Arun Ross
YOU?
Author Swipe
View article: Impact of Phonetics on Speaker Identity in Adversarial Voice Attack
Impact of Phonetics on Speaker Identity in Adversarial Voice Attack Open
Adversarial perturbations in speech pose a serious threat to automatic speech recognition (ASR) and speaker verification by introducing subtle waveform modifications that remain imperceptible to humans but can significantly alter system ou…
View article: Automated Assessment of Aesthetic Outcomes in Facial Plastic Surgery
Automated Assessment of Aesthetic Outcomes in Facial Plastic Surgery Open
We introduce a scalable, interpretable computer-vision framework for quantifying aesthetic outcomes of facial plastic surgery using frontal photographs. Our pipeline leverages automated landmark detection, geometric facial symmetry computa…
View article: Facial Demorphing from a Single Morph Using a Latent Conditional GAN
Facial Demorphing from a Single Morph Using a Latent Conditional GAN Open
A morph is created by combining two (or more) face images from two (or more) identities to create a composite image that is highly similar to all constituent identities, allowing the forged morph to be biometrically associated with more th…
View article: diffDemorph: Extending Reference-Free Demorphing to Unseen Faces
diffDemorph: Extending Reference-Free Demorphing to Unseen Faces Open
A face morph is created by combining two face images corresponding to two identities to produce a composite that successfully matches both the constituent identities. Reference-free (RF) demorphing reverses this process using only the morp…
View article: Shielding Latent Face Representations From Privacy Attacks
Shielding Latent Face Representations From Privacy Attacks Open
In today's data-driven analytics landscape, deep learning has become a powerful tool, with latent representations, known as embeddings, playing a central role in several applications. In the face analytics domain, such embeddings are commo…
View article: Person Recognition at Altitude and Range: Fusion of Face, Body Shape and Gait
Person Recognition at Altitude and Range: Fusion of Face, Body Shape and Gait Open
We address the problem of whole-body person recognition in unconstrained environments. This problem arises in surveillance scenarios such as those in the IARPA Biometric Recognition and Identification at Altitude and Range (BRIAR) program,…
View article: Face Deepfakes -- A Comprehensive Review
Face Deepfakes -- A Comprehensive Review Open
In recent years, remarkable advancements in deep-fake generation technology have led to unprecedented leaps in its realism and capabilities. Despite these advances, we observe a notable lack of structured and deep analysis deepfake technol…
View article: Metric for Evaluating Performance of Reference-Free Demorphing Methods
Metric for Evaluating Performance of Reference-Free Demorphing Methods Open
A facial morph is an image created by combining two (or more) face images pertaining to two (or more) distinct identities. Reference-free face demorphing inverts the process and tries to recover the face images constituting a facial morph …
View article: Person Recognition in Aerial Surveillance: A Decade Survey
Person Recognition in Aerial Surveillance: A Decade Survey Open
The rapid emergence of airborne platforms and imaging sensors is enabling new forms of aerial surveillance due to their unprecedented advantages in scale, mobility, deployment, and covert observation capabilities. This paper provides a com…
View article: Automatic Comparative Chest Radiography Using Deep Neural Networks
Automatic Comparative Chest Radiography Using Deep Neural Networks Open
Comparative medical radiography is a scientific identification method that involves directly comparing antemortem (AM) radiographs (e.g., X-rays) to postmortem (PM) radiographs taken of a deceased individual. Forensic anthropologists use c…
View article: Post-GWAS Prioritization of Genome–Phenome Association in Sorghum
Post-GWAS Prioritization of Genome–Phenome Association in Sorghum Open
Genome-wide association studies (GWAS) are widely used to infer the genetic basis of traits in organisms; however, selecting appropriate thresholds for analysis remains a significant challenge. In this study, we introduce the Sequential SN…
View article: Post-GWAS Prioritization of Genome–Phenome Association in Sorghum
Post-GWAS Prioritization of Genome–Phenome Association in Sorghum Open
Genome-wide association studies (GWAS) are widely used to infer the genetic basis of traits in organisms; however, selecting appropriate thresholds for analysis remains a significant challenge. In this study, we introduce the Sequential SN…
View article: dc-GAN: Dual-Conditioned GAN for Face Demorphing From a Single Morph
dc-GAN: Dual-Conditioned GAN for Face Demorphing From a Single Morph Open
A facial morph is an image strategically created by combining two face images pertaining to two distinct identities. The goal is to create a face image that can be matched to two different identities by a face matcher. Face demorphing inve…
View article: Detecting Near-Duplicate Face Images
Detecting Near-Duplicate Face Images Open
Near-duplicate images are often generated when applying repeated photometric and geometric transformations that produce imperceptible variants of the original image. Consequently, a deluge of near-duplicates can be circulated online posing…
View article: Periocular Biometrics: A Modality for Unconstrained Scenarios
Periocular Biometrics: A Modality for Unconstrained Scenarios Open
This article discusses the state of the art in periocular biometrics, presenting an overall framework encompassing the field's most significant research aspects, which include ocular definition, acquisition, and detection; identity recogni…
View article: Synthesizing Iris Images using Generative Adversarial Networks: Survey and Comparative Analysis
Synthesizing Iris Images using Generative Adversarial Networks: Survey and Comparative Analysis Open
Biometric systems based on iris recognition are currently being used in border control applications and mobile devices. However, research in iris recognition is stymied by various factors such as limited datasets of bonafide irides and pre…
View article: Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption
Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption Open
Modern face recognition systems utilize deep neural networks to extract salient features from a face. These features denote embeddings in latent space and are often stored as templates in a face recognition system. These embeddings are sus…
View article: A Linguistic Comparison between Human and ChatGPT-Generated Conversations
A Linguistic Comparison between Human and ChatGPT-Generated Conversations Open
This study explores linguistic differences between human and LLM-generated dialogues, using 19.5K dialogues generated by ChatGPT-3.5 as a companion to the EmpathicDialogues dataset. The research employs Linguistic Inquiry and Word Count (L…
View article: Post-GWAS Prioritization of Genome-Phenome Association in Sorghum
Post-GWAS Prioritization of Genome-Phenome Association in Sorghum Open
Genome-Wide Association Studies (GWAS) are widely used to infer the genetic basis of traits in organisms, yet selecting appropriate thresholds for analysis remains a significant challenge. In this study, we developed the Sequential SNP Pri…
View article: Predicting spring phenology in deciduous broadleaf forests: NEON phenology forecasting community challenge
Predicting spring phenology in deciduous broadleaf forests: NEON phenology forecasting community challenge Open
Accurate models are important to predict how global climate change will continue to alter plant phenology and near-term ecological forecasts can be used to iteratively improve models and evaluate predictions that are made a priori. The Eco…
View article: To Impute or Not: Recommendations for Multibiometric Fusion
To Impute or Not: Recommendations for Multibiometric Fusion Open
Combining match scores from different biometric systems via fusion is a well-established approach to improving recognition accuracy. However, missing scores can degrade performance as well as limit the possible fusion techniques that can b…
View article: Investigating Weight-Perturbed Deep Neural Networks With Application in Iris Presentation Attack Detection
Investigating Weight-Perturbed Deep Neural Networks With Application in Iris Presentation Attack Detection Open
Deep neural networks (DNNs) exhibit superior performance in various machine learning tasks, e.g., image classification, speech recognition, biometric recognition, object detection, etc. However, it is essential to analyze their sensitivity…
View article: Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems
Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems Open
A dictionary attack in a biometric system entails the use of a small number of strategically generated images or templates to successfully match with a large number of identities, thereby compromising security. We focus on dictionary attac…
View article: Synthesizing Forestry Images Conditioned on Plant Phenotype Using a Generative Adversarial Network
Synthesizing Forestry Images Conditioned on Plant Phenotype Using a Generative Adversarial Network Open
Plant phenology and phenotype prediction using remote sensing data is increasingly gaining attention in order to enhance agricultural productivity. This work aims to generate synthetic forestry images that satisfy a specific phenotypic att…
View article: Voice Morphing: Two Identities in One Voice
Voice Morphing: Two Identities in One Voice Open
In a biometric system, each biometric sample or template is typically associated with a single identity. However, recent research has demonstrated the possibility of generating "morph" biometric samples that can successfully match more tha…
View article: On the Biometric Capacity of Generative Face Models
On the Biometric Capacity of Generative Face Models Open
There has been tremendous progress in generating realistic faces with high fidelity over the past few years. Despite this progress, a crucial question remains unanswered: "Given a generative face model, how many unique identities can it ge…
View article: Submitted forecasts and analysis code for "Predicting spring phenology in deciduous broadleaf forests: NEON Phenology Forecasting Community Challenge"
Submitted forecasts and analysis code for "Predicting spring phenology in deciduous broadleaf forests: NEON Phenology Forecasting Community Challenge" Open
Submitted forecasts for the 2021 Ecological Forecasting Initiative NEON Phenology Forecast Challenge and the analysis code for the accompanying manuscript.