2025
Autores
Albuquerque, C; Neto, PC; Gonc, T; Sequeira, AF;
Publicação
HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2025, PT II
Abstract
Face recognition technology, despite its advancements and increasing accuracy, still presents significant challenges in explainability and ethical concerns, especially when applied in sensitive domains such as surveillance, law enforcement, and access control. The opaque nature of deep learning models jeopardises transparency, bias, and user trust. Concurrently, the proliferation of web applications presents a unique opportunity to develop accessible and interactive tools for demonstrating and analysing these complex systems. These tools can facilitate model decision exploration with various images, aiding in bias mitigation or enhancing users' trust by allowing them to see the model in action and understand its reasoning. We propose an explainable face recognition web application designed to support enrolment, identification, authentication, and verification while providing visual explanations through pixel-wise importance maps to clarify the model's decision-making process. The system is built in compliance with the European Union General Data Protection Regulation, ensuring data privacy and user control over personal information. The application is also designed for scalability, capable of efficiently managing large datasets. Load tests conducted on databases containing up to 1,000,000 images confirm its efficiency. This scalability ensures robust performance and a seamless user experience even with database growth.
2025
Autores
Huber, M; Neto, PC; Sequeira, AF; Damer, N;
Publicação
2025 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS, WACVW
Abstract
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match both identities, allowing serious security breaches. In this work, we apply a frequency-based explanation method from the area of explainable face recognition to shine a light on how FR models behave when processing a bona fide or attack pair from a frequency perspective. In extensive experiments, we used two different state-of-the-art FR models and six different morphing attacks to investigate possible differences in behavior. Our results show that FR models rely differently on different frequency bands when making decisions for bona fide pairs and morphing attacks. In the following step, we show that this behavioral difference can be used to detect morphing attacks in an unsupervised setup solely based on the observed frequency-importance differences in a generalizable manner.
2025
Autores
Pereira, T; Gadhoumi, K; Xiao, R;
Publicação
FRONTIERS IN PHYSIOLOGY
Abstract
[No abstract available]
2025
Autores
Sun, YL; Cheng, LL; Si, XP; He, RN; Pereira, T; Pang, MJ; Zhang, K; Song, X; Ming, D; Liu, XY;
Publicação
EXPERT SYSTEMS WITH APPLICATIONS
Abstract
Subject-independent seizure detection algorithms are typically grounded in scalp electroencephalogram (EEG) databases, due to standardized channels and locations of EEG electrodes. Intracranial EEG (iEEG) has the characteristics of low noise and high temporal resolution compared with scalp EEG. However, it is still a big challenge for seizure detection using iEEG, because of the inconsistent number and locations of implanted electrodes in different patients, which results in a lack of unified algorithms. This study introduces an innovative approach for subject-independent seizure detection using iEEG, combining channel-wise mixup, transformer networks, and multi-task learning. Channel-wise mixup enhances data utilization by effectively leveraging information from different subjects, while multi-task learning improves the generalization of the model by concurrently optimizing both the seizure detection and the subject recognition tasks. 2983 files from two well-known epilepsy databases, i.e. SWEC-ETHZ and HUP were used in our study and the result showed that our approach surpasses currently existing methods. In terms of accuracy and generalization of seizure detection, our method achieved an area under the receiver operating characteristic curve (AUC) of 0.97 and 0.95 on the two databases respectively, which are significantly higher than the result of the currently existing methods. This study proposed anew method with great potential for surgery planning of epilepsy patients.
2025
Autores
Liu, XY; Wang, WL; Liu, M; Chen, MY; Pereira, T; Doda, DY; Ke, YF; Wang, SY; Wen, D; Tong, XG; Li, WG; Yang, Y; Han, XD; Sun, YL; Song, X; Hao, CY; Zhang, ZH; Liu, XY; Li, CY; Peng, R; Song, XX; Yasi, A; Pang, MJ; Zhang, K; He, RN; Wu, L; Chen, SG; Chen, WJ; Chao, YG; Hu, CG; Zhang, H; Zhou, M; Wang, K; Liu, PF; Chen, C; Geng, XY; Qin, Y; Gao, DR; Song, EM; Cheng, LL; Chen, X; Ming, D;
Publicação
MILITARY MEDICAL RESEARCH
Abstract
Brain-computer interfaces (BCIs) represent an emerging technology that facilitates direct communication between the brain and external devices. In recent years, numerous review articles have explored various aspects of BCIs, including their fundamental principles, technical advancements, and applications in specific domains. However, these reviews often focus on signal processing, hardware development, or limited applications such as motor rehabilitation or communication. This paper aims to offer a comprehensive review of recent electroencephalogram (EEG)-based BCI applications in the medical field across 8 critical areas, encompassing rehabilitation, daily communication, epilepsy, cerebral resuscitation, sleep, neurodegenerative diseases, anesthesiology, and emotion recognition. Moreover, the current challenges and future trends of BCIs were also discussed, including personal privacy and ethical concerns, network security vulnerabilities, safety issues, and biocompatibility.
2025
Autores
Montenegro, H; Cardoso, MJ; Cardoso, JS;
Publicação
2025 47th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.