no code implementations • 19 Sep 2022 • Aaron M. Roth, Jing Liang, Ram Sriram, Elham Tabassi, Dinesh Manocha
Moreover, we present efficient policy distillation and tree-modification techniques that take advantage of the decision tree structure to allow improvements to a policy without retraining.
no code implementations • 2 May 2018 • Elham Tabassi, Tarang Chugh, Debayan Deb, Anil K. Jain
Fingerprint alteration, also referred to as obfuscation presentation attack, is to intentionally tamper or damage the real friction ridge patterns to avoid identification by an AFIS.