Skip to main content

Showing 1–11 of 11 results for author: Reiss, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09398  [pdf, other

    cs.CV

    Real-Time Deepfake Detection in the Real-World

    Authors: Bar Cavia, Eliahu Horwitz, Tal Reiss, Yedid Hoshen

    Abstract: Recent improvements in generative AI made synthesizing fake images easy; as they can be used to cause harm, it is crucial to develop accurate techniques to identify them. This paper introduces "Locally Aware Deepfake Detection Algorithm" (LaDeDa), that accepts a single 9x9 image patch and outputs its deepfake score. The image deepfake score is the pooled score of its patches. With merely patch-lev… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2405.20341  [pdf, other

    cs.LG cs.CL

    From Zero to Hero: Cold-Start Anomaly Detection

    Authors: Tal Reiss, George Kour, Naama Zwerdling, Ateret Anaby-Tavor, Yedid Hoshen

    Abstract: When first deploying an anomaly detection system, e.g., to detect out-of-scope queries in chatbots, there are no observed data, making data-driven approaches ineffective. Zero-shot anomaly detection methods offer a solution to such "cold-start" cases, but unfortunately they are often not accurate enough. This paper studies the realistic but underexplored cold-start setting where an anomaly detecti… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: ACL 2024. Our code is available at https://github.com/talreiss/ColdFusion

  3. arXiv:2311.01458  [pdf, other

    cs.CV cs.LG

    Detecting Deepfakes Without Seeing Any

    Authors: Tal Reiss, Bar Cavia, Yedid Hoshen

    Abstract: Deepfake attacks, malicious manipulation of media containing people, are a serious concern for society. Conventional deepfake detection methods train supervised classifiers to distinguish real media from previously encountered deepfakes. Such techniques can only detect deepfakes similar to those previously seen, but not zero-day (previously unseen) attack types. As current deepfake generation tech… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Our code is available at https://github.com/talreiss/FACTOR

  4. arXiv:2308.14753  [pdf, other

    cs.CV cs.LG

    Efficient Discovery and Effective Evaluation of Visual Perceptual Similarity: A Benchmark and Beyond

    Authors: Oren Barkan, Tal Reiss, Jonathan Weill, Ori Katz, Roy Hirsch, Itzik Malkiel, Noam Koenigstein

    Abstract: Visual similarities discovery (VSD) is an important task with broad e-commerce applications. Given an image of a certain object, the goal of VSD is to retrieve images of different objects with high perceptual visual similarity. Although being a highly addressed problem, the evaluation of proposed methods for VSD is often based on a proxy of an identification-retrieval task, evaluating the ability… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  5. arXiv:2306.07284  [pdf, other

    cs.LG cs.CV

    No Free Lunch: The Hazards of Over-Expressive Representations in Anomaly Detection

    Authors: Tal Reiss, Niv Cohen, Yedid Hoshen

    Abstract: Anomaly detection methods, powered by deep learning, have recently been making significant progress, mostly due to improved representations. It is tempting to hypothesize that anomaly detection can improve indefinitely by increasing the scale of our networks, making their representations more expressive. In this paper, we provide theoretical and empirical evidence to the contrary. In fact, we empi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  6. arXiv:2301.09615  [pdf, ps, other

    cs.NI

    ESWORD: Implementation of Wireless Jamming Attacks in a Real-World Emulated Network

    Authors: Clifton Paul Robinson, Leonardo Bonati, Tara Van Nieuwstadt, Teddy Reiss, Pedram Johari, Michele Polese, Hieu Nguyen, Curtis Watson, Tommaso Melodia

    Abstract: Wireless jamming attacks have plagued wireless communication systems and will continue to do so going forward with technological advances. These attacks fall under the category of Electronic Warfare (EW), a continuously growing area in both attack and defense of the electromagnetic spectrum, with one subcategory being electronic attacks. Jamming attacks fall under this specific subcategory of EW a… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: 6 pages, 7 figures, 1 table. IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, Scotland, March 2023

  7. arXiv:2212.00789  [pdf, other

    cs.CV cs.LG

    Attribute-based Representations for Accurate and Interpretable Video Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Video anomaly detection (VAD) is a challenging computer vision task with many practical applications. As anomalies are inherently ambiguous, it is essential for users to understand the reasoning behind a system's decision in order to determine if the rationale is sound. In this paper, we propose a simple but highly effective method that pushes the boundaries of VAD accuracy and interpretability us… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: Our code is available at https://github.com/talreiss/Accurate-Interpretable-VAD

  8. arXiv:2210.10773  [pdf, other

    cs.LG cs.CV

    Anomaly Detection Requires Better Representations

    Authors: Tal Reiss, Niv Cohen, Eliahu Horwitz, Ron Abutbul, Yedid Hoshen

    Abstract: Anomaly detection seeks to identify unusual phenomena, a central task in science and industry. The task is inherently unsupervised as anomalies are unexpected and unknown during training. Recent advances in self-supervised representation learning have directly driven improvements in anomaly detection. In this position paper, we first explain how self-supervised representations can be easily used t… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: Accepted to ECCV SSLWIN Workshop (2022)

  9. arXiv:2106.03844  [pdf, other

    cs.CV cs.LG

    Mean-Shifted Contrastive Loss for Anomaly Detection

    Authors: Tal Reiss, Yedid Hoshen

    Abstract: Deep anomaly detection methods learn representations that separate between normal and anomalous images. Although self-supervised representation learning is commonly used, small dataset sizes limit its effectiveness. It was previously shown that utilizing external, generic datasets (e.g. ImageNet classification) can significantly improve anomaly detection performance. One approach is outlier exposu… ▽ More

    Submitted 28 November, 2022; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: AAAI 2023

  10. arXiv:2103.13198  [pdf, ps, other

    cs.HC cs.SE

    Use and Perceptions of Multi-Monitor Workstations: A Natural Experiment

    Authors: Guy Amir, Ayala Prusak, Tal Reiss, Nir Zabari, Dror G. Feitelson

    Abstract: Using multiple monitors is commonly thought to improve productivity, but this is hard to check experimentally. We use a survey, taken by 101 practitioners of which 80% have coded professionally for at least 2 years, to assess subjective perspectives based on experience. To improve validity, we compare situations in which developers naturally use different setups -- the difference between working a… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 9 pages, 16 figures. Accepted to 8th International Workshop on Software Engineering Research and Industrial Practice

    ACM Class: D.2.3

  11. arXiv:2010.05903  [pdf, other

    cs.CV cs.LG

    PANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation

    Authors: Tal Reiss, Niv Cohen, Liron Bergman, Yedid Hoshen

    Abstract: Anomaly detection methods require high-quality features. In recent years, the anomaly detection community has attempted to obtain better features using advances in deep self-supervised feature learning. Surprisingly, a very promising direction, using pretrained deep features, has been mostly overlooked. In this paper, we first empirically establish the perhaps expected, but unreported result, that… ▽ More

    Submitted 12 August, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: CVPR 2021