Mitigating dataset harms requires stewardship: Lessons from 1000 papers

K Peng, A Mathur, A Narayanan - arxiv preprint arxiv:2108.02922, 2021 - arxiv.org
Machine learning datasets have elicited concerns about privacy, bias, and unethical
applications, leading to the retraction of prominent datasets such as DukeMTMC, MS-Celeb …

A new benchmark on american sign language recognition using convolutional neural network

MM Rahman, MS Islam, MH Rahman… - … for Industry 4.0 (STI), 2019 - ieeexplore.ieee.org
The listening or hearing impaired (deaf/dumb) people use a set of signs, called sign
language instead of speech for communication among them. However, it is very challenging …

A fast and accurate system for face detection, identification, and verification

R Ranjan, A Bansal, J Zheng, H Xu… - … and Identity Science, 2019 - ieeexplore.ieee.org
The availability of large annotated datasets and affordable computation power have led to
impressive improvements in the performance of convolutional neural networks (CNNs) on …

Pass: protected attribute suppression system for mitigating bias in face recognition

P Dhar, J Gleason, A Roy… - Proceedings of the …, 2021 - openaccess.thecvf.com
Face recognition networks encode information about sensitive attributes while being trained
for identity classification. Such encoding has two major issues:(a) it makes the face …

Disguised faces in the wild

V Kushwaha, M Singh, R Singh… - Proceedings of the …, 2018 - openaccess.thecvf.com
Existing research in the field of face recognition with variations due to disguises focuses
primarily on images captured in controlled settings. Limited research has been performed on …

An automated and efficient convolutional architecture for disguise-invariant face recognition using noise-based data augmentation and deep transfer learning

MJ Khan, MJ Khan, AM Siddiqui, K Khurshid - The Visual Computer, 2022 - Springer
Face recognition is diversely used in modern biometric and security applications. Most of the
current face recognition techniques show good results in a constrained environment …

Recognizing disguised faces in the wild

M Singh, R Singh, M Vatsa, NK Ratha… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Research in face recognition has seen tremendous growth over the past couple of decades.
Beginning from algorithms capable of performing recognition in constrained environments …

How are attributes expressed in face DCNNs?

P Dhar, A Bansal, CD Castillo… - 2020 15th IEEE …, 2020 - ieeexplore.ieee.org
As deep networks become increasingly accurate at recognizing faces, it is vital to
understand how these networks process faces. While these networks are solely trained to …

Adversarial defenses for object detectors based on gabor convolutional layers

A Amirkhani, MP Karimi - The visual computer, 2022 - Springer
Despite their many advantages and positive features, the deep neural networks are
extremely vulnerable against adversarial attacks. This drawback has substantially reduced …

Masked face recognition with identification association

Q Hong, Z Wang, Z He, N Wang… - 2020 IEEE 32nd …, 2020 - ieeexplore.ieee.org
In the crime scene, criminals often consciously conceal their facial identity through face-
masked disguise, which poses a huge challenge to identity recognition. Existing disguised …