GL

Authored

5 records found

Demo Abstract: Catch My Eye

Gaze-Based Activity Recognition in an Augmented Reality Art Gallery

The personalization of augmented reality (AR) experiences based on environmental and user context is key to unlocking their full potential. The recent addition of eye tracking to AR headsets provides a convenient method for detecting user context, but complex analysis of raw gaze ...

EMGSense

A Low-Effort Self-Supervised Domain Adaptation Framework for EMG Sensing

This paper presents EMGSense, a low-effort self-supervised domain adaptation framework for sensing applications based on Electromyography (EMG). EMGSense addresses one of the fundamental challenges in EMG cross-user sensing—the significant performance degradation caused by time-v ...

PrivGait

An Energy Harvesting-based Privacy-Preserving User Identification System by Gait Analysis

Smart space has emerged as a new paradigm that combines sensing, communication, and artificial intelligence technologies to offer various customized services. A fundamental requirement of these services is person identification. Although a variety of person-identification approac ...

EyeSyn

Psychology-inspired Eye Movement Synthesis for Gaze-based Activity Recognition

Recent advances in eye tracking have given birth to a new genre of gaze-based context sensing applications, ranging from cognitive load estimation to emotion recognition. To achieve state-of-the-art recognition accuracy, a large-scale, labeled eye movement dataset is needed to tr ...

Screen Perturbation

Adversarial Attack and Defense on Under-Screen Camera

Smartphones are moving towards the fullscreen design for better user experience. This trend forces front cameras to be placed under screen, leading to Under-Screen Cameras (USC). Accordingly, a small area of the screen is made translucent to allow light to reach the USC. In this ...

Contributed

15 records found

Performance of outlier detection on smartwatch data in single and multiple person environments

An analysis of the performance of different outlier detection methods on consumer-grade wearable data in environments with single and multiple subjects

Outlier detection is an essential part of modern systems. It is used to detect anomalies in behaviour or performance of systems or subjects, such as fall detection in smartwatches or voltage irregularity detection in batteries. This provides early indications of something of pote ...

Channel Selection for Faster Deep Learning-based Gaze Estimation in the Frequency Domain

A frequency domain approach to reducing latency in deep learning gaze estimation

Gaze estimation is an important area of research used in a wide range of applications. However, existing models trained for gaze estimation often suffer from high computational costs. In this study, frequency domain channel selection techniques were explored to decrease these cos ...

Person identification using heart rate and activity from consumer-grade wearables

How do different types of cardiac diagnosis affect the accuracy of Deep Neural Networks to identify individuals by their heart rate?

Advancements in the precision and accuracy of consumer-grade wearables, such as a Fitbit, have enabled the identification and therefore authentication of individuals based on their emitted heart frequencies using these wrist-worn devices. With this type of authentication, a passw ...

Emotion Recognition in Virtual Reality

Creation and validation of a VR-based multi-modal emotion recognition dataset

Emotion recognition in Virtual Reality(VR) has the potential to offer numerous benefits across various sectors such as mental healthcare, education, marketing, entertainment, etc. Although emotion recognition itself is a mature field, the sub-field of VR-based emotion recognition ...

Imperceptible Backdoor Attacks on Deep Regression Models

Applying a backdoor attack to compromise a gaze estimation model

This research investigates backdoor attacks on deep regression models, focusing on the gaze estimation task. Backdoor triggers can be used to poison a model during training phase to have a hidden misbehaving functionality. For gaze estimation, a backdoored model will return an at ...

Imperceptible Backdoor Attacks on Deep Regression Models

Applying a backdoor attack to compromise a gaze estimation model

This research investigates backdoor attacks on deep regression models, focusing on the gaze estimation task. Backdoor triggers can be used to poison a model during training phase to have a hidden misbehaving functionality. For gaze estimation, a backdoored model will return an at ...

Imperceptible Backdoor Attacks on Deep Regression Models

Applying a backdoor attack to compromise a gaze estimation model

This research investigates backdoor attacks on deep regression models, focusing on the gaze estimation task. Backdoor triggers can be used to poison a model during training phase to have a hidden misbehaving functionality. For gaze estimation, a backdoored model will return an at ...

Imperceptible Backdoor Attacks for Deep Regression Models

Adapting the SIG Backdoor Attack to the Head Pose Estimation Task

With the rise of deep learning and the widespread use of deep neural networks, backdoor attacks have become a significant security threat, drawing considerable research interest. One such attack is the SIG backdoor attack, which introduces signals to the images. We look into thre ...

Imperceptible Backdoor Attacks on Deep Regression Using the WaNet Method

Using Warping-Based Poisoned Networks to Covertly Compromise a Deep Regression Model

Deep Regression Models (DRMs) are a subset of deep learning models that output continuous values. Due to their performance, DRMs are widely used as critical components in various systems. As training a DRM is resource-intensive, many rely on pre-trained third-party models, which ...

Unsupervised optical flow estimation of event cameras

The influence of training sets on model performance

Event cameras are cameras that capture events asynchronously based on changes in lighting. They offer multiple benifits, but pose challenges in computer vision due to their asynchronous nature and hard to capture ground truth values to compare against. This paper shows the effect ...

Optical Flow Estimation Using Event-Based Cameras

Improving Optical Flow Estimation Accuracy Using Space-Aware De-Flickering

Event cameras are novel sensors whose high temporal resolution and bandwidth motivate their use for the optical flow estimation problem. However, the properties of event cameras also introduce a vulnerability to flickering. Flickering hurts the perceptibility of motion by overwhe ...

Optical Flow Estimation Using Event-Based Cameras

Improving Optical Flow Estimation Accuracy Using Space-Aware De-Flickering

Event cameras are novel sensors whose high temporal resolution and bandwidth motivate their use for the optical flow estimation problem. However, the properties of event cameras also introduce a vulnerability to flickering. Flickering hurts the perceptibility of motion by overwhe ...

Black-box Adversarial Attacks using Substitute models

Effects of Data Distributions on Sample Transferability

This study aims to provide insights in applying different data augmentation techniques to the input data of a convolutional neural network that estimates gaze. Gaze is used in numerous research domains for understanding and predicting emotions and actions from humans. Data augmen ...
Model extraction attacks are attacks which generate a substitute model of a targeted victim neural network. It is possible to perform these attacks without a preexisting dataset, but doing so requires a very high number of queries to be sent to the victim model. This is otfen in ...