Skip to main content

Showing 1–50 of 51 results for author: Rocha, A

Searching in archive cs. Search in all archives.
.
  1. An Incremental MaxSAT-based Model to Learn Interpretable and Balanced Classification Rules

    Authors: Antônio Carlos Souza Ferreira Júnior, Thiago Alves Rocha

    Abstract: The increasing advancements in the field of machine learning have led to the development of numerous applications that effectively address a wide range of problems with accurate predictions. However, in certain cases, accuracy alone may not be sufficient. Many real-world problems also demand explanations and interpretability behind the predictions. One of the most popular interpretable models that… ▽ More

    Submitted 29 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    Comments: 16 pages, 5 tables, submitted to BRACIS 2023 (Brazilian Conference on Intelligent Systems), accepted version published in Intelligent Systems, LNCS, vol 14195

    ACM Class: I.2.4; I.2.6

    Journal ref: Intelligent Systems (2023), LNCS, vol 14195 (pp. 227-242), Springer Nature

  2. Logic-based Explanations for Linear Support Vector Classifiers with Reject Option

    Authors: Francisco Mateus Rocha Filho, Thiago Alves Rocha, Reginaldo Pereira Fernandes Ribeiro, Ajalmar Rêgo da Rocha Neto

    Abstract: Support Vector Classifier (SVC) is a well-known Machine Learning (ML) model for linear classification problems. It can be used in conjunction with a reject option strategy to reject instances that are hard to correctly classify and delegate them to a specialist. This further increases the confidence of the model. Given this, obtaining an explanation of the cause of rejection is important to not bl… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 16 pages, submitted to BRACIS 2023 (Brazilian Conference on Intelligent Systems), accepted version published in Intelligent Systems, LNCS, vol 14195

    ACM Class: I.2.4; I.2.6

  3. Robust Domain Misinformation Detection via Multi-modal Feature Alignment

    Authors: Hui Liu, Wenya Wang, Hao Sun, Anderson Rocha, Haoliang Li

    Abstract: Social media misinformation harms individuals and societies and is potentialized by fast-growing multi-modal content (i.e., texts and images), which accounts for higher "credibility" than text-only news pieces. Although existing supervised misinformation detection methods have obtained acceptable performances in key setups, they may require large amounts of labeled data from various events, which… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: Accepted by TIFS 2023

  4. arXiv:2310.00234  [pdf, other

    cs.CR cs.CV eess.IV

    Pixel-Inconsistency Modeling for Image Manipulation Localization

    Authors: Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, Alex C. Kot

    Abstract: Digital image forensics plays a crucial role in image authentication and manipulation localization. Despite the progress powered by deep neural networks, existing forgery localization methodologies exhibit limitations when deployed to unseen datasets and perturbed images (i.e., lack of generalization and robustness to real-world applications). To circumvent these problems and aid image integrity,… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

  5. arXiv:2309.12159  [pdf, other

    cs.CR cs.CV

    Information Forensics and Security: A quarter-century-long journey

    Authors: Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenael Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu

    Abstract: Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  6. arXiv:2309.02594  [pdf, other

    cs.SE

    How do Developers Improve Code Readability? An Empirical Study of Pull Requests

    Authors: Carlos Eduardo C. Dantas, Adriano M. Rocha, Marcelo A. Maia

    Abstract: Readability models and tools have been proposed to measure the effort to read code. However, these models are not completely able to capture the quality improvements in code as perceived by developers. To investigate possible features for new readability models and production-ready tools, we aim to better understand the types of readability improvements performed by developers when actually improv… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  7. arXiv:2307.14278  [pdf, other

    cs.CV

    Large-scale Fully-Unsupervised Re-Identification

    Authors: Gabriel Bertocco, Fernanda Andaló, Terrance E. Boult, Anderson Rocha

    Abstract: Fully-unsupervised Person and Vehicle Re-Identification have received increasing attention due to their broad applicability in surveillance, forensics, event understanding, and smart cities, without requiring any manual annotation. However, most of the prior art has been evaluated in datasets that have just a couple thousand samples. Such small-data setups often allow the use of costly techniques… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: This paper has been submitted for possible publication in an IEEE Transactions

  8. arXiv:2306.11503  [pdf, other

    cs.CY cs.AI cs.LG

    The Age of Synthetic Realities: Challenges and Opportunities

    Authors: João Phillipe Cardenuto, **g Yang, Rafael Padilha, Renjie Wan, Daniel Moreira, Haoliang Li, Shiqi Wang, Fernanda Andaló, Sébastien Marcel, Anderson Rocha

    Abstract: Synthetic realities are digital creations or augmentations that are contextually generated through the use of Artificial Intelligence (AI) methods, leveraging extensive amounts of data to construct new narratives or realities, regardless of the intent to deceive. In this paper, we delve into the concept of synthetic realities and their implications for Digital Forensics and society at large within… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

  9. arXiv:2304.00115  [pdf

    cs.CL

    Extracting Thyroid Nodules Characteristics from Ultrasound Reports Using Transformer-based Natural Language Processing Methods

    Authors: Aman Pathak, Zehao Yu, Daniel Paredes, Elio Paul Monsour, Andrea Ortiz Rocha, Juan P. Brito, Naykky Singh Ospina, Yonghui Wu

    Abstract: The ultrasound characteristics of thyroid nodules guide the evaluation of thyroid cancer in patients with thyroid nodules. However, the characteristics of thyroid nodules are often documented in clinical narratives such as ultrasound reports. Previous studies have examined natural language processing (NLP) methods in extracting a limited number of characteristics (<9) using rule-based NLP systems.… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

  10. arXiv:2301.12831  [pdf, other

    cs.MM cs.CV

    M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System

    Authors: Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li

    Abstract: Face presentation attacks (FPA), also known as face spoofing, have brought increasing concerns to the public through various malicious applications, such as financial fraud and privacy leakage. Therefore, safeguarding face recognition systems against FPA is of utmost importance. Although existing learning-based face anti-spoofing (FAS) models can achieve outstanding detection performance, they lac… ▽ More

    Submitted 21 March, 2024; v1 submitted 30 January, 2023; originally announced January 2023.

  11. arXiv:2212.14730  [pdf

    cs.CV cs.LG

    Machine Learning and Thermography Applied to the Detection and Classification of Cracks in Building

    Authors: Angela Busheska, Nara Almeida, Nicholas Sabella, Eudes de A. Rocha

    Abstract: Due to the environmental impacts caused by the construction industry, repurposing existing buildings and making them more energy-efficient has become a high-priority issue. However, a legitimate concern of land developers is associated with the buildings' state of conservation. For that reason, infrared thermography has been used as a powerful tool to characterize these buildings' state of conserv… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  12. arXiv:2211.10340  [pdf, other

    cs.LG cs.SI

    Few-shot Learning for Multi-modal Social Media Event Filtering

    Authors: José Nascimento, João Phillipe Cardenuto, **g Yang, Anderson Rocha

    Abstract: Social media has become an important data source for event analysis. When collecting this type of data, most contain no useful information to a target event. Thus, it is essential to filter out those noisy data at the earliest opportunity for a human expert to perform further inspection. Most existing solutions for event filtering rely on fully supervised methods for training. However, in many rea… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Comments: Accepted in IEEE International Workshop on Information Forensics and Security - WIFS 2022, Shanghai, China

  13. arXiv:2206.05570  [pdf, other

    cs.IT eess.SP

    A Two-Dimensional FFT Precoded Filter Bank Scheme

    Authors: R. Pereira Junior, C. A. F. da Rocha, B. S. Chang, D. Le Ruyet

    Abstract: This work proposes a new precoded filter bank (FB) system via a two-dimensional (2D) fast Fourier transform (2D-FFT). Its structure is similar to Orthogonal Time Frequency Space (OTFS) systems, where the OFDM transmitter is changed to a filter bank multi-carrier (FBMC) one, thus obtaining a lower out-of-band emission. The complex orthogonality of the FBMC transmission is guaranteed by using precod… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

  14. arXiv:2203.16683  [pdf, other

    astro-ph.SR cs.LG

    Active Learning for Computationally Efficient Distribution of Binary Evolution Simulations

    Authors: Kyle Akira Rocha, Jeff J. Andrews, Christopher P. L. Berry, Zoheyr Doctor, Aggelos K. Katsaggelos, Juan Gabriel Serra Pérez, Pablo Marchant, Vicky Kalogera, Scott Coughlin, Simone S. Bavera, Aaron Dotter, Tassos Fragos, Konstantinos Kovlakas, Devina Misra, Zepei Xing, Emmanouil Zapartas

    Abstract: Binary stars undergo a variety of interactions and evolutionary phases, critical for predicting and explaining observed properties. Binary population synthesis with full stellar-structure and evolution simulations are computationally expensive requiring a large number of mass-transfer sequences. The recently developed binary population synthesis code POSYDON incorporates grids of MESA binary star… ▽ More

    Submitted 16 September, 2022; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: 21 pages, 10 figures, ApJ in press

    Journal ref: Astrophysical Journal; 938(1):64(15); 2022

  15. arXiv:2203.16648  [pdf, other

    cs.LG astro-ph.IM physics.pop-ph

    Predicting Winners of the Reality TV Dating Show $\textit{The Bachelor}$ Using Machine Learning Algorithms

    Authors: Abigail J. Lee, Grace E. Chesmore, Kyle A. Rocha, Amanda Farah, Maryum Sayeed, Justin Myles

    Abstract: $\textit{The Bachelor}… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 6 Pages, 5 Figures. Submitted to Acta Prima Aprila. Code used in this work available at http://github.com/chesmore/bach-stats/

  16. Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution

    Authors: Gabriel Bertocco, Antônio Theophilo, Fernanda Andaló, Anderson Rocha

    Abstract: Learning from fully-unlabeled data is challenging in Multimedia Forensics problems, such as Person Re-Identification and Text Authorship Attribution. Recent self-supervised learning methods have shown to be effective when dealing with fully-unlabeled data in cases where the underlying classes have significant semantic differences, as intra-class distances are substantially lower than inter-class d… ▽ More

    Submitted 30 June, 2023; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: This work has been accepted for publication in the IEEE Transactions on Information Forensics and Security

  17. Forensic Analysis of Synthetically Generated Western Blot Images

    Authors: Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp

    Abstract: The widespread diffusion of synthetically generated content is a serious threat that needs urgent countermeasures. As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images. In this paper, we fo… ▽ More

    Submitted 1 June, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

  18. arXiv:2112.03213  [pdf, other

    cs.CL

    Zero-shot hashtag segmentation for multilingual sentiment analysis

    Authors: Ruan Chaves Rodrigues, Marcelo Akira Inuzuka, Juliana Resplande Sant'Anna Gomes, Acquila Santos Rocha, Iacer Calixto, Hugo Alexandre Dantas do Nascimento

    Abstract: Hashtag segmentation, also known as hashtag decomposition, is a common step in preprocessing pipelines for social media datasets. It usually precedes tasks such as sentiment analysis and hate speech detection. For sentiment analysis in medium to low-resourced languages, previous research has demonstrated that a multilingual approach that resorts to machine translation can be competitive or superio… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: 12 pages, 5 figures, 5 tables

    ACM Class: I.2.7

  19. arXiv:2111.15044  [pdf, other

    cs.HC

    A multi-sensor human gait dataset captured through an optical system and inertial measurement units

    Authors: Geise Santos, Marcelo Wanderley, Tiago Tavares, Anderson Rocha

    Abstract: Different technologies can acquire data for gait analysis, such as optical systems and inertial measurement units (IMUs). Each technology has its drawbacks and advantages, fitting best to particular applications. The presented multi-sensor human gait dataset comprises synchronized inertial and optical motion data from 25 subjects free of lower-limb injuries, aged between 18 and 47 years. A smartph… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  20. arXiv:2110.05369  [pdf, other

    cs.CL cs.LG

    Explainable Fact-checking through Question Answering

    Authors: **g Yang, Didier Vega-Oliveros, Taís Seibt, Anderson Rocha

    Abstract: Misleading or false information has been creating chaos in some places around the world. To mitigate this issue, many researchers have proposed automated fact-checking methods to fight the spread of fake news. However, most methods cannot explain the reasoning behind their decisions, failing to build trust between machines and humans using such technology. Trust is essential for fact-checking to b… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: 5 pages, 3 figures, 2 tables. Submitted to the 2022 International Conference on Acoustics, Speech, & Signal Processing (ICASSP)

  21. arXiv:2109.10992  [pdf, other

    cs.CL

    Scalable Fact-checking with Human-in-the-Loop

    Authors: **g Yang, Didier Vega-Oliveros, Tais Seibt, Anderson Rocha

    Abstract: Researchers have been investigating automated solutions for fact-checking in a variety of fronts. However, current approaches often overlook the fact that the amount of information released every day is escalating, and a large amount of them overlap. Intending to accelerate fact-checking, we bridge this gap by grou** similar messages and summarizing them into aggregated claims. Specifically, we… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: Accepted in IEEE International Workshop on Information Forensics and Security - WIFS 2021, Montpellier, France

  22. arXiv:2109.08446  [pdf, ps, other

    cs.NI cs.PF

    Heterogeneous download times in bandwidth-homogeneous BitTorrent swarms

    Authors: Fabricio Murai, Antonio A. de A. Rocha, Daniel R. Figueiredo, Edmundo A. de Souza e Silva

    Abstract: Modeling and understanding BitTorrent (BT) dynamics is a recurrent research topic mainly due to its high complexity and tremendous practical efficiency. Over the years, different models have uncovered various phenomena exhibited by the system, many of which have direct impact on its performance. In this paper we identify and characterize a phenomenon that has not been previously observed: homogene… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: Published in Computer Networks. arXiv admin note: substantial text overlap with arXiv:1102.3610

    ACM Class: C.4; I.6

  23. arXiv:2107.05821  [pdf, other

    cs.CV

    Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-level Telltales

    Authors: Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong

    Abstract: The technological advancements of deep learning have enabled sophisticated face manipulation schemes, raising severe trust issues and security concerns in modern society. Generally speaking, detecting manipulated faces and locating the potentially altered regions are challenging tasks. Herein, we propose a conceptually simple but effective method to efficiently detect forged faces in an image whil… ▽ More

    Submitted 6 April, 2022; v1 submitted 12 July, 2021; originally announced July 2021.

    Comments: 12 pages, 10 figures

  24. arXiv:2105.12872  [pdf, other

    cs.CV

    Benchmarking Scientific Image Forgery Detectors

    Authors: João P. Cardenuto, Anderson Rocha

    Abstract: The scientific image integrity area presents a challenging research bottleneck, the lack of available datasets to design and evaluate forensic techniques. Its data sensitivity creates a legal hurdle that prevents one to rely on real tampered cases to build any sort of accessible forensic benchmark. To mitigate this bottleneck, we present an extendable open-source library that reproduces the most c… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

  25. arXiv:2103.11520  [pdf, other

    cs.CV cs.AI

    Unsupervised and self-adaptative techniques for cross-domain person re-identification

    Authors: Gabriel Bertocco, Fernanda Andaló, Anderson Rocha

    Abstract: Person Re-Identification (ReID) across non-overlap** cameras is a challenging task and, for this reason, most works in the prior art rely on supervised feature learning from a labeled dataset to match the same person in different views. However, it demands the time-consuming task of labeling the acquired data, prohibiting its fast deployment, specially in forensic scenarios. Unsupervised Domain… ▽ More

    Submitted 7 February, 2022; v1 submitted 21 March, 2021; originally announced March 2021.

    Comments: Published on IEEE Transactions on Information Forensics and Security

  26. Content-Aware Detection of Temporal Metadata Manipulation

    Authors: Rafael Padilha, Tawfiq Salem, Scott Workman, Fernanda A. Andaló, Anderson Rocha, Nathan Jacobs

    Abstract: Most pictures shared online are accompanied by temporal metadata (i.e., the day and time they were taken), which makes it possible to associate an image content with real-world events. Maliciously manipulating this metadata can convey a distorted version of reality. In this work, we present the emerging problem of detecting timestamp manipulation. We propose an end-to-end approach to verify whethe… ▽ More

    Submitted 11 March, 2022; v1 submitted 8 March, 2021; originally announced March 2021.

    Journal ref: IEEE Transactions on Information Forensics and Security 2022

  27. arXiv:2010.14558  [pdf, other

    cs.SI

    Characterizing Human Mobility Patterns During COVID-19 using Cellular Network Data

    Authors: Necati A. Ayan, Nilson L. Damasceno, Sushil Chaskar, Peron R. de Sousa, Arti Ramesh, Anand Seetharam, Antonio A. de A. Rocha

    Abstract: In this paper, our goal is to analyze and compare cellular network usage data from pre-lockdown, during lockdown, and post-lockdown phases surrounding the COVID-19 pandemic to understand and model human mobility patterns during the pandemic, and evaluate the effect of lockdowns on mobility. To this end, we collaborate with one of the main cellular network providers in Brazil, and collect and analy… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 12 pages

  28. arXiv:2005.00355  [pdf, other

    cs.CV

    Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?

    Authors: Bahram Lavi, Ihsan Ullah, Mehdi Fatan, Anderson Rocha

    Abstract: Intelligent video-surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators. Person re-identification (PReID) is one of the most critical problems in IVS, and it consists of recognizing whether or not an individual has already been observed over a camera in a network. Soluti… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

    Comments: 24 pages, 6 figures, and 2 tables, considered over than 100 papers. arXiv admin note: substantial text overlap with arXiv:1807.05284

  29. arXiv:2001.04547  [pdf, other

    cs.CV

    Learning Transformation-Aware Embeddings for Image Forensics

    Authors: Aparna Bharati, Daniel Moreira, Patrick Flynn, Anderson Rocha, Kevin Bowyer, Walter Scheirer

    Abstract: A dramatic rise in the flow of manipulated image content on the Internet has led to an aggressive response from the media forensics research community. New efforts have incorporated increased usage of techniques from computer vision and machine learning to detect and profile the space of image manipulations. This paper addresses Image Provenance Analysis, which aims at discovering relationships am… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: Supplemental material for this paper is available at https://drive.google.com/file/d/1covDhaTN24zkmyQf1XCTZHNrUZdZqGyo/view?usp=sharing

  30. arXiv:1904.08497  [pdf, other

    cs.CV cs.LG stat.ML

    An In-Depth Study on Open-Set Camera Model Identification

    Authors: Pedro Ribeiro Mendes Júnior, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Anderson Rocha

    Abstract: Camera model identification refers to the problem of linking a picture to the camera model used to shoot it. As this might be an enabling factor in different forensic applications to single out possible suspects (e.g., detecting the author of child abuse or terrorist propaganda material), many accurate camera model attribution methods have been developed in the literature. One of their main drawba… ▽ More

    Submitted 13 November, 2019; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: Published through IEEE Access journal

  31. arXiv:1903.10019  [pdf, other

    cs.CV

    Dynamic Spatial Verification for Large-Scale Object-Level Image Retrieval

    Authors: Joel Brogan, Aparna Bharati, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer

    Abstract: Images from social media can reflect diverse viewpoints, heated arguments, and expressions of creativity, adding new complexity to retrieval tasks. Researchers working onContent-Based Image Retrieval (CBIR) have traditionally tuned their algorithms to match filtered results with user search intent. However, we are now bombarded with composite images of unknown origin, authenticity, and even meanin… ▽ More

    Submitted 2 December, 2019; v1 submitted 24 March, 2019; originally announced March 2019.

  32. arXiv:1903.09174  [pdf, other

    cs.SE

    Bootstrap** Cookbooks for APIs from Crowd Knowledge on Stack Overflow

    Authors: Lucas B. L. Souza, Eduardo C. Campos, Fernanda Madeiral, Klérisson Paixão, Adriano M. Rocha, Marcelo de Almeida Maia

    Abstract: Well established libraries typically have API documentation. However, they frequently lack examples and explanations, possibly making difficult their effective reuse. Stack Overflow is a question-and-answer website oriented to issues related to software development. Despite the increasing adoption of Stack Overflow, the information related to a particular topic (e.g., an API) is spread across the… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

    Comments: Accepted at Information and Software Technology - Journal - Elsevier. 16 pages

  33. arXiv:1902.02845  [pdf, other

    cs.CV

    FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning

    Authors: Rodrigo Bresan, Allan Pinto, Anderson Rocha, Carlos Beluzo, Tiago Carvalho

    Abstract: Nowadays, the adoption of face recognition for biometric authentication systems is usual, mainly because this is one of the most accessible biometric modalities. Techniques that rely on trespassing these kind of systems by using a forged biometric sample, such as a printed paper or a recorded video of a genuine access, are known as presentation attacks, but may be also referred in the literature a… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: 7 pages, 1 figure, 7 tables

  34. Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection

    Authors: Andrey Kuehlkamp, Allan Pinto, Anderson Rocha, Kevin Bowyer, Adam Czajka

    Abstract: The adoption of large-scale iris recognition systems around the world has brought to light the importance of detecting presentation attack images (textured contact lenses and printouts). This work presents a new approach in iris Presentation Attack Detection (PAD), by exploring combinations of Convolutional Neural Networks (CNNs) and transformed input spaces through binarized statistical image fea… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Comments: IEEE Transactions on Information Forensics and Security (Early Access), 2018

  35. On Finding a First-Order Sentence Consistent with a Sample of Strings

    Authors: Thiago Alves Rocha, Ana Teresa Martins, Francicleber Martins Ferreira

    Abstract: We investigate the following problem: given a sample of classified strings, find a first-order sentence of minimal quantifier rank that is consistent with the sample. We represent strings as successor string structures, that is, finite structures with unary predicates to denote symbols in an alphabet, and a successor relation. We use results of the Ehrenfeucht-Fraïssé game over successor string st… ▽ More

    Submitted 9 September, 2018; originally announced September 2018.

    Comments: In Proceedings GandALF 2018, arXiv:1809.02416

    Journal ref: EPTCS 277, 2018, pp. 220-234

  36. arXiv:1807.03376  [pdf, other

    cs.CV

    Beyond Pixels: Image Provenance Analysis Leveraging Metadata

    Authors: Aparna Bharati, Daniel Moreira, Joel Brogan, Patricia Hale, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer

    Abstract: Creative works, whether paintings or memes, follow unique journeys that result in their final form. Understanding these journeys, a process known as "provenance analysis", provides rich insights into the use, motivation, and authenticity underlying any given work. The application of this type of study to the expanse of unregulated content on the Internet is what we consider in this paper. Provenan… ▽ More

    Submitted 6 March, 2019; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: Supplemental material for this paper can be found at https://drive.google.com/file/d/1Tbs2CQg_VQAc2PdztW5twVaiXD0G12-H/view?usp=sharing

  37. arXiv:1806.07644  [pdf, other

    cs.CV cs.LG stat.ML

    Cross-Domain Deep Face Matching for Real Banking Security Systems

    Authors: Johnatan S. Oliveira, Gustavo B. Souza, Anderson R. Rocha, Flávio E. Deus, Aparecido N. Marana

    Abstract: Ensuring the security of transactions is currently one of the major challenges that banking systems deal with. The usage of face for biometric authentication of users is attracting large investments from banks worldwide due to its convenience and acceptability by people, especially in cross-domain scenarios, in which facial images from ID documents are compared with digital self-portraits (selfies… ▽ More

    Submitted 10 April, 2020; v1 submitted 20 June, 2018; originally announced June 2018.

  38. arXiv:1802.09406  [pdf, ps, other

    physics.soc-ph cs.GT nlin.CG q-bio.PE

    Environmental Policy Regulation and Corporate Compliance in a Spatial Evolutionary Game Model

    Authors: Gabriel Meyer Salomão, André Barreira da Silva Rocha

    Abstract: We use an evolutionary game model to study the interplay between corporate environmental compliance and enforcement promoted by the policy maker in a country facing a pollution trap, i.e., a scenario in which the vast majority of firms do not internalize their pollution negative externality and auditors do not inspect firms. The game conflict is due to the trade-off in which firms are better-off w… ▽ More

    Submitted 26 February, 2018; originally announced February 2018.

    Comments: 14 pages, 8 figures

  39. arXiv:1801.06510  [pdf, other

    cs.CV cs.IR

    Image Provenance Analysis at Scale

    Authors: Daniel Moreira, Aparna Bharati, Joel Brogan, Allan Pinto, Michael Parowski, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer

    Abstract: Prior art has shown it is possible to estimate, through image processing and computer vision techniques, the types and parameters of transformations that have been applied to the content of individual images to obtain new images. Given a large corpus of images and a query image, an interesting further step is to retrieve the set of original images whose content is present in the query image, as we… ▽ More

    Submitted 23 January, 2018; v1 submitted 19 January, 2018; originally announced January 2018.

    Comments: 13 pages, 6 figures

  40. arXiv:1712.00789  [pdf

    physics.med-ph cs.NE eess.IV

    Reconstruction of Electrical Impedance Tomography Using Fish School Search, Non-Blind Search, and Genetic Algorithm

    Authors: Valter Augusto de Freitas Barbosa, Reiga Ramalho Ribeiro, Allan Rivalles Souza Feitosa, Victor Luiz Bezerra Araújo da Silva, Arthur Diego Dias Rocha, Rafaela Covello de Freitas, Ricardo Emmanuel de Souza, Wellington Pinheiro dos Santos

    Abstract: Electrical Impedance Tomography (EIT) is a noninvasive imaging technique that does not use ionizing radiation, with application both in environmental sciences and in health. Image reconstruction is performed by solving an inverse problem and ill-posed. Evolutionary Computation and Swarm Intelligence have become a source of methods for solving inverse problems. Fish School Search (FSS) is a promisi… ▽ More

    Submitted 3 December, 2017; originally announced December 2017.

    Journal ref: International Journal of Swarm Intelligence Research, Volume 8, Issue 2, 2017

  41. arXiv:1708.06877  [pdf, ps, other

    cs.IT cs.AI

    The Reachability of Computer Programs

    Authors: Reginaldo I. Silva Filho, Ricardo L. Azevedo da Rocha, Camila Leite Silva, Ricardo H. Gracini Guiraldelli

    Abstract: Would it be possible to explain the emergence of new computational ideas using the computation itself? Would it be feasible to describe the discovery process of new algorithmic solutions using only mathematics? This study is the first effort to analyze the nature of such inquiry from the viewpoint of effort to find a new algorithmic solution to a given problem. We define program reachability as a… ▽ More

    Submitted 22 August, 2017; originally announced August 2017.

    ACM Class: E.4

  42. arXiv:1706.00447  [pdf, other

    cs.IR cs.CV cs.MM

    Provenance Filtering for Multimedia Phylogeny

    Authors: Allan Pinto, Daniel Moreira, Aparna Bharati, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

    Abstract: Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time. One of its integral pieces is provenance filtering, which consists of searching a potentially large pool of objects for the most related ones with respect to a given query, in te… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

    Comments: 5 pages, Accepted in IEEE International Conference on Image Processing (ICIP), 2017

  43. arXiv:1705.11187  [pdf, other

    cs.CV

    U-Phylogeny: Undirected Provenance Graph Construction in the Wild

    Authors: Aparna Bharati, Daniel Moreira, Allan Pinto, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

    Abstract: Deriving relationships between images and tracing back their history of modifications are at the core of Multimedia Phylogeny solutions, which aim to combat misinformation through doctored visual media. Nonetheless, most recent image phylogeny solutions cannot properly address cases of forged composite images with multiple donors, an area known as multiple parenting phylogeny (MPP). This paper pre… ▽ More

    Submitted 31 May, 2017; originally announced May 2017.

    Comments: 5 pages, Accepted in International Conference on Image Processing, 2017

  44. arXiv:1705.00604  [pdf, other

    cs.CV cs.IR

    Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization

    Authors: Joel Brogan, Paolo Bestagini, Aparna Bharati, Allan Pinto, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer

    Abstract: As image tampering becomes ever more sophisticated and commonplace, the need for image forensics algorithms that can accurately and quickly detect forgeries grows. In this paper, we revisit the ideas of image querying and retrieval to provide clues to better localize forgeries. We propose a method to perform large-scale image forensics on the order of one million images using the help of an image… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 5 pages, 5 figures

  45. arXiv:1611.05755  [pdf, other

    cs.CV

    Cross-Domain Face Verification: Matching ID Document and Self-Portrait Photographs

    Authors: Guilherme Folego, Marcus A. Angeloni, José Augusto Stuchi, Alan Godoy, Anderson Rocha

    Abstract: Cross-domain biometrics has been emerging as a new necessity, which poses several additional challenges, including harsh illumination changes, noise, pose variation, among others. In this paper, we explore approaches to cross-domain face verification, comparing self-portrait photographs ("selfies") to ID documents. We approach the problem with proper image photometric adjustment and data standardi… ▽ More

    Submitted 17 November, 2016; originally announced November 2016.

    Comments: XII WORKSHOP DE VISÃO COMPUTACIONAL (Campo Grande, Brazil). In XII Workshop de Visão Computacional (pp. 311-316) (2016)

  46. Open-Set Support Vector Machines

    Authors: Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha

    Abstract: Often, when dealing with real-world recognition problems, we do not need, and often cannot have, knowledge of the entire set of possible classes that might appear during operational testing. In such cases, we need to think of robust classification methods able to deal with the "unknown" and properly reject samples belonging to classes never seen during training. Notwithstanding, existing classifie… ▽ More

    Submitted 21 February, 2022; v1 submitted 12 June, 2016; originally announced June 2016.

    Comments: Version accepted for publication in IEEE Transactions on Systems, Man, and Cybernetics: Systems

  47. JADE, TraSMAPI and SUMO: A tool-chain for simulating traffic light control

    Authors: Tiago Azevedo, Paulo J. M. de Araújo, Rosaldo J. F. Rossetti, Ana Paula C. Rocha

    Abstract: Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contri… ▽ More

    Submitted 29 January, 2016; originally announced January 2016.

    Journal ref: Proceedings of the 8th International Workshop on Agents in Traffic and Transportation, ATT'14, held at the Thirteenth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS'14 (2014) 8-15

  48. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

    Authors: David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, Anderson Rocha

    Abstract: Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or "spoofed") and, despite the recent advances in spoofing detection, current solutions often rely on domain knowledge, specific biometric reading systems, and attack types. We assume a very limited… ▽ More

    Submitted 29 January, 2015; v1 submitted 8 October, 2014; originally announced October 2014.

    Comments: Pre-print of article that will appear in the IEEE Transactions on Information Forenseics and Security (T.IFS), Special Issue on Biometric Spoofing and Countermeasures, vol 10, n. 4, April 2015

  49. arXiv:1209.5651  [pdf, other

    cs.NI

    Pros & Cons of Model-based Bandwidth Control for Client-assisted Content Delivery

    Authors: Abhigyan Sharma, Arun Venkataramani, Antonio A. Rocha

    Abstract: A key challenge in \cacd\ is determining how to allocate limited server bandwidth across a large number of files being concurrently served so as to optimize global performance and cost objectives. In this paper, we present a comprehensive experimental evaluation of strategies to control server bandwidth allocation. As part of this effort, we introduce a new {\em model-based} control approach that… ▽ More

    Submitted 25 September, 2012; originally announced September 2012.

    Comments: 9 pages, 9 figures

  50. arXiv:1102.3610  [pdf, ps, other

    cs.NI

    Heterogeneous download times in a homogeneous BitTorrent swarm

    Authors: Fabricio Murai, Antonio A de A Rocha, Daniel R. Figueiredo, Edmundo de Souza e Silva

    Abstract: Modeling and understanding BitTorrent (BT) dynamics is a recurrent research topic mainly due to its high complexity and tremendous practical efficiency. Over the years, different models have uncovered various phenomena exhibited by the system, many of which have direct impact on its performance. In this paper we identify and characterize a phenomenon that has not been previously observed: homogene… ▽ More

    Submitted 18 February, 2011; v1 submitted 17 February, 2011; originally announced February 2011.

    ACM Class: C.2.2; I.6.3; I.6.4