. arXiv:2001.01265  [pdf, other

    cs.CV

    FDFtNet: Facing Off Fake Images using Fake Detection Fine-tuning Network

    Authors: Hyeonseong Jeon, Youngoh Bang, Simon S. Woo

    Abstract: Creating fake images and videos such as "Deepfake" has become much easier these days due to the advancement in Generative Adversarial Networks (GANs). Moreover, recent research such as the few-shot learning can create highly realistic personalized fake images with only a few images. Therefore, the threat of Deepfake to be used for a variety of malicious intents such as propagating fake images and… ▽ More

    Submitted 10 August, 2020; v1 submitted 5 January, 2020; originally announced January 2020.

    Comments: IFIP-Sec 2020