Akshay Agarwal

Orcid: 0000-0001-7362-4752

Affiliations:
  • IISER Bhopal, India
  • IIIT Delhi, India (PhD 2020)


According to our database1, Akshay Agarwal authored at least 66 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Indian Traffic Sign Detection and Classification Through a Unified Framework.
IEEE Trans. Intell. Transp. Syst., October, 2024

Corruption depth: Analysis of DNN depth for misclassification.
Neural Networks, 2024

A Generalized Semiconductor Wafer Defect Classifier.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024

A Novel Sector-Based Algorithm for an Optimized Star-Galaxy Classification.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024

On the Robustness of Drug Abuse Face Classification.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024

Audio vs. Text: Identify a Powerful Modality for Effective Hate Speech Detection.
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024

Deepfake: Classifiers, Fairness, and Demographically Robust Algorithm.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

Unravelling Robustness of Deep Face Recognition Networks Against Illicit Drug Abuse Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Deepfake Catcher: Can a Simple Fusion be Effective and Outperform Complex DNNs?
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
IBAttack: Being Cautious About Data Labels.
IEEE Trans. Artif. Intell., December, 2023

Parameter agnostic stacked wavelet transformer for detecting singularities.
Inf. Fusion, July, 2023

Motion Magnified 3-D Residual-in-Dense Network for DeepFake Detection.
IEEE Trans. Biom. Behav. Identity Sci., 2023

Misclassifications of Contact Lens Iris PAD Algorithms: Is it Gender Bias or Environmental Conditions?
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

On Unconstrained Ear Recognition For Privacy-Preserving Authentication.
Proceedings of the Workshop on Advances of Mobile and Wearable Biometrics (WAMWB 2023) co-located with ACM International Conference on Mobile Human-Computer Interaction 2023 (MobileHCI 2023) Athens, 2023

Is DFR for Soft Biometrics Prediction in Unconstrained Images Fair and Effective?
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

Federated Learning for Local and Global Data Distribution.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

Benchmarking Image Classifiers for Physical Out-of-Distribution Examples Detection.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Robustness Against Gradient based Attacks through Cost Effective Network Fine-Tuning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector.
IEEE Trans. Neural Networks Learn. Syst., 2022

Crafting Adversarial Perturbations via Transformed Image Component Swapping.
IEEE Trans. Image Process., 2022

Generalized Contact Lens Iris Presentation Attack Detection.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Enhanced iris presentation attack detection via contraction-expansion CNN.
Pattern Recognit. Lett., 2022

Boosting Face Presentation Attack Detection in Multi-Spectral Videos Through Score Fusion of Wavelet Partition Images.
Frontiers Big Data, 2022

Robust IRIS Presentation Attack Detection Through Stochastic Filter Noise.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Benchmarking Robustness Beyond l<sub>p</sub> Norm Adversaries.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Exploring Robustness Connection between Artificial and Natural Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

Facial Retouching and Alteration Detection.
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022

2021
Image Transformation-Based Defense Against Adversarial Perturbation on Deep Learning Models.
IEEE Trans. Dependable Secur. Comput., 2021

Cognitive data augmentation for adversarial defense via pixel masking.
Pattern Recognit. Lett., 2021

MagNet: Detecting Digital Presentation Attacks on Face Recognition.
Frontiers Artif. Intell., 2021

Multi Loss Fusion For Matching Smartphone Captured Contactless Finger Images.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Impact of Super-Resolution and Human Identification in Drone Surveillance.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Intelligent and Adaptive Mixup Technique for Adversarial Robustness.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

When Sketch Face Recognition Meets Mask Obfuscation: Database and Benchmark.
Proceedings of the 16th IEEE International Conference on Automatic Face and Gesture Recognition, 2021

MD-CSDNetwork: Multi-Domain Cross Stitched Network for Deepfake Detection.
Proceedings of the 16th IEEE International Conference on Automatic Face and Gesture Recognition, 2021

Black-Box Adversarial Entry in Finance through Credit Card Fraud Detection.
Proceedings of the CIKM 2021 Workshops co-located with 30th ACM International Conference on Information and Knowledge Management (CIKM 2021), 2021

Detection of Digital Manipulation in Facial Images (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Role of Optimizer on Network Fine-tuning for Adversarial Robustness (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
MixNet for Generalized Face Presentation Attack Detection.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Generalized Iris Presentation Attack Detection Algorithm under Cross-Database Settings.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Attack Agnostic Adversarial Defense via Visual Imperceptible Bound.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

WaveTransform: Crafting Adversarial Examples via Input Decomposition.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020

DNDNet: Reconfiguring CNN for Adversarial Robustness.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Noise is Inside Me! Generating Adversarial Perturbations with Noise Derived from Natural Filters.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

The Role of 'Sign' and 'Direction' of Gradient on the Performance of CNN.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

On the Robustness of Face Recognition Algorithms Against Attacks and Bias.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Iris sensor identification in multi-camera environment.
Inf. Fusion, 2019

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition.
Int. J. Comput. Vis., 2019

Crafting A Panoptic Face Presentation Attack Detector.
Proceedings of the 2019 International Conference on Biometrics, 2019

Deceiving the Protector: Fooling Face Presentation Attack Detection Algorithms.
Proceedings of the 2019 International Conference on Biometrics, 2019

Evading Face Recognition via Partial Tampering of Faces.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

DeepRing: Protecting Deep Neural Network With Blockchain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Securing CNN Model and Biometric Template using Blockchain.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

CHIF: Convoluted Histogram Image Features for Detecting Silicone Mask based Face Presentation Attack.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

Deceiving Face Presentation Attack Detection via Image Transforms.
Proceedings of the Fifth IEEE International Conference on Multimedia Big Data, 2019

2018
Fusion of Handcrafted and Deep Learning Features for Large-Scale Multiple Iris Presentation Attack Detection.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect?
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Unravelling Robustness of Deep Learning Based Face Recognition Against Adversarial Attacks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Face Presentation Attack with Latex Masks in Multispectral Videos.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Face anti-spoofing with multifeature videolet aggregation.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Fingerprint sensor classification via Mélange of handcrafted features.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Mobile periocular matching with pre-post cataract surgery.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Face anti-spoofing using Haralick features.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

2015
Latent fingerprint from multiple surfaces: Database and quality analysis.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015


  Loading...