Alert button
Picture for Jerone T. A. Andrews

Jerone T. A. Andrews

Alert button

A View From Somewhere: Human-Centric Face Representations

Add code
Bookmark button
Alert button
Mar 30, 2023
Jerone T. A. Andrews, Przemyslaw Joniak, Alice Xiang

Figure 1 for A View From Somewhere: Human-Centric Face Representations
Figure 2 for A View From Somewhere: Human-Centric Face Representations
Figure 3 for A View From Somewhere: Human-Centric Face Representations
Figure 4 for A View From Somewhere: Human-Centric Face Representations
Viaarxiv icon

Ethical Considerations for Collecting Human-Centric Image Datasets

Add code
Bookmark button
Alert button
Feb 07, 2023
Jerone T. A. Andrews, Dora Zhao, William Thong, Apostolos Modas, Orestis Papakyriakopoulos, Shruti Nagpal, Alice Xiang

Figure 1 for Ethical Considerations for Collecting Human-Centric Image Datasets
Viaarxiv icon

I call BS: Fraud Detection in Crowdfunding Campaigns

Add code
Bookmark button
Alert button
Jun 30, 2020
Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis

Figure 1 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 2 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 3 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 4 for I call BS: Fraud Detection in Crowdfunding Campaigns
Viaarxiv icon

Camera Model Anonymisation with Augmented cGANs

Add code
Bookmark button
Alert button
Feb 18, 2020
Jerone T. A. Andrews, Yidan Zhang, Lewis D. Griffin

Figure 1 for Camera Model Anonymisation with Augmented cGANs
Figure 2 for Camera Model Anonymisation with Augmented cGANs
Figure 3 for Camera Model Anonymisation with Augmented cGANs
Figure 4 for Camera Model Anonymisation with Augmented cGANs
Viaarxiv icon

Multiple-Identity Image Attacks Against Face-based Identity Verification

Add code
Bookmark button
Alert button
Jun 20, 2019
Jerone T. A. Andrews, Thomas Tanay, Lewis D. Griffin

Figure 1 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 2 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 3 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 4 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Viaarxiv icon

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Add code
Bookmark button
Alert button
Jun 19, 2018
Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin

Figure 1 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 2 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 3 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 4 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Viaarxiv icon