5,570 research outputs found

    The eyes know it: FakeET -- An Eye-tracking Database to Understand Deepfake Perception

    Full text link
    We present \textbf{FakeET}-- an eye-tracking database to understand human visual perception of \emph{deepfake} videos. Given that the principal purpose of deepfakes is to deceive human observers, FakeET is designed to understand and evaluate the ease with which viewers can detect synthetic video artifacts. FakeET contains viewing patterns compiled from 40 users via the \emph{Tobii} desktop eye-tracker for 811 videos from the \textit{Google Deepfake} dataset, with a minimum of two viewings per video. Additionally, EEG responses acquired via the \emph{Emotiv} sensor are also available. The compiled data confirms (a) distinct eye movement characteristics for \emph{real} vs \emph{fake} videos; (b) utility of the eye-track saliency maps for spatial forgery localization and detection, and (c) Error Related Negativity (ERN) triggers in the EEG responses, and the ability of the \emph{raw} EEG signal to distinguish between \emph{real} and \emph{fake} videos.Comment: 8 page

    Solving the detour problem in navigation: a model of prefrontal and hippocampal interactions.

    Get PDF
    Adapting behavior to accommodate changes in the environment is an important function of the nervous system. A universal problem for motile animals is the discovery that a learned route is blocked and a detour is required. Given the substantial neuroscience research on spatial navigation and decision-making it is surprising that so little is known about how the brain solves the detour problem. Here we review the limited number of relevant functional neuroimaging, single unit recording and lesion studies. We find that while the prefrontal cortex (PFC) consistently responds to detours, the hippocampus does not. Recent evidence suggests the hippocampus tracks information about the future path distance to the goal. Based on this evidence we postulate a conceptual model in which: Lateral PFC provides a prediction error signal about the change in the path, frontopolar and superior PFC support the re-formulation of the route plan as a novel subgoal and the hippocampus simulates the new path. More data will be required to validate this model and understand (1) how the system processes the different options; and (2) deals with situations where a new path becomes available (i.e., shortcuts)

    Control Theoretic Analysis of Human Brain Networks

    Get PDF
    The brain is a complex system with complicated structures and entangled dynamics. Among the various approaches to investigating the brain\u27s mechanics, the graphical method provides a successful framework for understanding the topology of both the structural and functional networks, and discovering efficient diagnostic biomarkers for cognitive behaviors, brain disorders and diseases. Yet it cannot explain how the structure affects the functionality and how the brain tunes its transition among multiple states to manipulate the cognitive control. In my dissertation, I propose a novel framework of modeling the mechanics of the cognitive control, which involves in applying control theory to analyzing the brain networks and conceptually connecting the cognitive control with the engineering control. First, I examine the energy distribution among different states via combining the energetic and structural constraints of the brain\u27s state transition in a free energy model, where the interaction between regions is explicitly informed by structural connectivity. This work enables the possibility of achieving a whole view of the brain\u27s energy landscape and preliminarily indicates the feasibility of control theory to model the dynamics of cognitive control. In the following work, I exploit the network control theory to address two questions about how the large-scale circuitry of the human brain constrains its dynamics. First, is the human brain theoretically controllable? Second, which areas of the brain are most influential in constraining or facilitating changes in brain state trajectories? Further, I seek to examine the structural effect on the control actions through solving the optimal control problem under different boundary conditions. I quantify the efficiency of regions in terms of the energy cost for the brain state transition from the default mode to task modes. This analysis is extended to the perturbation analysis of trajectories and is applied to the comparison between the group with mild traumatic brain injury(mTBI) and the healthy group. My research is the first to demonstrate how control theory can be used to analyze human brain networks

    Event Structure In Vision And Language

    Get PDF
    Our visual experience is surprisingly rich: We do not only see low-level properties such as colors or contours; we also see events, or what is happening. Within linguistics, the examination of how we talk about events suggests that relatively abstract elements exist in the mind which pertain to the relational structure of events, including general thematic roles (e.g., Agent), Causation, Motion, and Transfer. For example, “Alex gave Jesse flowers” and “Jesse gave Alex flowers” both refer to an event of transfer, with the directionality of the transfer having different social consequences. The goal of the present research is to examine the extent to which abstract event information of this sort (event structure) is generated in visual perceptual processing. Do we perceive this information, just as we do with more ‘traditional’ visual properties like color and shape? In the first study (Chapter 2), I used a novel behavioral paradigm to show that event roles – who is acting on whom – are rapidly and automatically extracted from visual scenes, even when participants are engaged in an orthogonal task, such as color or gender identification. In the second study (Chapter 3), I provided functional magnetic resonance (fMRI) evidence for commonality in content between neural representations elicited by static snapshots of actions and by full, dynamic action sequences. These two studies suggest that relatively abstract representations of events are spontaneously extracted from sparse visual information. In the final study (Chapter 4), I return to language, the initial inspiration for my investigations of events in vision. Here I test the hypothesis that the human brain represents verbs in part via their associated event structures. Using a model of verbs based on event-structure semantic features (e.g., Cause, Motion, Transfer), it was possible to successfully predict fMRI responses in language-selective brain regions as people engaged in real-time comprehension of naturalistic speech. Taken together, my research reveals that in both perception and language, the mind rapidly constructs a representation of the world that includes events with relational structure

    Cyber-security Risk Assessment

    Get PDF
    Cyber-security domain is inherently dynamic. Not only does system configuration changes frequently (with new releases and patches), but also new attacks and vulnerabilities are regularly discovered. The threat in cyber-security is human, and hence intelligent in nature. The attacker adapts to the situation, target environment, and countermeasures. Attack actions are also driven by attacker's exploratory nature, thought process, motivation, strategy, and preferences. Current security risk assessment is driven by cyber-security expert's theories about this attacker behavior. The goal of this dissertation is to automatically generate the cyber-security risk scenarios by: * Capturing diverse and dispersed cyber-security knowledge * Assuming that there are unknowns in the cyber-security domain, and new knowledge is available frequently * Emulating the attacker's exploratory nature, thought process, motivation, strategy, preferences and his/her interaction with the target environment * Using the cyber-security expert's theories about attacker behavior The proposed framework is designed by using the unique cyber-security domain requirements identified in this dissertation and by overcoming the limitations of current risk scenario generation frameworks. The proposed framework automates the risk scenario generation by using the knowledge as it becomes available (or changes). It supports observing, encoding, validating, and calibrating cyber-security expert's theories. It can also be used for assisting the red-teaming process. The proposed framework generates ranked attack trees and encodes the attacker behavior theories. These can be used for prioritizing vulnerability remediation. The proposed framework is currently being extended for developing an automated threat response framework that can be used to analyze and recommend countermeasures. This framework contains behavior driven countermeasures that uses the attacker behavior theories to lead the attacker away from the system to be protected

    Navigating the little brain : Comprehensive Mapping of Functional Organisation

    Get PDF
    Two decades of neuroimaging research suggests that the cerebellum is functionally involved in a range of cognitive and motor processes. However, missing from the literature is a comprehensive map detailing a clear functional organisation of the cerebellum. Previous studies have used a restricted task-mapping approach to localise task-specific functional activation to cerebellar lobules. However, this approach, which is often limited to one or two functional domains within individual subjects, fails to characterise the full breadth of functional specialisation within the cerebellum. To overcome this restricted task-mapping problem, we tested 17 subjects on a condition-rich task battery (61 task conditions) across 4 scanning sessions. We then adopted a bottom-up approach, which allowed us to characterise functional activations in terms of latent features, rather than tasks. In this way, we were able to describe a broad spectrum of heterogeneous activity patterns using 11 latent features (rather than 61 task conditions). In deriving a functional map, we found that functional boundaries did not coincide with a lobular assignment, challenging the validity of the standard lobular nomenclature. This work offers two novel contributions to the field. First, the task battery that we designed is the most comprehensive to date, making this work the veritable “look-up” table for functional topography of the cerebellum. Second, we show that functional and lobular boundaries do not align. Thus, we challenge the field to revise the standard lobular nomenclature, to include functional subdivisions. In addition, we encourage the community to use the rich dataset generated by this expansive task battery with the aim of advancing the field towards a unified and testable theory of cerebellar function

    Development of a Personal Visioning Guidance System

    Get PDF
    The primary intent of this project was to formulate a novel guidance system to help individuals gain clarity and understanding of their inner vision of a desired future state. My secondary goal was to enrich the palette of resources and tools available for coaching individuals in their discovery and crafting of personal and/or professional visions. Initially, I conducted an extensive literature review that inspired my approach. Then, I followed a process for assessing existing visioning tools and then imagining new opportunities to create, conceptualize, and craft at least five novel visioning tools. The project outcome includes a Personal Visioning Guidance Model to navigate through the visioning process. In it, I described the key five stages and the Torrance Incubation Model (TIM) as micro-stage in each main stage. I ideated a palette of approaches to offer a broad spectrum of possibilities for visioning tools, and I conducted front-end development of seven of them. I also presented specific learning about every stage of the model as well as those from trialing five visioning tools with two subjects. Finally, I analyzed how this project adds value and a number of actions to progress further
    corecore