Skip to main content

Showing 1–19 of 19 results for author: Reiss, T

.
  1. arXiv:2406.09398  [pdf, other

    cs.CV

    Real-Time Deepfake Detection in the Real-World

    Authors: Bar Cavia, Eliahu Horwitz, Tal Reiss, Yedid Hoshen

    Abstract: Recent improvements in generative AI made synthesizing fake images easy; as they can be used to cause harm, it is crucial to develop accurate techniques to identify them. This paper introduces "Locally Aware Deepfake Detection Algorithm" (LaDeDa), that accepts a single 9x9 image patch and outputs its deepfake score. The image deepfake score is the pooled score of its patches. With merely patch-lev… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2405.20341  [pdf, other

    cs.LG cs.CL

    From Zero to Hero: Cold-Start Anomaly Detection

    Authors: Tal Reiss, George Kour, Naama Zwerdling, Ateret Anaby-Tavor, Yedid Hoshen

    Abstract: When first deploying an anomaly detection system, e.g., to detect out-of-scope queries in chatbots, there are no observed data, making data-driven approaches ineffective. Zero-shot anomaly detection methods offer a solution to such "cold-start" cases, but unfortunately they are often not accurate enough. This paper studies the realistic but underexplored cold-start setting where an anomaly detecti… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: ACL 2024. Our code is available at https://github.com/talreiss/ColdFusion

  3. arXiv:2311.01458  [pdf, other

    cs.CV cs.LG

    Detecting Deepfakes Without Seeing Any

    Authors: Tal Reiss, Bar Cavia, Yedid Hoshen

    Abstract: Deepfake attacks, malicious manipulation of media containing people, are a serious concern for society. Conventional deepfake detection methods train supervised classifiers to distinguish real media from previously encountered deepfakes. Such techniques can only detect deepfakes similar to those previously seen, but not zero-day (previously unseen) attack types. As current deepfake generation tech… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Our code is available at https://github.com/talreiss/FACTOR

  4. arXiv:2308.14753  [pdf, other

    cs.CV cs.LG

    Efficient Discovery and Effective Evaluation of Visual Perceptual Similarity: A Benchmark and Beyond

    Authors: Oren Barkan, Tal Reiss, Jonathan Weill, Ori Katz, Roy Hirsch, Itzik Malkiel, Noam Koenigstein

    Abstract: Visual similarities discovery (VSD) is an important task with broad e-commerce applications. Given an image of a certain object, the goal of VSD is to retrieve images of different objects with high perceptual visual similarity. Although being a highly addressed problem, the evaluation of proposed methods for VSD is often based on a proxy of an identification-retrieval task, evaluating the ability… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  5. arXiv:2307.09404  [pdf, other

    stat.ME

    Continuous-time multivariate analysis

    Authors: Biplab Paul, Philip T. Reiss, Erjia Cui, Noemi FoĆ 

    Abstract: The starting point for much of multivariate analysis (MVA) is an $n\times p$ data matrix whose $n$ rows represent observations and whose $p$ columns represent variables. Some multivariate data sets, however, may be best conceptualized not as $n$ discrete $p$-variate observations, but as $p$ curves or functions defined on a common time interval. Here we introduce a framework for extending technique… ▽ More

    Submitted 12 June, 2024; v1 submitted 18 July, 2023; originally announced July 2023.

  6. arXiv:2306.07284  [pdf, other

    cs.LG cs.CV

    No Free Lunch: The Hazards of Over-Expressive Representations in Anomaly Detection

    Authors: Tal Reiss, Niv Cohen, Yedid Hoshen

    Abstract: Anomaly detection methods, powered by deep learning, have recently been making significant progress, mostly due to improved representations. It is tempting to hypothesize that anomaly detection can improve indefinitely by increasing the scale of our networks, making their representations more expressive. In this paper, we provide theoretical and empirical evidence to the contrary. In fact, we empi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  7. arXiv:2301.09615  [pdf, ps, other

    cs.NI

    ESWORD: Implementation of Wireless Jamming Attacks in a Real-World Emulated Network

    Authors: Clifton Paul Robinson, Leonardo Bonati, Tara Van Nieuwstadt, Teddy Reiss, Pedram Johari, Michele Polese, Hieu Nguyen, Curtis Watson, Tommaso Melodia

    Abstract: Wireless jamming attacks have plagued wireless communication systems and will continue to do so going forward with technological advances. These attacks fall under the category of Electronic Warfare (EW), a continuously growing area in both attack and defense of the electromagnetic spectrum, with one subcategory being electronic attacks. Jamming attacks fall under this specific subcategory of EW a… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: 6 pages, 7 figures, 1 table. IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, Scotland, March 2023

  8. arXiv:2212.00789  [pdf, other

    cs.CV cs.LG

    Attribute-based Representations for Accurate and Interpretable Video Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Video anomaly detection (VAD) is a challenging computer vision task with many practical applications. As anomalies are inherently ambiguous, it is essential for users to understand the reasoning behind a system's decision in order to determine if the rationale is sound. In this paper, we propose a simple but highly effective method that pushes the boundaries of VAD accuracy and interpretability us… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: Our code is available at https://github.com/talreiss/Accurate-Interpretable-VAD

  9. arXiv:2210.10773  [pdf, other

    cs.LG cs.CV

    Anomaly Detection Requires Better Representations

    Authors: Tal Reiss, Niv Cohen, Eliahu Horwitz, Ron Abutbul, Yedid Hoshen

    Abstract: Anomaly detection seeks to identify unusual phenomena, a central task in science and industry. The task is inherently unsupervised as anomalies are unexpected and unknown during training. Recent advances in self-supervised representation learning have directly driven improvements in anomaly detection. In this position paper, we first explain how self-supervised representations can be easily used t… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: Accepted to ECCV SSLWIN Workshop (2022)

  10. arXiv:2106.03844  [pdf, other

    cs.CV cs.LG

    Mean-Shifted Contrastive Loss for Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Deep anomaly detection methods learn representations that separate between normal and anomalous images. Although self-supervised representation learning is commonly used, small dataset sizes limit its effectiveness. It was previously shown that utilizing external, generic datasets (e.g. ImageNet classification) can significantly improve anomaly detection performance. One approach is outlier exposu… ▽ More

    Submitted 28 November, 2022; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: AAAI 2023

  11. arXiv:2103.13198  [pdf, ps, other

    cs.HC cs.SE

    Use and Perceptions of Multi-Monitor Workstations: A Natural Experiment

    Authors: Guy Amir, Ayala Prusak, Tal Reiss, Nir Zabari, Dror G. Feitelson

    Abstract: Using multiple monitors is commonly thought to improve productivity, but this is hard to check experimentally. We use a survey, taken by 101 practitioners of which 80% have coded professionally for at least 2 years, to assess subjective perspectives based on experience. To improve validity, we compare situations in which developers naturally use different setups -- the difference between working a… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 9 pages, 16 figures. Accepted to 8th International Workshop on Software Engineering Research and Industrial Practice

    ACM Class: D.2.3

  12. arXiv:2010.05903  [pdf, other

    cs.CV cs.LG

    PANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation

    Authors: Tal Reiss, Niv Cohen, Liron Bergman, Yedid Hoshen

    Abstract: Anomaly detection methods require high-quality features. In recent years, the anomaly detection community has attempted to obtain better features using advances in deep self-supervised feature learning. Surprisingly, a very promising direction, using pretrained deep features, has been mostly overlooked. In this paper, we first empirically establish the perhaps expected, but unreported result, that… ▽ More

    Submitted 12 August, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: CVPR 2021

  13. arXiv:1912.07137  [pdf, other

    stat.ME stat.AP

    Generalized reliability based on distances

    Authors: Meng Xu, Philip T. Reiss, Ivor Cribben

    Abstract: The intraclass correlation coefficient (ICC) is a classical index of measurement reliability. With the advent of new and complex types of data for which the ICC is not defined, there is a need for new ways to assess reliability. To meet this need, we propose a new distance-based intraclass correlation coefficient (dbICC), defined in terms of arbitrary distances among observations. We introduce a b… ▽ More

    Submitted 17 January, 2020; v1 submitted 15 December, 2019; originally announced December 2019.

  14. Distribution-Free Pointwise Adjusted P-Values for Functional Hypotheses

    Authors: Meng Xu, Philip T. Reiss

    Abstract: Graphical tests assess whether a function of interest departs from an envelope of functions generated under a simulated null distribution. This approach originated in spatial statistics, but has recently gained some popularity in functional data analysis. Whereas such envelope tests examine deviation from a functional null distribution in an omnibus sense, in some applications we wish to do more:… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  15. Interpretable High-Dimensional Inference Via Score Projection with an Application in Neuroimaging

    Authors: Simon N. Vandekar, Philip T. Reiss, Russell T. Shinohara

    Abstract: In the fields of neuroimaging and genetics, a key goal is testing the association of a single outcome with a very high-dimensional imaging or genetic variable. Often, summary measures of the high-dimensional variable are created to sequentially test and localize the association with the outcome. In some cases, the results for summary measures are significant, but subsequent tests used to localize… ▽ More

    Submitted 26 September, 2017; originally announced September 2017.

  16. Wavelet-domain regression and predictive inference in psychiatric neuroimaging

    Authors: Philip T. Reiss, Lan Huo, Yihong Zhao, Clare Kelly, R. Todd Ogden

    Abstract: An increasingly important goal of psychiatry is the use of brain imaging data to develop predictive models. Here we present two contributions to statistical methodology for this purpose. First, we propose and compare a set of wavelet-domain procedures for fitting generalized linear models with scalar responses and image predictors: sparse variants of principal component regression and of partial l… ▽ More

    Submitted 16 September, 2015; originally announced September 2015.

    Comments: Published at http://dx.doi.org/10.1214/15-AOAS829 in the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOAS-AOAS829

    Journal ref: Annals of Applied Statistics 2015, Vol. 9, No. 2, 1076-1101

  17. arXiv:1412.0778  [pdf, other

    stat.ME

    Varying-smoother models for functional responses

    Authors: Philip T. Reiss, Lei Huang, Huaihou Chen, Stan Colcombe

    Abstract: This paper studies estimation of a smooth function $f(t,s)$ when we are given functional responses of the form $f(t,\cdot)$ + error, but scientific interest centers on the collection of functions $f(\cdot,s)$ for different $s$. The motivation comes from studies of human brain development, in which $t$ denotes age whereas $s$ refers to brain locations. Analogously to varying-coefficient models, in… ▽ More

    Submitted 1 December, 2014; originally announced December 2014.

  18. Broadband Geodesic Pulses for Three Spin Systems: Time-Optimal Realization of Effective Trilinear Coupling Terms and Indirect SWAP Gates

    Authors: Timo O. Reiss, Navin Khaneja, Steffen J. Glaser

    Abstract: Broadband implementations of time-optimal geodesic pulse elements are introduced for the efficient creation of effective trilinear coupling terms for spin systems consisting of three weakly coupled spins 1/2. Based on these pulse elements, the time-optimal implementation of indirect SWAP operations is demonstrated experimentally. The duration of indirect SWAP gates based on broadband geodesic se… ▽ More

    Submitted 8 May, 2003; originally announced May 2003.

    Comments: 22 pages, incl. 8 figures

  19. Optimal Control of Spin Dynamics in the Presence of Relaxation

    Authors: Navin Khaneja, Timo Reiss, Burkhard Luy, Steffen J. Glaser

    Abstract: Experiments in coherent spectroscopy correspond to control of quantum mechanical ensembles guiding them from initial to final target states. The control inputs (pulse sequences) that accomplish these transformations should be designed to minimize the effects of relaxation and to optimize the sensitivity of the experiments. For example in nuclear magnetic resonance (NMR) spectroscopy, a question… ▽ More

    Submitted 7 August, 2002; originally announced August 2002.