Skip to main content

Showing 1–37 of 37 results for author: Boult, T E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.00400  [pdf, other

    cs.CV

    Open-Set Face Recognition with Maximal Entropy and Objectosphere Loss

    Authors: Rafael Henrique Vareto, Yu Linghu, Terrance E. Boult, William Robson Schwartz, Manuel Günther

    Abstract: Open-set face recognition characterizes a scenario where unknown individuals, unseen during the training and enrollment stages, appear on operation time. This work concentrates on watchlists, an open-set task that is expected to operate at a low False Positive Identification Rate and generally includes only a few enrollment samples per identity. We introduce a compact adapter network that benefits… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: Accepted for publication in Image and Vision Computing 2023

  2. arXiv:2307.14278  [pdf, other

    cs.CV

    Large-scale Fully-Unsupervised Re-Identification

    Authors: Gabriel Bertocco, Fernanda Andaló, Terrance E. Boult, Anderson Rocha

    Abstract: Fully-unsupervised Person and Vehicle Re-Identification have received increasing attention due to their broad applicability in surveillance, forensics, event understanding, and smart cities, without requiring any manual annotation. However, most of the prior art has been evaluated in datasets that have just a couple thousand samples. Such small-data setups often allow the use of costly techniques… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: This paper has been submitted for possible publication in an IEEE Transactions

  3. arXiv:2302.05753  [pdf, other

    cs.CV

    DaliID: Distortion-Adaptive Learned Invariance for Identification Models

    Authors: Wes Robbins, Gabriel Bertocco, Terrance E. Boult

    Abstract: In unconstrained scenarios, face recognition and person re-identification are subject to distortions such as motion blur, atmospheric turbulence, or upsampling artifacts. To improve robustness in these scenarios, we propose a methodology called Distortion-Adaptive Learned Invariance for Identification (DaliID) models. We contend that distortion augmentations, which degrade image quality, can be su… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  4. arXiv:2201.07894  [pdf, other

    cs.CV cs.AI

    Enhanced Performance of Pre-Trained Networks by Matched Augmentation Distributions

    Authors: Touqeer Ahmad, Mohsen Jafarzadeh, Akshay Raj Dhamija, Ryan Rabinowitz, Steve Cruz, Chunchun Li, Terrance E. Boult

    Abstract: There exists a distribution discrepancy between training and testing, in the way images are fed to modern CNNs. Recent work tried to bridge this gap either by fine-tuning or re-training the network at different resolutions. However re-training a network is rarely cheap and not always viable. To this end, we propose a simple solution to address the train-test distributional shift and enhance the pe… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    MSC Class: 68T45 ACM Class: I.4.8

  5. arXiv:2112.03692  [pdf

    cs.CR cs.DC

    Blockchain Synchronous Trust Consensus Model

    Authors: Christopher Gorog, Terrance E. Boult

    Abstract: This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeav… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: Publication TBD

  6. arXiv:2102.07848  [pdf, other

    cs.CV cs.LG

    Self-Supervised Features Improve Open-World Learning

    Authors: Akshay Raj Dhamija, Touqeer Ahmad, Jonathan Schwan, Mohsen Jafarzadeh, Chunchun Li, Terrance E. Boult

    Abstract: This paper identifies the flaws in existing open-world learning approaches and attempts to provide a complete picture in the form of \textbf{True Open-World Learning}. We accomplish this by proposing a comprehensive generalize-able open-world learning protocol capable of evaluating various components of open-world learning in an operational setting. We argue that in true open-world learning, the u… ▽ More

    Submitted 29 April, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

    MSC Class: 68T45 ACM Class: I.4.8

  7. arXiv:2012.04226  [pdf, other

    cs.AI cs.CV cs.LG

    A Unifying Framework for Formal Theories of Novelty:Framework, Examples and Discussion

    Authors: T. E. Boult, P. A. Grabowicz, D. S. Prijatelj, R. Stern, L. Holder, J. Alspector, M. Jafarzadeh, T. Ahmad, A. R. Dhamija, C. Li, S. Cruz, A. Shrivastava, C. Vondrick, W. J. Scheirer

    Abstract: Managing inputs that are novel, unknown, or out-of-distribution is critical as an agent moves from the lab to the open world. Novelty-related problems include being tolerant to novel perturbations of the normal input, detecting when the input includes novel items, and adapting to novel inputs. While significant research has been undertaken in these areas, a noticeable gap exists in the lack of a f… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: Extended version/preprint of a AAAI 2021 paper

  8. arXiv:2011.12906  [pdf, other

    cs.CV cs.AI cs.LG eess.IV eess.SP

    A Review of Open-World Learning and Steps Toward Open-World Learning Without Labels

    Authors: Mohsen Jafarzadeh, Akshay Raj Dhamija, Steve Cruz, Chunchun Li, Touqeer Ahmad, Terrance E. Boult

    Abstract: In open-world learning, an agent starts with a set of known classes, detects, and manages things that it does not know, and learns them over time from a non-stationary stream of data. Open-world learning is related to but also distinct from a multitude of other learning problems and this paper briefly analyzes the key differences between a wide range of problems including incremental learning, gen… ▽ More

    Submitted 3 January, 2022; v1 submitted 25 November, 2020; originally announced November 2020.

    MSC Class: 68T45 ACM Class: I.4.8

  9. arXiv:2011.05506  [pdf, other

    cs.CV cs.LG eess.IV eess.SP

    Automatic Open-World Reliability Assessment

    Authors: Mohsen Jafarzadeh, Touqeer Ahmad, Akshay Raj Dhamija, Chunchun Li, Steve Cruz, Terrance E. Boult

    Abstract: Image classification in the open-world must handle out-of-distribution (OOD) images. Systems should ideally reject OOD images, or they will map atop of known classes and reduce reliability. Using open-set classifiers that can reject OOD inputs can help. However, optimal accuracy of open-set classifiers depend on the frequency of OOD data. Thus, for either standard or open-set classifiers, it is im… ▽ More

    Submitted 13 December, 2020; v1 submitted 10 November, 2020; originally announced November 2020.

    Comments: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV)

    MSC Class: 68T45 ACM Class: I.4.8

    Journal ref: 2021 IEEE Winter Conference on Applications of Computer Vision (WACV)

  10. arXiv:2004.08443  [pdf, other

    cs.CV

    Adversarial Attack on Deep Learning-Based Splice Localization

    Authors: Andras Rozsa, Zheng Zhong, Terrance E. Boult

    Abstract: Regarding image forensics, researchers have proposed various approaches to detect and/or localize manipulations, such as splices. Recent best performing image-forensics algorithms greatly benefit from the application of deep learning, but such tools can be vulnerable to adversarial attacks. Due to the fact that most of the proposed adversarial example generation techniques can be used only on end-… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: This is a pre-print of the original paper accepted at the CVPR Workshop on Media Forensics 2020

  11. To Beta or Not To Beta: Information Bottleneck for DigitaL Image Forensics

    Authors: Aurobrata Ghosh, Zheng Zhong, Steve Cruz, Subbu Veeravasarapu, Terrance E Boult, Maneesh Singh

    Abstract: We consider an information theoretic approach to address the problem of identifying fake digital images. We propose an innovative method to formulate the issue of localizing manipulated regions in an image as a deep representation learning problem using the Information Bottleneck (IB), which has recently gained popularity as a framework for interpreting deep neural networks. Tampered images pose a… ▽ More

    Submitted 11 August, 2019; originally announced August 2019.

    Comments: 10 pages

    Journal ref: 2020 IEEE International Conference on Image Processing (ICIP)

  12. arXiv:1908.02435  [pdf, other

    cs.CV cs.LG

    Improved Adversarial Robustness by Reducing Open Space Risk via Tent Activations

    Authors: Andras Rozsa, Terrance E. Boult

    Abstract: Adversarial examples contain small perturbations that can remain imperceptible to human observers but alter the behavior of even the best performing deep learning models and yield incorrect outputs. Since their discovery, adversarial examples have drawn significant attention in machine learning: researchers try to reveal the reasons for their existence and improve the robustness of machine learnin… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  13. arXiv:1906.11663  [pdf, other

    cs.CV

    SpliceRadar: A Learned Method For Blind Image Forensics

    Authors: Aurobrata Ghosh, Zheng Zhong, Terrance E Boult, Maneesh Singh

    Abstract: Detection and localization of image manipulations like splices are gaining in importance with the easy accessibility of image editing softwares. While detection generates a verdict for an image it provides no insight into the manipulation. Localization helps explain a positive detection by identifying the pixels of the image which have been tampered. We propose a deep learning based method for spl… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: CVPR 2019, Workshop on Media Forensics, 8 pages

  14. arXiv:1811.04110  [pdf, other

    cs.CV

    Reducing Network Agnostophobia

    Authors: Akshay Raj Dhamija, Manuel Günther, Terrance E. Boult

    Abstract: Agnostophobia, the fear of the unknown, can be experienced by deep learning engineers while applying their networks to real-world applications. Unfortunately, network behavior is not well defined for inputs far from a networks training set. In an uncontrolled environment, networks face many instances that are not of interest to them and have to be rejected in order to avoid a false positive. This… ▽ More

    Submitted 22 December, 2018; v1 submitted 9 November, 2018; originally announced November 2018.

    Comments: Neural Information Processing Systems (NeurIPS) 2018

  15. Facial Attributes: Accuracy and Adversarial Robustness

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. While recent methods extract facial attributes using deep neural networks (DNNs) trained on labeled facial attribute data, the robustness of deep attribute representations has not been evaluated. In this paper, we examine the representational stability… ▽ More

    Submitted 20 April, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

    Comments: arXiv admin note: text overlap with arXiv:1605.05411

    Journal ref: Pattern Recognition Letters, 2017, ISSN 0167-8655

  16. arXiv:1708.06997  [pdf, other

    cs.CV

    The Unconstrained Ear Recognition Challenge

    Authors: Žiga Emeršič, Dejan Štepec, Vitomir Štruc, Peter Peer, Anjith George, Adil Ahmad, Elshibani Omar, Terrance E. Boult, Reza Safdari, Yuxiang Zhou, Stefanos Zafeiriou, Dogucan Yaman, Fevziye I. Eyiokur, Hazim K. Ekenel

    Abstract: In this paper we present the results of the Unconstrained Ear Recognition Challenge (UERC), a group benchmarking effort centered around the problem of person recognition from ear images captured in uncontrolled conditions. The goal of the challenge was to assess the performance of existing ear recognition techniques on a challenging large-scale dataset and identify open problems that need to be ad… ▽ More

    Submitted 1 February, 2019; v1 submitted 23 August, 2017; originally announced August 2017.

    Comments: International Joint Conference on Biometrics 2017

  17. Unconstrained Face Detection and Open-Set Face Recognition Challenge

    Authors: Manuel Günther, Peiyun Hu, Christian Herrmann, Chi Ho Chan, Min Jiang, Shufan Yang, Akshay Raj Dhamija, Deva Ramanan, Jürgen Beyerer, Josef Kittler, Mohamad Al Jazaery, Mohammad Iqbal Nouyed, Guodong Guo, Cezary Stankiewicz, Terrance E. Boult

    Abstract: Face detection and recognition benchmarks have shifted toward more difficult environments. The challenge presented in this paper addresses the next step in the direction of automatic detection and identification of people from outdoor surveillance cameras. While face detection has shown remarkable success in images collected from the web, surveillance cameras include more diverse occlusions, poses… ▽ More

    Submitted 25 September, 2018; v1 submitted 7 August, 2017; originally announced August 2017.

    Comments: This is an ERRATA version of the paper originally presented at the International Joint Conference on Biometrics. Due to a bug in our evaluation code, the results of the participants changed. The final conclusion, however, is still the same

  18. arXiv:1708.01697  [pdf, other

    cs.CV

    Adversarial Robustness: Softmax versus Openmax

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks (DNNs) provide state-of-the-art results on various tasks and are widely used in real world applications. However, it was discovered that machine learning models, including the best performing DNNs, suffer from a fundamental problem: they can unexpectedly and confidently misclassify examples formed by slightly perturbing otherwise correctly recognized inputs. Various approaches… ▽ More

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: Accepted to British Machine Vision Conference (BMVC) 2017

  19. arXiv:1705.01567  [pdf, other

    cs.CV

    Toward Open-Set Face Recognition

    Authors: Manuel Günther, Steve Cruz, Ethan M. Rudd, Terrance E. Boult

    Abstract: Much research has been conducted on both face identification and face verification, with greater focus on the latter. Research on face identification has mostly focused on using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects that are enrolled in the gallery. Real systems, however, where only a fraction of probe sample identities are enrol… ▽ More

    Submitted 18 May, 2017; v1 submitted 3 May, 2017; originally announced May 2017.

    Comments: Accepted for Publication in CVPR 2017 Biometrics Workshop

  20. arXiv:1703.02248  [pdf, other

    cs.CR

    Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters

    Authors: Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult

    Abstract: The U.S Government has been the target for cyber-attacks from all over the world. Just recently, former President Obama accused the Russian government of the leaking emails to Wikileaks and declared that the U.S. might be forced to respond. While Russia denied involvement, it is clear that the U.S. has to take some defensive measures to protect its data infrastructure. Insider threats have been th… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Pre-print of camera-ready copy accepted to the 2017 IEEE Homeland Security Technologies (HST) conference

  21. arXiv:1703.02244  [pdf, other

    cs.CR

    Open Set Intrusion Recognition for Fine-Grained Attack Categorization

    Authors: Steve Cruz, Cora Coleman, Ethan M. Rudd, Terrance E. Boult

    Abstract: Confidently distinguishing a malicious intrusion over a network is an important challenge. Most intrusion detection system evaluations have been performed in a closed set protocol in which only classes seen during training are considered during classification. Thus far, there has been no realistic application in which novel types of behaviors unseen at training -- unknown classes as it were -- mus… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

    Comments: Pre-print of camera-ready version to appear at the IEEE Homeland Security Technologies (HST) 2017 Conference

  22. arXiv:1612.00138  [pdf, other

    cs.CV

    Towards Robust Deep Neural Networks with BANG

    Authors: Andras Rozsa, Manuel Gunther, Terrance E. Boult

    Abstract: Machine learning models, including state-of-the-art deep neural networks, are vulnerable to small perturbations that cause unexpected classification errors. This unexpected lack of robustness raises fundamental questions about their generalization properties and poses a serious concern for practical deployments. As such perturbations can remain imperceptible - the formed adversarial examples demon… ▽ More

    Submitted 30 January, 2018; v1 submitted 30 November, 2016; originally announced December 2016.

    Comments: Accepted to the IEEE Winter Conference on Applications of Computer Vision (WACV), 2018

  23. arXiv:1611.06179  [pdf, other

    cs.CV

    LOTS about Attacking Deep Features

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Deep neural networks provide state-of-the-art performance on various tasks and are, therefore, widely used in real world applications. DNNs are becoming frequently utilized in biometrics for extracting deep features, which can be used in recognition systems for enrolling and recognizing new individuals. It was revealed that deep neural networks suffer from a fundamental problem, namely, they can u… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: Accepted to the International Joint Conference on Biometrics (IJCB) 2017

  24. arXiv:1611.06158  [pdf, other

    cs.CV

    AFFACT - Alignment-Free Facial Attribute Classification Technique

    Authors: Manuel Günther, Andras Rozsa, Terrance E. Boult

    Abstract: Facial attributes are soft-biometrics that allow limiting the search space, e.g., by rejecting identities with non-matching facial characteristics such as nose sizes or eyebrow shapes. In this paper, we investigate how the latest versions of deep convolutional neural networks, ResNets, perform on the facial attribute classification task. We test two loss functions: the sigmoid cross-entropy loss a… ▽ More

    Submitted 4 August, 2017; v1 submitted 18 November, 2016; originally announced November 2016.

    Comments: This is a pre-print of the original paper accepted for oral presentation at the International Joint Conference on Biometrics (IJCB) 2017

  25. arXiv:1610.06856  [pdf, other

    cs.CR cs.AI cs.CL cs.CY

    Automated Big Text Security Classification

    Authors: Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow

    Abstract: In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release of diplomatic cables and the Edward Snowden incident, have greatly harmed the U.S. government's relationship with other governments and with its own citizens. Data Leak Prevention (DLP) is a solution f… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: Pre-print of Best Paper Award IEEE Intelligence and Security Informatics (ISI) 2016 Manuscript

    Journal ref: 2016 IEEE International Conference on Intelligence and Security Informatics (ISI)

  26. Are Accuracy and Robustness Correlated?

    Authors: Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: Machine learning models are vulnerable to adversarial examples formed by applying small carefully chosen perturbations to inputs that cause unexpected classification errors. In this paper, we perform experiments on various adversarial example generation approaches with multiple deep convolutional neural networks including Residual Networks, the best performing models on ImageNet Large-Scale Visual… ▽ More

    Submitted 30 November, 2016; v1 submitted 14 October, 2016; originally announced October 2016.

    Comments: Accepted for publication at ICMLA 2016

  27. arXiv:1610.04256  [pdf, other

    cs.CV

    Assessing Threat of Adversarial Examples on Deep Neural Networks

    Authors: Abigail Graese, Andras Rozsa, Terrance E. Boult

    Abstract: Deep neural networks are facing a potential security threat from adversarial examples, inputs that look normal but cause an incorrect classification by the deep neural network. For example, the proposed threat could result in hand-written digits on a scanned check being incorrectly classified but looking normal when humans see them. This research assesses the extent to which adversarial examples p… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

    Comments: This is a pre-print version to appear in IEEE ICMLA 2016

  28. Open-Set Support Vector Machines

    Authors: Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha

    Abstract: Often, when dealing with real-world recognition problems, we do not need, and often cannot have, knowledge of the entire set of possible classes that might appear during operational testing. In such cases, we need to think of robust classification methods able to deal with the "unknown" and properly reject samples belonging to classes never seen during training. Notwithstanding, existing classifie… ▽ More

    Submitted 21 February, 2022; v1 submitted 12 June, 2016; originally announced June 2016.

    Comments: Version accepted for publication in IEEE Transactions on Systems, Man, and Cybernetics: Systems

  29. arXiv:1605.05411  [pdf, other

    cs.CV

    Are Facial Attributes Adversarially Robust?

    Authors: Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

    Abstract: Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial attributes must be extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution for automatic facial attribute extraction by training a deep convolutional neural network (DC… ▽ More

    Submitted 16 September, 2016; v1 submitted 17 May, 2016; originally announced May 2016.

    Comments: Pre-print of article accepted to the International Conference on Pattern Recognition (ICPR) 2016. 7 pages total

  30. arXiv:1605.03124  [pdf, other

    cs.CV

    PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses

    Authors: Ethan M. Rudd, Manuel Gunther, Terrance E. Boult

    Abstract: For applications such as airport border control, biometric technologies that can process many capture subjects quickly, efficiently, with weak supervision, and with minimal discomfort are desirable. Facial recognition is particularly appealing because it is minimally invasive yet offers relatively good recognition performance. Unfortunately, the combination of weak supervision and minimal invasive… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 Biometrics Workshop

  31. arXiv:1605.03116  [pdf, other

    cs.CR

    CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

    Authors: Ethan M. Rudd, Terrance E. Boult

    Abstract: Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages service/application access is not fake. In this paper, we introduce the CALIPER protocol, in which a separate Continuous Access Verification Entity (C… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 Biometrics Workshop

  32. arXiv:1605.01775  [pdf, other

    cs.CV

    Adversarial Diversity and Hard Positive Generation

    Authors: Andras Rozsa, Ethan M. Rudd, Terrance E. Boult

    Abstract: State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present a new psychometric perceptual adversarial similarity score (PASS) measure for quantifying adversarial images, introduce the notion of hard positive generation, and use a diverse set of adversarial perturbations -… ▽ More

    Submitted 16 May, 2016; v1 submitted 5 May, 2016; originally announced May 2016.

    Comments: Accepted to CVPR 2016 DeepVision Workshop

  33. arXiv:1603.06028  [pdf, other

    cs.CR cs.CV

    A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

    Authors: Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult

    Abstract: As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild fo… ▽ More

    Submitted 2 December, 2016; v1 submitted 18 March, 2016; originally announced March 2016.

    Comments: Pre-Print of a manuscript Accepted to IEEE Communications Surveys and Tutorials (COMST) on December 1, 2016

  34. The Extreme Value Machine

    Authors: Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult

    Abstract: It is often desirable to be able to recognize when inputs to a recognition function learned in a supervised manner correspond to classes unseen at training time. With this ability, new class labels could be assigned to these inputs by a human operator, allowing them to be incorporated into the recognition function --- ideally under an efficient incremental update mechanism. While good algorithms t… ▽ More

    Submitted 20 May, 2017; v1 submitted 19 June, 2015; originally announced June 2015.

    Comments: Pre-print of a manuscript accepted to the IEEE Transactions on Pattern Analysis and Machine Intelligence (T-PAMI) journal

  35. arXiv:1304.1112  [pdf

    cs.AI

    Pruning Bayesian Networks for Efficient Computation

    Authors: Michelle Baker, Terrance E. Boult

    Abstract: This paper analyzes the circumstances under which Bayesian networks can be pruned in order to reduce computational complexity without altering the computation for variables of interest. Given a problem instance which consists of a query and evidence for a set of nodes in the network, it is possible to delete portions of the network which do not participate in the computation for the query. Savin… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)

    Report number: UAI-P-1990-PG-257-264

  36. arXiv:1302.4673  [pdf, other

    cs.CV

    Good Recognition is Non-Metric

    Authors: Walter J. Scheirer, Michael J. Wilber, Michael Eckmann, Terrance E. Boult

    Abstract: Recognition is the fundamental task of visual cognition, yet how to formalize the general recognition problem for computer vision remains an open issue. The problem is sometimes reduced to the simplest case of recognizing matching pairs, often structured to allow for metric constraints. However, visual recognition is broader than just pair matching -- especially when we consider multi-class traini… ▽ More

    Submitted 19 February, 2013; originally announced February 2013.

    Comments: 9 pages, 5 figures

  37. Secure voice based authentication for mobile devices: Vaulted Voice Verification

    Authors: R. C. Johnson, Walter J. Scheirer, Terrance E. Boult

    Abstract: As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phon… ▽ More

    Submitted 30 November, 2012; originally announced December 2012.