Advanced search

Showing result 1 - 5 of 12 essays matching the above criteria.

  1. 1. Accuracy and Robustness of State of the Art Deepfake Detection Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Carlsson; Oskar Strömberg; [2023]
    Keywords : ;

    Abstract : With the evolution of artificial intelligence a lot of people have started getting worried about the potential dangers of deepfake images and videos, such as spreading fake videos of influential people. Several solutions to this problem have been proposed with some of the most efficient being convolutional neural networks for face detection in order to differentiate real images from deepfake images generated with a generative adversarial network. READ MORE

  2. 2. Detecting Furniture in Images Based on Neural Network Models

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jiayan Yang; [2022]
    Keywords : ;

    Abstract : Object detection is a challenging task that locates objects within an image or video and thenallows us to count and then track those objects. It is applied in a variety of ways, such as crowd counting, self-driving vehicles, video surveillance, face identification, and anomaly detection, and is utilized in a wide range of industries, including retail, sport, healthcare, marketing, interior design, agriculture, construction, and recreation. READ MORE

  3. 3. Deep Learning based Approximate Message Passing for MIMO Detection in 5G : Low complexity deep learning algorithms for solving MIMO Detection in real world scenarios

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andrea Pozzoli; [2022]
    Keywords : 5G; MIMO detection; Approximate Message Passing; OAMP-Net2; LVAMP; MMNet; Deep Learning; 5G; MIMO-detektering; Approximate Message Passing; OAMP-Net2; LVAMP; MMNet; Deep Learning;

    Abstract : The Fifth Generation (5G) mobile communication system is the latest technology in wireless communications. This technique brings several advantages, in particular by using multiple receiver antennas that serve multiple transmitters. READ MORE

  4. 4. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Fredrik Öberg; [2021]
    Keywords : Face Recognition; Presentation Attacks; Convolutional Neural Network;

    Abstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE

  5. 5. Analysis of Transactional Data with Long Short-Term Memory Recurrent Neural Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sabeen Nawaz; [2020]
    Keywords : LSTM; Auto-encoder decoder; anomaly detection; K-means; clustering; Principal Component Analysis;

    Abstract : An issue authorities and banks face is fraud related to payments and transactions where huge monetary losses occur to a party or where money laundering schemes are carried out. Previous work in the field of machine learning for fraud detection has addressed the issue as a supervised learning problem. READ MORE