- Anomaly Detection Techniques and Applications
- Adversarial Robustness in Machine Learning
- Human Pose and Action Recognition
- Generative Adversarial Networks and Image Synthesis
- Analog and Mixed-Signal Circuit Design
- Image and Signal Denoising Methods
- Software System Performance and Reliability
- Speech and Audio Processing
- Hand Gesture Recognition Systems
- Video Surveillance and Tracking Methods
- Neural Networks and Applications
- Explainable Artificial Intelligence (XAI)
- Software Testing and Debugging Techniques
- Software Engineering Research
Soochow University
2024
Data61
2023
Commonwealth Scientific and Industrial Research Organisation
2023
Explainable artificial intelligence (XAI) is a new field within (AI) and machine learning (ML). XAI offers transparency of AI ML that can bridge the gap in information has been absent from "black-box" models. Given its nascency, there are several taxonomies literature. The current paper incorporates literature into one unifying framework, which defines types explanations, transparency, model methods together inform user's processes towards developing trust systems.
Video classification systems are vulnerable to adversarial attacks, which can create severe security problems in video verification. Current black-box attacks need a large number of queries succeed, resulting high computational overhead the process attack. On other hand, with restricted perturbations ineffective against defenses such as denoising or training. In this paper, we focus on unrestricted and propose StyleFool, attack via style transfer fool system. StyleFool first utilizes color...
The right to be forgotten mandates that machine learning models enable the erasure of a data owner's and information from trained model. Removing dataset alone is inadequate, as can memorize training data, increasing potential privacy risk users. To address this, multiple unlearning techniques have been developed deployed. Among them, approximate popular solution, but recent studies report its effectiveness not fully guaranteed. Another approach, exact unlearning, tackles this issue by...
Yawning detection is actively used in multimedia applications such as driver fatigue assessment and status monitoring. However, the accuracy robustness of existing yawning detectors are limited due to variations environments (especially lights), facial expressions, confusion behaviours (e.g., talking eating). This paper introduces a transformer-based method, YawnNet, for accurate by leveraging spatial-temporal encoding local cues. In particular, YawnNet contains data processing stage with...
Face authentication systems have brought significant convenience and advanced developments, yet they become unreliable due to their sensitivity inconspicuous perturbations, such as adversarial attacks. Existing defenses often exhibit weaknesses when facing various attack algorithms adaptive attacks or compromise accuracy for enhanced security. To address these challenges, we developed a novel highly efficient non-deep-learning-based image filter called the Iterative Window Mean Filter (IWMF)...
Coverage-guided Greybox Fuzzing (CGF) is one of the most successful and widely-used techniques for bug hunting. Two major approaches are adopted to optimize CGF: (i) reduce search space inputs by inferring relationships between input bytes path constraints; (ii) formulate fuzzing processes (e.g., transitions) build up probability distributions power schedules, i.e., number generated per seed. However, former subjective inference results which may include extra a constraint, thereby limiting...
Video classification systems are vulnerable to adversarial attacks, which can create severe security problems in video verification. Current black-box attacks need a large number of queries succeed, resulting high computational overhead the process attack. On other hand, with restricted perturbations ineffective against defenses such as denoising or training. In this paper, we focus on unrestricted and propose StyleFool, attack via style transfer fool system. StyleFool first utilizes color...