Skip to main content

Showing 1–8 of 8 results for author: Andrews, J T A

.
  1. arXiv:2406.06407  [pdf, other

    cs.LG cs.CY

    A Taxonomy of Challenges to Curating Fair Datasets

    Authors: Dora Zhao, Morgan Klaus Scheuerman, Pooja Chitre, Jerone T. A. Andrews, Georgia Panagiotidou, Shawn Walker, Kathleen H. Pine, Alice Xiang

    Abstract: Despite extensive efforts to create fairer machine learning (ML) datasets, there remains a limited understanding of the practical aspects of dataset curation. Drawing from interviews with 30 ML dataset curators, we present a comprehensive taxonomy of the challenges and trade-offs encountered throughout the dataset curation lifecycle. Our findings underscore overarching issues within the broader fa… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2303.17176  [pdf, other

    cs.CV

    A View From Somewhere: Human-Centric Face Representations

    Authors: Jerone T. A. Andrews, Przemyslaw Joniak, Alice Xiang

    Abstract: Few datasets contain self-identified sensitive attributes, inferring attributes risks introducing additional biases, and collecting attributes can carry legal risks. Besides, categorical labels can fail to reflect the continuous nature of human phenotypic diversity, making it difficult to compare the similarity between same-labeled faces. To address these issues, we present A View From Somewhere (… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Comments: Accepted to ICLR 2023. Code and data may be found at https://github.com/SonyAI/a_view_from_somewhere

  3. arXiv:2302.03629  [pdf, ps, other

    cs.CV cs.AI cs.DB cs.LG

    Ethical Considerations for Responsible Data Curation

    Authors: Jerone T. A. Andrews, Dora Zhao, William Thong, Apostolos Modas, Orestis Papakyriakopoulos, Alice Xiang

    Abstract: Human-centric computer vision (HCCV) data curation practices often neglect privacy and bias concerns, leading to dataset retractions and unfair models. HCCV datasets constructed through nonconsensual web scra** lack crucial metadata for comprehensive fairness and robustness evaluations. Current remedies are post hoc, lack persuasive justification for adoption, or fail to provide proper contextua… ▽ More

    Submitted 10 December, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023 Track on Datasets and Benchmarks (Oral)

  4. arXiv:2210.11924  [pdf, other

    cs.CV cs.AI cs.LG

    Men Also Do Laundry: Multi-Attribute Bias Amplification

    Authors: Dora Zhao, Jerone T. A. Andrews, Alice Xiang

    Abstract: As computer vision systems become more widely deployed, there is increasing concern from both the research community and the public that these systems are not only reproducing but amplifying harmful social biases. The phenomenon of bias amplification, which is the focus of this work, refers to models amplifying inherent training set biases at test time. Existing metrics measure bias amplification… ▽ More

    Submitted 30 May, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: Accepted at ICML 2023

  5. arXiv:2006.16849  [pdf, other

    cs.CY cs.CR cs.LG cs.SI

    I call BS: Fraud Detection in Crowdfunding Campaigns

    Authors: Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis

    Abstract: Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight fo… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

  6. Conditional Adversarial Camera Model Anonymization

    Authors: Jerone T. A. Andrews, Yidan Zhang, Lewis D. Griffin

    Abstract: The model of camera that was used to capture a particular photographic image (model attribution) is typically inferred from high-frequency model-specific artifacts present within the image. Model anonymization is the process of transforming these artifacts such that the apparent capture model is changed. We propose a conditional adversarial approach for learning such transformations. In contrast t… ▽ More

    Submitted 3 December, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: ECCV 2020 - Advances in Image Manipulation workshop (AIM 2020)

  7. arXiv:1906.08507  [pdf, other

    cs.CV cs.CR cs.LG

    Multiple-Identity Image Attacks Against Face-based Identity Verification

    Authors: Jerone T. A. Andrews, Thomas Tanay, Lewis D. Griffin

    Abstract: Facial verification systems are vulnerable to poisoning attacks that make use of multiple-identity images (MIIs)---face images stored in a database that resemble multiple persons, such that novel images of any of the constituent persons are verified as matching the identity of the MII. Research on this mode of attack has focused on defence by detection, with no explanation as to why the vulnerabil… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 13 pages, 7 figures

  8. arXiv:1806.07409  [pdf, other

    cs.CV cs.LG stat.ML

    Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

    Authors: Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin

    Abstract: Designing models that are robust to small adversarial perturbations of their inputs has proven remarkably difficult. In this work we show that the reverse problem---making models more vulnerable---is surprisingly easy. After presenting some proofs of concept on MNIST, we introduce a generic tilting attack that injects vulnerabilities into the linear layers of pre-trained networks by increasing the… ▽ More

    Submitted 7 May, 2019; v1 submitted 19 June, 2018; originally announced June 2018.