Wael AbdAlmageed

ORCID: 0000-0002-8320-8530
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Face recognition and analysis
  • Adversarial Robustness in Machine Learning
  • Generative Adversarial Networks and Image Synthesis
  • Domain Adaptation and Few-Shot Learning
  • Biometric Identification and Security
  • Face and Expression Recognition
  • Anomaly Detection Techniques and Applications
  • Advanced Image and Video Retrieval Techniques
  • Human Pose and Action Recognition
  • Cell Image Analysis Techniques
  • Image Retrieval and Classification Techniques
  • Handwritten Text Recognition Techniques
  • Multimodal Machine Learning Applications
  • Advanced Neural Network Applications
  • Image Processing Techniques and Applications
  • AI in cancer detection
  • Video Surveillance and Tracking Methods
  • Advanced Vision and Imaging
  • Forensic Fingerprint Detection Methods
  • Topic Modeling
  • Vehicle License Plate Recognition
  • Misinformation and Its Impacts
  • Advanced Malware Detection Techniques
  • Neural Networks and Applications

Clemson University
2024-2025

Marina Del Rey Hospital
2021-2024

University of Southern California
2015-2022

LAC+USC Medical Center
2022

Southern California University for Professional Studies
2019-2021

Loyola Marymount University
2018

Norwegian University of Science and Technology
2018

National University of Singapore
2018

University of Maryland, College Park
2005-2014

EarthTech International (United States)
2008

To fight against real-life image forgery, which commonly involves different types and combined manipulations, we propose a unified deep neural architecture called ManTraNet. Unlike many existing solutions, ManTra-Net is an end-to-end network that performs both detection localization without extra preprocessing postprocessing. fully convolutional handles images of arbitrary sizes known forgery such splicing, copy-move, removal, enhancement, even unknown types. This paper has three salient...

10.1109/cvpr.2019.00977 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

The spread of misinformation through synthetically generated yet realistic images and videos has become a significant problem, calling for robust manipulation detection methods. Despite the predominant effort detecting face in still images, less attention been paid to identification tampered faces by taking advantage temporal information present stream. Recurrent convolutional models are class deep learning which have proven effective at exploiting from image streams across domains. We...

10.48550/arxiv.1905.00582 preprint EN other-oa arXiv (Cornell University) 2019-01-01

We introduce our method and system for face recognition using multiple pose-aware deep learning models. In representation, a image is processed by several pose-specific convolutional neural network (CNN) models to generate features. 3D rendering used poses from the input image. Sensitivity of pose variations reduced since we use an ensemble CNN The paper presents extensive experimental results on effect landmark detection, layer selection model performance pipeline. Our novel representation...

10.1109/wacv.2016.7477555 article EN 2016-03-01

We propose a method designed to push the frontiers of unconstrained face recognition in wild with an emphasis on extreme out-of-plane pose variations. Existing methods either expect single model learn invariance by training massive amounts data or else normalize images aligning faces frontal pose. Contrary these, our is explicitly tackle Our proposed Pose-Aware Models (PAM) process image using several pose-specific, deep convolutional neural networks (CNN). 3D rendering used synthesize...

10.1109/tpami.2018.2792452 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2018-01-12

In this paper, for the first time, we introduce a new end-to-end deep neural network predicting forgery masks to image copy-move detection problem. Specifically, use convolutional extract block-like features from an image, compute self-correlations between different blocks, pointwise feature extractor locate matching points, and reconstruct mask through deconvolutional network. Unlike classic solutions requiring multiple stages of training parameter tuning, ranging extraction postprocessing,...

10.1109/wacv.2018.00211 article EN 2018-03-01

Image splicing is a very common image manipulation technique that sometimes used for malicious purposes. A detection and localization algorithm usually takes an input produces binary decision indicating whether the has been manipulated, also segmentation mask corresponds to spliced region. Most existing pipelines suffer from two main shortcomings: 1) they use handcrafted features are not robust against subsequent processing (e.g., compression), 2) each stage of pipeline optimized...

10.1145/3123266.3123411 article EN Proceedings of the 30th ACM International Conference on Multimedia 2017-10-19

Recently, generative adversarial networks and autoencoders have gained a lot of attention in machine learning community due to their exceptional performance tasks such as digit classification face recognition.They map the autoencoder's bottleneck layer output (termed code vectors) different noise Probability Distribution Functions (PDFs), that can be further regularized cluster based on class information.In addition, they also allow generation synthetic samples by sampling vectors from...

10.21437/interspeech.2017-1421 article EN Interspeech 2022 2017-08-16

Finding a template in search image is one of the core problems many computer vision applications, such as matching, semantic alignment, image-to-GPS verification \etc. In this paper, we propose novel quality-aware matching method, which not only used standalone algorithm, but also trainable layer that can be easily plugged any deep neural network. Specifically, assess quality pair its soft-ranking among all pairs, and thus different scenarios like 1-to-1, 1-to-many, many-to-many will...

10.1109/cvpr.2019.01182 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019-06-01

Few-shot Learning has been studied to mimic human visual capabilities and learn effective models without the need of exhaustive annotation. Even though idea meta-learning for adaptation dominated few-shot learning methods, how train a feature extractor is still challenge. In this paper, we focus on design training strategy obtain an elemental representation such that prototype each novel class can be estimated from few labeled samples. We propose two-stage scheme, Partner-Assisted (PAL),...

10.1109/iccv48922.2021.01040 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

The vulnerability of biometric identification systems to presentation attacks, also a.k.a. spoof has received great attention from the biometrics community. Face attacks are particularly easy fabricate, because face image and videos obtain social media, most recognition rely on 2D RGB sensors only. To our best knowledge, all existing Presentation Attack Detection (PAD) research works focus solving problem in a close-set setup, even though it is an open-set real life where Unknown (UPAD)...

10.1109/btas.2018.8698574 article EN 2018-10-01

Unlike conventional zero-shot classification, semantic segmentation predicts a class label at the pixel level instead of image level. When solving problems, need for pixel-level prediction with surrounding context motivates us to incorporate spatial information using positional encoding. We improve standard encoding by introducing concept Relative Positional Encoding, which integrates feature and can handle arbitrary sizes. Furthermore, while self-training is widely used in generate...

10.1109/iccv48922.2021.00942 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

In this paper, we present a novel algorithm for simultaneously detecting shot boundaries and extracting key frames from video sequences or streams in real-time. Multivariate feature vectors are extracted the arranged matrix. Singular value decomposition is then used to factorize matrix compute significant singular vectors. The rank of traced using sliding window approach. By tracing computed rank, able determine extract video. Results experiments conducted on soccer videos show that robust...

10.1109/icip.2008.4712476 article EN 2008-01-01

In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps - Coarse line estimation using primary components which define the and assignment diacritic are more difficult to associate with given line. We first estimate local orientation at each component build sparse similarity graph. then, use shortest path algorithm compute similarities between non-neighboring components. From graph,...

10.1145/1815330.1815348 article EN 2010-06-09

We propose a novel approach to achieving invariance for deep neural networks in the form of inducing amnesia unwanted factors data through new adversarial forgetting mechanism. show that mechanism serves as an information-bottleneck, which is manipulated by training learn factors. Empirical results proposed framework achieves state-of-the-art performance at learning both nuisance and bias settings on diverse collection datasets tasks.

10.1609/aaai.v34i04.5850 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

Advances in deep learning, combined with availability of large datasets, have led to impressive improvements face presentation attack detection research. However, state-of-the-art antispoofing systems are still vulnerable novel types attacks that never seen during training. Moreover, even if such correctly detected, these lack the ability adapt newly encountered attacks. The post-training continually detecting new and self-adaptation identify types, after initial phase, is highly appealing....

10.1109/iccv48922.2021.01458 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

We introduce a novel capture device that provides two new powerful sensing modalities for fingerprint presentation attack detection (FPAD): multi-spectral short-wave infrared (SWIR) imaging and laser speckle contrast (LSCI). A prototype touchless was developed employing 64×64 indium gallium arsenide (InGaAs) sensor high definition visible light camera. The former capabilities while the latter enables backward compatibility with legacy matching systems. patch-based convolutional neural...

10.1109/wifs.2018.8630773 article EN 2018-12-01

This paper presents an approach to text line extraction in handwritten document images which combines local and global techniques. We propose a graph-based technique detect touching proximity errors that are common with lines. In refinement step, we use Expectation-Maximization (EM) iteratively split the error segments obtain correct text-lines. show improvement accuracies using our correction method on datasets of Arabic images. Results set artificially generated is effective for handling

10.1109/icdar.2011.31 article EN International Conference on Document Analysis and Recognition 2011-09-01

We present a fully trainable solution for binarization of degraded document images using extremely randomized trees. Unlike previous attempts that often use simple features, our method encodes all heuristics about whether or not pixel is foreground text into high-dimensional feature vector and learns more complicated decision function. introduce two novel the Logarithm Intensity Percentile (LIP) Relative Darkness Index (RDI), combine them with low level reformulated features from existing...

10.1109/icip.2016.7533063 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2016-09-01
Coming Soon ...