1 code implementation • 26 Nov 2022 • Ethan Rathbun, Kaleel Mahmood, Sohaib Ahmad, Caiwen Ding, Marten van Dijk
First, how can the low transferability between defenses be utilized in a game theoretic framework to improve the robustness?
no code implementations • 22 Sep 2022 • Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood
By leveraging the output of multiple models, we are able to conduct model inversion attacks with 1/10th the training set size of Ahmad and Fuller (IJCB 2020) for iris data and 1/1000th the training set size of Mai et al. (Pattern Analysis and Machine Intelligence 2019) for facial data.
1 code implementation • 31 Jul 2020 • Sohaib Ahmad, Christopher Geiger, Benjamin Fuller
That is, we show how to transform templates into realistic looking iris images that are also deemed as the same iris by the corresponding recognition system.
1 code implementation • 13 Jul 2019 • Sohaib Ahmad, Benjamin Fuller
We observe equal error rates of 1. 32%, 9. 20%, and 0. 59% on the ND-0405, UbirisV2, and IITD datasets respectively.
no code implementations • 19 Dec 2018 • Sohaib Ahmad, Benjamin Fuller
A small amount of retraining of the visible light model (using a few samples from a near-infrared dataset) yields a tuned network accurate in both settings.