Picture for Jerone T. A. Andrews

Jerone T. A. Andrews

Efficient Bias Mitigation Without Privileged Information

Add code
Sep 26, 2024
Viaarxiv icon

Position: Measure Dataset Diversity, Don't Just Claim It

Add code
Jul 11, 2024
Viaarxiv icon

A Taxonomy of Challenges to Curating Fair Datasets

Add code
Jun 10, 2024
Viaarxiv icon

A View From Somewhere: Human-Centric Face Representations

Add code
Mar 30, 2023
Viaarxiv icon

Ethical Considerations for Collecting Human-Centric Image Datasets

Add code
Feb 07, 2023
Figure 1 for Ethical Considerations for Collecting Human-Centric Image Datasets
Viaarxiv icon

I call BS: Fraud Detection in Crowdfunding Campaigns

Add code
Jun 30, 2020
Figure 1 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 2 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 3 for I call BS: Fraud Detection in Crowdfunding Campaigns
Figure 4 for I call BS: Fraud Detection in Crowdfunding Campaigns
Viaarxiv icon

Camera Model Anonymisation with Augmented cGANs

Add code
Feb 18, 2020
Figure 1 for Camera Model Anonymisation with Augmented cGANs
Figure 2 for Camera Model Anonymisation with Augmented cGANs
Figure 3 for Camera Model Anonymisation with Augmented cGANs
Figure 4 for Camera Model Anonymisation with Augmented cGANs
Viaarxiv icon

Multiple-Identity Image Attacks Against Face-based Identity Verification

Add code
Jun 20, 2019
Figure 1 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 2 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 3 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 4 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Viaarxiv icon

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Add code
Jun 19, 2018
Figure 1 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 2 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 3 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 4 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Viaarxiv icon