This lecture overviews Face and Object De-detection that has many applications in Human-centered Computing and privacy protection in Social or Broadcasted Media. It covers the following topics in detail: Object detection and de-detection definitions. Adversarial Attacks: Threat Model, Perturbation, Attack Methods, Attack Scenarios, Defense Methods, Benchmarking. Face Detection Obfuscation.
This lecture overviews Face Detection that has many applications in Human-centered Computing, Image and Video Analysis and Social Media Analytics. It covers the following topics in detail: Face Detection definition: Regression and Classification. Face detection metrics. DNN face detection.
This lecture overviews Human Centered Computing that has many applications in Human-Computer Interfaces, Data Analytics and Social Media Analytics. It covers the following topics in detail: Semantic Video Content Analysis. Face-related analysis: Face/object detection and tracking. Multiview human detection. Face detection obfuscation. Face recognition. Face clustering. Label propagation on videos. Face De-identification. 3D face reconstruction. Facial expression recognition. Facial feature detection. Visual… Continue reading Introduction to Human Centered Computing
This lecture overviews Blockchain Technology that has many applications in Cryptocurrencies, Identity Management and Biometrics. It covers the following topics in detail: Introduction to Cryptography, Blockchain and Blockchain Consensus Algorithms. Applications in Cryptocurrencies, Distributed Identity Management (uPost, Sovrin, ShoCard systems) and Biometrics.
This lecture overviews Cryptocurrencies that has many applications in Finances, Network Theory and Web Science. It covers the following topics in detail: Introduction to Cryptography, Blockchain and Blockchain Consensus Algorithms. Blockchain and Cryptocurrency: Bitcoin and Ethereum.
This lecture overviews Blockchain technology that has many applications in cryptocurrencies, e-commerce and identity management. It covers the following topics in detail: Introduction to Blockchain. Peer-to-Peer (P2P) networks and their use in trusted distributed decision making are detailed. Blockchain structure and technology, namely hash pointers, time-stamping and mining are thoroughly explained. The Byzantine Fault or Byzantine Generals’… Continue reading Blockchain Algorithms