A Survey on Face and Body Based Human Recognition Robust to Image Blurring and Low Illumination

JH Koo, SW Cho, NR Baek, YW Lee, KR Park - Mathematics, 2022 - mdpi.com
Many studies have been actively conducted on human recognition in indoor and outdoor
environments. This is because human recognition methods in such environments are …

Unrolled Decomposed Unpaired Learning for Controllable Low-Light Video Enhancement

L Zhu, W Yang, B Chen, H Zhu, Z Ni, Q Mao… - European Conference on …, 2024 - Springer
Obtaining pairs of low/normal-light videos, with motions, is more challenging than still
images, which raises technical issues and poses the technical route of unpaired learning as …

Multimodal human recognition in significantly low illumination environment using modified EnlightenGAN

JH Koo, SW Cho, NR Baek, KR Park - Mathematics, 2021 - mdpi.com
Human recognition in indoor environments occurs both during the day and at night. During
the day, human recognition encounters performance degradation owing to a blur generated …

De-occlusion and recognition of frontal face images: a comparative study of multiple imputation methods

JA Mensah, ENN Nortey, E Ocran, S Iddi, L Asiedu - Journal of Big Data, 2024 - Springer
Increasingly, automatic face recognition algorithms have become necessary with the
development and extensive use of face recognition technology, particularly in the era of …

When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities

J Shi, T Xie, GH Tu, C Peng, CY Li… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
5G/4G voice calls are always encrypted for security and privacy. However, in this work, we
unveil several vulnerabilities which can unintentionally leak 5G/4G call state information …

Comparison of Different Image Enhancement Algorithm for Emotional Face Detection

VP Upadhyayula, V Amudha - 2022 4th International …, 2022 - ieeexplore.ieee.org
The aim of this study is to identify different human facial expressions using image
enhancement algorithms in Google COLAB. A dataset of images of different expressions like …

[PDF][PDF] When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities

S Jingwen, X Tian, T Guan-Hua, P Chunyi… - IEEE Conference on …, 2023 - par.nsf.gov
5G/4Gvoicecallsarealwaysencryptedforsecurity… privacy. However, inthis work, we
unveilseveral vulnerabilities whichcanunintentionallyleak5G/4Gcallstate information …