With the continuous advancement of generative models, face morphing attacks have become a significant challenge for existing face verification systems due to their potential use in identity fraud and other malicious a...
详细信息
The landscape of natural language processing (NLP) has been revolutionized by advancements that enable the upstream training of knowledge-rich models for downstream tasks, particularly named entity recognition (NER). ...
详细信息
Create dynamic, dependable, and cost-effective cloud service combinations using the Dynamic Cloud Service Composition (DCSC) approach. Service Ranking (SR), Adaptive Composition (AC), and Cost Optimization algorithm a...
详细信息
Runtime Verification is a software testing technique based on extracting and analyzing information from a system while it is running. The objective is to use this information to find faults or problems in the system u...
详细信息
ISBN:
(数字)9798331540975
ISBN:
(纸本)9798331540982
Runtime Verification is a software testing technique based on extracting and analyzing information from a system while it is running. The objective is to use this information to find faults or problems in the system under test. To achieve this, it is necessary that the insertion of testing logic does not modify the code being tested and that it does not affect the performance of the system. In this article, we present a runtime testing framework for JavaScript, which utilizes Aspect-Oriented Programming and regular expressions. This framework encapsulates the idea of Message Sequence Specification applied to Runtime Verification. Our work is freely available and open source.
The emerging concept of Human-Centred Artificial Intelligence (HCAI) involves the amplification, augmentation, empowerment, and enhancement of individuals. The goal of HCAI is to ensure that AI meets our needs while a...
详细信息
This paper provides an overview of current approaches for solving inverse problems in imaging using variational methods and machine learning. A special focus lies on point estimators and their robustness against adver...
详细信息
Conflicts are inherent to normative systems. In this paper, we explore a novel approach to normative reasoning by quantifying the amount of conflicts within normative systems. We refine the idea from classical logic, ...
详细信息
Translucency optically results from subsurface light transport and plays a considerable role in how objects and materials appear. Absorption and scattering coefficients parametrize the distance a photon travels inside...
详细信息
Spatial distributions of wisents (European bison) Bison bonasus (Linnaeus 1758), were studied in the Bieszczady Mountains (south-eastern Poland) on the basis of telemetric data obtained from two subpopulations: the we...
详细信息
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match bo...
详细信息
ISBN:
(数字)9798331536626
ISBN:
(纸本)9798331536633
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match both identities, allowing serious security breaches. In this work, we apply a frequency-based explanation method from the area of explainable face recognition to shine a light on how FR models behave when processing a bona fide or attack pair from a frequency perspective. In extensive experiments, we used two different state-of-the-art FR models and six different morphing attacks to investigate possible differences in behavior. Our results show that FR models rely differently on different frequency bands when making decisions for bona fide pairs and morphing attacks. In the following step, we show that this behavioral difference can be used to detect morphing attacks in an unsupervised setup solely based on the observed frequency-importance differences in a generalizable manner.
暂无评论