Skip to main content

Showing 1–4 of 4 results for author: Alparslan, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.08453  [pdf, other

    cs.CV cs.LG

    Towards Evaluating Driver Fatigue with Robust Deep Learning Models

    Authors: Ken Alparslan, Yigit Alparslan, Matthew Burlick

    Abstract: In this paper, we explore different deep learning based approaches to detect driver fatigue. Drowsy driving results in approximately 72,000 crashes and 44,000 injuries every year in the US and detecting drowsiness and alerting the driver can save many lives. There have been many approaches to detect fatigue, of which eye closedness detection is one. We propose a framework to detect eye closedness… ▽ More

    Submitted 8 February, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: 8 pages, 12 figures, fixed typos, converted referencing to BibLatex from plain text

  2. arXiv:2007.07001  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Attacks against Neural Networks in Audio Domain: Exploiting Principal Components

    Authors: Ken Alparslan, Yigit Alparslan, Matthew Burlick

    Abstract: Adversarial attacks are inputs that are similar to original inputs but altered on purpose. Speech-to-text neural networks that are widely used today are prone to misclassify adversarial attacks. In this study, first, we investigate the presence of targeted adversarial attacks by altering wave forms from Common Voice data set. We craft adversarial wave forms via Connectionist Temporal Classificatio… ▽ More

    Submitted 13 January, 2021; v1 submitted 14 July, 2020; originally announced July 2020.

    Comments: 8 pages, 14 figures, fixed typos, enumerated equations, fixed equation (4) latex error, clarified author contributions via footnote

  3. arXiv:2002.00140  [pdf, other

    cs.CV

    Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

    Authors: Yigit Alparslan, Ken Alparslan, Mannika Kshettry, Louis Kratz

    Abstract: With the growth in social media, there is a huge amount of images of faces available on the internet. Often, people use other people's pictures on their own profile. Perceptual hashing is often used to detect whether two images are identical. Therefore, it can be used to detect whether people are misusing others' pictures. In perceptual hashing, a hash is calculated for a given image, and a new te… ▽ More

    Submitted 20 September, 2020; v1 submitted 31 January, 2020; originally announced February 2020.

    Comments: 5 pages, fixed typos, added references in Introduction section, added co-author due to post-publication contributions

    ACM Class: I.4.1; I.4.9

  4. arXiv:2001.11137  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

    Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt

    Abstract: Numerous recent studies have demonstrated how Deep Neural Network (DNN) classifiers can be fooled by adversarial examples, in which an attacker adds perturbations to an original sample, causing the classifier to misclassify the sample. Adversarial attacks that render DNNs vulnerable in real life represent a serious threat in autonomous vehicles, malware filters, or biometric authentication systems… ▽ More

    Submitted 8 February, 2021; v1 submitted 29 January, 2020; originally announced January 2020.

    Comments: 18 pages, 8 figures, fixed typos, replotted figures, restyled the plots and tables

    ACM Class: I.5.1; I.5.4; I.5.5