Skip to main content

Showing 1–3 of 3 results for author: Kane, K

Searching in archive cs. Search in all archives.
.
  1. A Contextual Inquiry of People with Vision Impairments in Cooking

    Authors: Franklin Mingzhe Li, Michael Xieyang Liu, Shaun K. Kane, Patrick Carrington

    Abstract: Individuals with vision impairments employ a variety of strategies for object identification, such as pans or soy sauce, in the culinary process. In addition, they often rely on contextual details about objects, such as location, orientation, and current status, to autonomously execute cooking activities. To understand how people with vision impairments collect and use the contextual information o… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

    Comments: CHI 2024

  2. arXiv:2105.10051  [pdf, other

    cs.CR

    Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

    Authors: Jack W. Stokes, Paul England, Kevin Kane

    Abstract: Recent research has successfully demonstrated new types of data poisoning attacks. To address this problem, some researchers have proposed both offline and online data poisoning detection defenses which employ machine learning algorithms to identify such attacks. In this work, we take a different approach to preventing data poisoning attacks which relies on cryptographically-based authentication a… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  3. arXiv:2001.07886  [pdf, other

    cs.MM cs.CR eess.SY

    AMP: Authentication of Media via Provenance

    Authors: Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa Redmiles, Alex Shamis, Isha Sharma, Sam Wenker, Anika Zaman

    Abstract: Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media through machine learning methods. While detection may help in the short term, we be… ▽ More

    Submitted 20 June, 2020; v1 submitted 22 January, 2020; originally announced January 2020.

    Comments: Add detailed manifest description, Add provenance, Improve text