International audienceSubstantial progress in spoofing and deepfake detection has been made in recent years. Nonetheless, the community has yet to make notable inroads in providing an explanation for how a classifier produces its output. The dominance of black box spoofing detection solutions is at further odds with the drive toward trustworthy, explainable artificial intelligence. This paper describes our use of SHapley Additive exPlanations (SHAP) to gain new insights in spoofing detection. We demonstrate use of the tool in revealing unexpected classifier behaviour, the artefacts that contribute most to classifier outputs and differences in the behaviour of competing spoofing detection models. The tool is both efficient and flexible, bein...
We introduce a model-agnostic algorithm for manipulating SHapley Additive exPlanations (SHAP) with p...
peer reviewedIn industrial contexts, when an ML model classifies a sample as positive, it raises an ...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Despite several years of research in deepfake and spoofing detection for automatic speaker verificat...
State-of-the-art deep neural networks (DNNs) are highly effective in solving many complex real-world...
Despite AI and Neural Networks model had an overwhelming evolution during the past decade, their app...
In the digital transformation era, where cybersecurity is paramount, we present a machine learning-b...
Deep-learning technologies have shown impressive performance on many tasks in recent years. However,...
© 2001-2011 IEEE. This is the fourth in a series of essays about explainable AI. Previous essays lai...
The number of people connected to the internet is swiftly growing, and technology is increasingly in...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
In this work I present how deepfakes are created, how they are detected and also evaded. Deepfake cr...
Deep learning has effectively solved complicated challenges ranging from large data analytics to hum...
Videos manipulated by machine learning have rapidly increased online in the past years. So called de...
Android malware detection based on machine learning (ML) is widely used by the mobile device securit...
We introduce a model-agnostic algorithm for manipulating SHapley Additive exPlanations (SHAP) with p...
peer reviewedIn industrial contexts, when an ML model classifies a sample as positive, it raises an ...
Biometric face recognition technology is vital in security. With social media platforms such as Face...
Despite several years of research in deepfake and spoofing detection for automatic speaker verificat...
State-of-the-art deep neural networks (DNNs) are highly effective in solving many complex real-world...
Despite AI and Neural Networks model had an overwhelming evolution during the past decade, their app...
In the digital transformation era, where cybersecurity is paramount, we present a machine learning-b...
Deep-learning technologies have shown impressive performance on many tasks in recent years. However,...
© 2001-2011 IEEE. This is the fourth in a series of essays about explainable AI. Previous essays lai...
The number of people connected to the internet is swiftly growing, and technology is increasingly in...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
In this work I present how deepfakes are created, how they are detected and also evaded. Deepfake cr...
Deep learning has effectively solved complicated challenges ranging from large data analytics to hum...
Videos manipulated by machine learning have rapidly increased online in the past years. So called de...
Android malware detection based on machine learning (ML) is widely used by the mobile device securit...
We introduce a model-agnostic algorithm for manipulating SHapley Additive exPlanations (SHAP) with p...
peer reviewedIn industrial contexts, when an ML model classifies a sample as positive, it raises an ...
Biometric face recognition technology is vital in security. With social media platforms such as Face...