Search Results for author: Adam Porter

Found 5 papers, 0 papers with code

AI-Guided Defect Detection Techniques to Model Single Crystal Diamond Growth

no code implementations10 Apr 2024 Rohan Reddy Mekala, Elias Garratt, Matthias Muehle, Arjun Srinivasan, Adam Porter, Mikael Lindvall

This paper details seminal work on defect segmentation pipeline using in-situ optical images to identify features that indicate defective states that are visible at the macroscale.

Active Learning Defect Detection +1

AI-Guided Feature Segmentation Techniques to Model Features from Single Crystal Diamond Growth

no code implementations10 Apr 2024 Rohan Reddy Mekala, Elias Garratt, Matthias Muehle, Arjun Srinivasan, Adam Porter, Mikael Lindvall

This paper compares various traditional and machine learning-driven approaches for feature extraction in the diamond growth domain, proposing a novel deep learning-driven semantic segmentation approach to isolate and classify accurate pixel masks of geometric features like diamond, pocket holder, and background, along with their derivative features based on shape and size.

Active Learning Semantic Segmentation

MetaCompass: Reference-guided Assembly of Metagenomes

no code implementations3 Mar 2024 Tu Luan, Victoria Cepeda, Bo Liu, Zac Bowen, Ujjwal Ayyangar, Mathieu Almeida, Christopher M. Hill, Sergey Koren, Todd J. Treangen, Adam Porter, Mihai Pop

Metagenomic studies have primarily relied on de novo assembly for reconstructing genes and genomes from microbial mixtures.

Metamorphic Adversarial Detection Pipeline for Face Recognition Systems

no code implementations AAAI Workshop AdvML 2022 Rohan Reddy Mekala, Sai Yerramreddy, Adam Porter

As part of the research presented in this paper, we first deploy a range of state of the art adversarial attacks against multiple face recognition pipelines trained in a black box setup, and then generate pair-wise adversarial image sets to deceive the corresponding models under attack.

Adversarial Attack Face Recognition +6

Metamorphic Detection of Adversarial Examples in Deep Learning Models With Affine Transformations

no code implementations10 Jul 2019 Rohan Reddy Mekala, Gudjon Einar Magnusson, Adam Porter, Mikael Lindvall, Madeline Diep

Adversarial attacks are small, carefully crafted perturbations, imperceptible to the naked eye; that when added to an image cause deep learning models to misclassify the image with potentially detrimental outcomes.

Face Recognition Self-Driving Cars

Cannot find the paper you are looking for? You can Submit a new open access paper.