Skip to main content

Showing 1–5 of 5 results for author: Neu, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.06304  [pdf, ps, other

    cs.SD cs.AI eess.AS

    A New Approach to Voice Authenticity

    Authors: Nicolas M. Müller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, Konstantin Böttinger

    Abstract: Voice faking, driven primarily by recent advances in text-to-speech (TTS) synthesis technology, poses significant societal challenges. Currently, the prevailing assumption is that unaltered human speech can be considered genuine, while fake speech comes from TTS synthesis. We argue that this binary distinction is oversimplified. For instance, altered playback speeds can be used for malicious purpo… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  2. arXiv:2301.06882  [pdf, other

    cs.CR cs.CV

    Multi-Biometric Fuzzy Vault based on Face and Fingerprints

    Authors: Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu

    Abstract: The fuzzy vault scheme has been established as cryptographic primitive suitable for privacy-preserving biometric authentication. To improve accuracy and privacy protection, biometric information of multiple characteristics can be fused at feature level prior to locking it in a fuzzy vault. We construct a multi-biometric fuzzy vault based on face and multiple fingerprints. On a multi-biometric data… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  3. arXiv:2204.12848  [pdf, other

    cs.LG cs.CR

    Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering

    Authors: Lukas Schulth, Christian Berghoff, Matthias Neu

    Abstract: Predicitions made by neural networks can be fraudulently altered by so-called poisoning attacks. A special case are backdoor poisoning attacks. We study suitable detection methods and introduce a new method called Heatmap Clustering. There, we apply a $k$-means clustering algorithm on heatmaps produced by the state-of-the-art explainable AI method Layer-wise relevance propagation. The goal is to s… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

  4. Robustness testing of AI systems: A case study for traffic sign recognition

    Authors: Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel

    Abstract: In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications. Unlike classical symbolic AI systems, neural networks are trained using large data sets and their inner structure containing possibly billions of parameters does not lend itself to human interpretation. As a consequence, it is so far… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

    Comments: 12 pages, 7 figures. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-79150-6_21

    Journal ref: In: Maglogiannis I., Macintyre J., Iliadis L. (eds) Artificial Intelligence Applications and Innovations. AIAI 2021. IFIP Advances in Information and Communication Technology, vol 627. Springer, Cham

  5. arXiv:2003.08837  [pdf, other

    cs.CR cs.AI cs.LG cs.SE stat.ML

    Vulnerabilities of Connectionist AI Applications: Evaluation and Defence

    Authors: Christian Berghoff, Matthias Neu, Arndt von Twickel

    Abstract: This article deals with the IT security of connectionist artificial intelligence (AI) applications, focusing on threats to integrity, one of the three IT security goals. Such threats are for instance most relevant in prominent AI computer vision applications. In order to present a holistic view on the IT security goal integrity, many additional aspects such as interpretability, robustness and docu… ▽ More

    Submitted 18 March, 2020; originally announced March 2020.

    Comments: 20 pages, 8 figures, 1 table