Pain Detection From Facial Expressions Based on Transformers and Distillation

Archive ouverte : Communication dans un congrès

El Morabit, Safaa | Rivenq, Atika

Edité par HAL CCSD ; IEEE

International audience. Pain assessment is a challenging problem in the field of emotion recognition. Pain represents a complex emotion difficult to detect or to estimate its intensity. This is what makes automatic pain assessment playing an important role in clinical diagnosis. Taking into consideration that pain generally generates spontaneous facial behaviour, these facial expressions could be used to detect the presence of pain. As a matter of fact, previous researches used machine learning and deep learning either to detect pain or to estimate pain level. In this paper, we propose a fine-tuning of pre-trained data-efficient image transformers and distillation (Deit) for pain detection from facial expressions. The effectiveness of the proposed architecture is evaluated on two publicly available databases, namely UNBC McMaster Shoulder Pain and BioVid Heat Pain. The proposed approach achieved promising preliminary results compared to the state of the art.

Consulter en ligne

Suggestions

Du même auteur

Automatic pain estimation from facial expressions: a comparative analysis using off-the-shelf CNN architectures | El Morabit, Safaa

Automatic pain estimation from facial expressions: a comparative analysis u...

Archive ouverte: Article de revue

El Morabit, Safaa | 2021-08-11

International audience. Automatic pain recognition from facial expressions is a challenging problem that has attracted a significant attention from the research community. This article provides a comprehensive analy...

Blockchain-Based Collaborative Certificate Revocation Systems Using Clustering | Didouh, Ahmed

Blockchain-Based Collaborative Certificate Revocation Systems Using Cluster...

Archive ouverte: Article de revue

Didouh, Ahmed | 2022

International audience. Despite the decisive contribution of intelligent transport systems in road safety, they also open new vulnerabilities to cyber-attacks, particularly vehicle position-linked attacks. For that ...

Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication | Didouh, Ahmed

Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Com...

Archive ouverte: Article de revue

Didouh, Ahmed | 2022-02

International audience. Vehicular ad hoc networks allow vehicles to share their information for the safety and efficiency of traffic purposes. However, information sharing can threaten the driver’s privacy as it inc...

Du même sujet

Commercializing blockchain : strategic applications in the real world / Antony Welfare | Welfare, Antony. Auteur

Commercializing blockchain : strategic applications in the real world / Ant...

Livre | Welfare, Antony. Auteur | 2019

The accessible, non-technical guide to applying and benefiting from blockchain technology. Blockchain has grown at an enormous rate in a very short period of time. In a business context, blockchain can level the playing field betw...

Blockchain and the supply chain : concepts, strategies and practical applications / Nick Vyas, Aljosja Beije, Bhaskar Krishnamachari | Vyas, Nick. Auteur

Blockchain and the supply chain : concepts, strategies and practical applic...

Livre | Vyas, Nick. Auteur | 2019

Web3 : the insights you need from Harvard Business Review. |

Web3 : the insights you need from Harvard Business Review.

Livre

This title will show you how today's most innovative organisations are choosing Web3, experimenting with their brands, evaluating their risks, and preparing to win in the newer, better internet age. Business is changing. Will you ...

ILC-Unet++ for Covid-19 Infection Segmentation | Bougourzi, Fares

ILC-Unet++ for Covid-19 Infection Segmentation

Archive ouverte: Communication dans un congrès

Bougourzi, Fares | 2022-05-23

International audience. Since the appearance of Covid-19 pandemic, in the end of 2019, Medical Imaging has been widely used to analysis this disease. In fact, CT-scans of the Lung can help to diagnosis, detect and q...

Face Presentation Attack Detection Using Deep Background Subtraction | Benlamoudi, Azeddine

Face Presentation Attack Detection Using Deep Background Subtraction

Archive ouverte: Article de revue

Benlamoudi, Azeddine | 2022-05

International audience. Currently, face recognition technology is the most widely used method for verifying an individual’s identity. Nevertheless, it has increased in popularity, raising concerns about face present...

Signal Denoising and Detection for Uplink in LoRa Networks based on Bayesian-optimized Deep Neural Networks | Tesfay, Angesom Ataklity

Signal Denoising and Detection for Uplink in LoRa Networks based on Bayesia...

Archive ouverte: Article de revue

Tesfay, Angesom Ataklity | 2023-01

International audience. Long-range and low-power communications are suitable technologies for the Internet of things networks. The long-range implies a very low signal-to-noise ratio at the receiver. In addition, lo...

Chargement des enrichissements...