James Ferryman
YOU?
Author Swipe
Review of Explainable Graph-Based Recommender Systems Open
Explainability of recommender systems has become essential to ensure users’ trust and satisfaction. Various types of explainable recommender systems have been proposed, including explainable graph-based recommender systems. This review art…
Review of Explainable Graph-Based Recommender Systems Open
Explainability of recommender systems has become essential to ensure users' trust and satisfaction. Various types of explainable recommender systems have been proposed including explainable graph-based recommender systems. This review pape…
Skeletal Keypoint-Based Transformer Model for Human Action Recognition in Aerial Videos Open
Several efforts have been made to develop effective and robust vision-based solutions for human action recognition in aerial videos. Generally, the existing methods rely on the extraction of either spatial features (patch-based methods) or…
Explainable Meta-Path Based Recommender Systems Open
Meta-paths have been popularly used to provide explainability in recommendations. Although long/complicated meta-paths could represent complex user-item connectivity, they are not easy to interpret. This work tackles this problem by introd…
Fusion of Heterogenous Sensor Data in Border Surveillance Open
Wide area surveillance has become of critical importance, particularly for border control between countries where vast forested land border areas are to be monitored. In this paper, we address the problem of the automatic detection of acti…
Using Deep Siamese networks for trajectory analysis to extract motion patterns in videos Open
This paper investigates the use of Siamese networks for trajectory similarity analysis in surveillance tasks. Specifically, the proposed approach uses an auto‐encoder as a part of training a discriminative twin (Siamese) network to perform…
Tracking of objects in a multi-sensor fusion system for border surveillance Open
In this work, we present a Fusion and Tracking system developed within the EU project FOLDOUT aimed to facilitate border guards work by fusing separate sensor information and presenting automatic tracking of objects detected in the surveil…
Correction to: FOLDOUT: A Through Foliage Surveillance System for Border Security Open
Chapter 16, “FOLDOUT: A Through Foliage Surveillance System for Border Security” was previously published non-open access. It has now been changed to open access under a CC BY 4.0 license and the copyright holder updated to ‘The Author(s)’…
FOLDOUT project: Towards an enhanced and innovative architecture for border protection Open
The objective of the European Union (EU) in the field of external border protection is to safeguard the freedom of movement within the Schengen area, and to ensure efficient monitoring of people who cross EU's external borders. To achieve …
PROTECT: Pervasive and useR fOcused biomeTrics bordEr projeCT – a case study Open
Pervasive and useR fOcused biomeTrics bordEr projeCT (PROTECT) is an EU project funded by the Horizon 2020 research and Innovation Programme. The main aim of PROTECT was to build an advanced biometric‐based person identification system tha…
PROTECT Multimodal DB: fusion evaluation on a novel multimodal biometrics dataset envisaging Border Control Open
This work presents a novel multimodal database comprising 3D face, 2D face, thermal \nface, visible iris, finger and hand veins, voice and anthropometrics. This dataset will constitute a \nvaluable resource to the field with its number and…
Cross-eyed 2017: Cross-spectral iris/periocular recognition competition Open
This work presents the 2nd Cross-Spectrum Iris/Periocular Recognition Competition (Cross-Eyed2017). The main goal of the competition is to promote and evaluate advances in cross-spectrum iris and periocular recognition. This second edition…
View article: Effective evaluation of privacy protection techniques in visible and thermal imagery
Effective evaluation of privacy protection techniques in visible and thermal imagery Open
Privacy protection may be defined as replacing the original content in an image region with a new (less intrusive) content having modified target appearance information to make it less recognizable by applying a privacy protection techniqu…
The Future Of Video Analytics For Surveillance And Its Ethical Implications Open
The current state of the art and direction of research in computer vision aimed at automating the analysis of CCTV images is presented. This includes low level identification of objects within the field of view of cameras, following those …
A method for performance diagnosis and evaluation of video trackers Open
Several measures for evaluating multi-target video trackers exist that generally aim at providing ‘end performance.’ End performance is important particularly for ranking and comparing trackers. However, for a deeper insight into trackers’…
Quality-based iris segmentation-level fusion Open
Iris localisation and segmentation are challenging and critical tasks in iris biometric recognition. Especially in non-cooperative and less ideal environments, their impact on overall system performance has been identified as a major issue…
Cross-Eyed - Cross-Spectral Iris/Periocular Recognition Database and Competition Open
This work presents a novel dual-spectrum database containing both iris and periocular images synchronously captured from a distance and within a realistic indoor environment. This database was used in the 1st Cross-Spectrum Iris/Periocular…
CHP Toolkit: Case Study of LAIe Sensitivity to Discontinuity of Canopy Cover in Fruit Plantations Open
This paper presents an open-source canopy height profile (CHP) toolkit designed for processing small-footprint full-waveform LiDAR data to obtain the estimates of effective leaf area index (LAIe) and CHPs. The use of the toolkit is present…
A realistic evaluation of iris presentation attack detection Open
Iris liveness detection methods have been developed to overcome the vulnerability of iris biometric systems to spoofing attacks. In the literature, it is typically assumed that a known attack modality will be perpetrated. Then liveness mod…