Zum Hauptinhalt springen

Showing 1–37 of 37 results for author: Memon, N

.
  1. arXiv:2403.12047  [pdf, other

    cs.CV

    Alpha-wolves and Alpha-mammals: Exploring Dictionary Attacks on Iris Recognition Systems

    Authors: Sudipta Banerjee, Anubhav Jain, Zehua Jiang, Nasir Memon, Julian Togelius, Arun Ross

    Abstract: A dictionary attack in a biometric system entails the use of a small number of strategically generated images or templates to successfully match with a large number of identities, thereby compromising security. We focus on dictionary attacks at the template level, specifically the IrisCodes used in iris recognition systems. We present an hitherto unknown vulnerability wherein we mix IrisCodes usin… ▽ More

    Submitted 20 November, 2023; originally announced March 2024.

    Comments: 8 pages, 5 figures, 13 tables, Workshop on Manipulation, Adversarial, and Presentation Attacks in Biometrics, Winter Conference on Applications of Computer Vision

  2. arXiv:2403.08092  [pdf, other

    cs.CV

    Mitigating the Impact of Attribute Editing on Face Recognition

    Authors: Sudipta Banerjee, Sai Pranaswi Mullangi, Shruti Wagle, Chinmay Hegde, Nasir Memon

    Abstract: Through a large-scale study over diverse face images, we show that facial attribute editing using modern generative AI models can severely degrade automated face recognition systems. This degradation persists even with identity-preserving generative models. To mitigate this issue, we propose two novel techniques for local and global attribute editing. We empirically ablate twenty-six facial semant… ▽ More

    Submitted 9 April, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: Under review

  3. arXiv:2402.18085  [pdf, other

    cs.SD cs.CR eess.AS

    AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response

    Authors: Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir Memon

    Abstract: Scammers are aggressively leveraging AI voice-cloning technology for social engineering attacks, a situation significantly worsened by the advent of audio Real-time Deepfakes (RTDFs). RTDFs can clone a target's voice in real-time over phone calls, making these interactions highly interactive and thus far more convincing. Our research confidently addresses the gap in the existing literature on deep… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: Dataset will be made public by end of March 2024

  4. arXiv:2309.12159  [pdf, other

    cs.CR cs.CV

    Information Forensics and Security: A quarter-century-long journey

    Authors: Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenael Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu

    Abstract: Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  5. arXiv:2308.08638  [pdf, other

    cs.CV cs.CY cs.LG

    Fair GANs through model rebalancing for extremely imbalanced class distributions

    Authors: Anubhav Jain, Nasir Memon, Julian Togelius

    Abstract: Deep generative models require large amounts of training data. This often poses a problem as the collection of datasets can be expensive and difficult, in particular datasets that are representative of the appropriate underlying distribution (e.g. demographic). This introduces biases in datasets which are further propagated in the models. We present an approach to construct an unbiased generative… ▽ More

    Submitted 21 December, 2023; v1 submitted 16 August, 2023; originally announced August 2023.

  6. arXiv:2307.08585  [pdf, other

    cs.CV

    Identity-Preserving Aging of Face Images via Latent Diffusion Models

    Authors: Sudipta Banerjee, Govind Mittal, Ameya Joshi, Chinmay Hegde, Nasir Memon

    Abstract: The performance of automated face recognition systems is inevitably impacted by the facial aging process. However, high quality datasets of individuals collected over several years are typically small in scale. In this work, we propose, train, and validate the use of latent text-to-image diffusion models for synthetically aging and de-aging face images. Our models succeed with few-shot training, a… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: Accepted to appear in International Joint Conference in Biometrics (IJCB) 2023

  7. arXiv:2305.07710  [pdf, other

    cs.CV

    Zero-shot racially balanced dataset generation using an existing biased StyleGAN2

    Authors: Anubhav Jain, Nasir Memon, Julian Togelius

    Abstract: Facial recognition systems have made significant strides thanks to data-heavy deep learning models, but these models rely on large privacy-sensitive datasets. Further, many of these datasets lack diversity in terms of ethnicity and demographics, which can lead to biased models that can have serious societal and security implications. To address these issues, we propose a methodology that leverages… ▽ More

    Submitted 18 September, 2023; v1 submitted 12 May, 2023; originally announced May 2023.

  8. arXiv:2212.02571  [pdf, other

    cs.CV

    A Dataless FaceSwap Detection Approach Using Synthetic Images

    Authors: Anubhav Jain, Nasir Memon, Julian Togelius

    Abstract: Face swapping technology used to create "Deepfakes" has advanced significantly over the past few years and now enables us to create realistic facial manipulations. Current deep learning algorithms to detect deepfakes have shown promising results, however, they require large amounts of training data, and as we show they are biased towards a particular ethnicity. We propose a deepfake detection meth… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: IJCB 2022

  9. arXiv:2210.06186  [pdf, other

    cs.CR cs.AI cs.CV

    GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response

    Authors: Govind Mittal, Chinmay Hegde, Nasir Memon

    Abstract: With the rise of AI-enabled Real-Time Deepfakes (RTDFs), the integrity of online video interactions has become a growing concern. RTDFs have now made it feasible to replace an imposter's face with their victim in live video interactions. Such advancement in deepfakes also coaxes detection to rise to the same standard. However, existing deepfake detection techniques are asynchronous and hence ill-s… ▽ More

    Submitted 23 May, 2024; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: Accepted to IEEE Euro S&P 2024

  10. arXiv:2209.04909  [pdf, other

    cs.CV

    Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage

    Authors: M Charity, Nasir Memon, Zehua Jiang, Abhi Sen, Julian Togelius

    Abstract: This work expands on previous advancements in genetic fingerprint spoofing via the DeepMasterPrints and introduces Diversity and Novelty MasterPrints. This system uses quality diversity evolutionary algorithms to generate dictionaries of artificial prints with a focus on increasing coverage of users from the dataset. The Diversity MasterPrints focus on generating solution prints that match with us… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  11. arXiv:2204.11304  [pdf, other

    cs.SD cs.CV eess.AS

    Dictionary Attacks on Speaker Verification

    Authors: Mirko Marras, Pawel Korus, Anubhav Jain, Nasir Memon

    Abstract: In this paper, we propose dictionary attacks against speaker verification - a novel attack vector that aims to match a large fraction of speaker population by chance. We introduce a generic formulation of the attack that can be used with various speech representations and threat models. The attacker uses adversarial optimization to maximize raw similarity of speaker embeddings between a seed speec… ▽ More

    Submitted 12 December, 2022; v1 submitted 24 April, 2022; originally announced April 2022.

    Comments: Accepted in IEEE Transactions on Information Forensics and Security

  12. arXiv:2102.10212  [pdf, other

    cs.CV

    Hard-Attention for Scalable Image Classification

    Authors: Athanasios Papadopoulos, Paweł Korus, Nasir Memon

    Abstract: Can we leverage high-resolution information without the unsustainable quadratic complexity to input scale? We propose Traversal Network (TNet), a novel multi-scale hard-attention architecture, which traverses image scale-space in a top-down fashion, visiting only the most informative image regions along the way. TNet offers an adjustable trade-off between accuracy and complexity, by changing the n… ▽ More

    Submitted 28 October, 2021; v1 submitted 19 February, 2021; originally announced February 2021.

  13. arXiv:2011.05773  [pdf, ps, other

    cs.SI cs.CL cs.CY

    The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic

    Authors: Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon

    Abstract: Fact checking by professionals is viewed as a vital defense in the fight against misinformation.While fact checking is important and its impact has been significant, fact checks could have limited visibility and may not reach the intended audience, such as those deeply embedded in polarized communities. Concerned citizens (i.e., the crowd), who are users of the platforms where misinformation appea… ▽ More

    Submitted 11 November, 2020; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: PrePrint - IEEE BigData 2020. The code and data can be found in http://claws.cc.gatech.edu/covid_counter_misinformation.html

  14. arXiv:2004.01929  [pdf, other

    eess.IV cs.CV

    Empirical Evaluation of PRNU Fingerprint Variation for Mismatched Imaging Pipelines

    Authors: Sharad Joshi, Pawel Korus, Nitin Khanna, Nasir Memon

    Abstract: We assess the variability of PRNU-based camera fingerprints with mismatched imaging pipelines (e.g., different camera ISP or digital darkroom software). We show that camera fingerprints exhibit non-negligible variations in this setup, which may lead to unexpected degradation of detection statistics in real-world use-cases. We tested 13 different pipelines, including standard digital darkroom softw… ▽ More

    Submitted 9 October, 2020; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: 6 pages and 3 pages supplemental file

  15. arXiv:2002.10123  [pdf, other

    eess.IV cs.LG eess.SP

    Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection

    Authors: Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük, Nasir Memon

    Abstract: PRNU based camera recognition method is widely studied in the image forensic literature. In recent years, CNN based camera model recognition methods have been developed. These two methods also provide solutions to tamper localization problem. In this paper, we propose their combination via a Neural Network to achieve better small-scale tamper detection performance. According to the results, the fu… ▽ More

    Submitted 5 May, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: 13 pages

  16. arXiv:1909.04573  [pdf, other

    cs.MM eess.IV

    Camera Fingerprint Extraction via Spatial Domain Averaged Frames

    Authors: Samet Taspinar, Manoranjan Mohanty, Nasir Memon

    Abstract: Photo Response Non-Uniformity (PRNU) based camera attribution is an effective method to determine the source camera of visual media (an image or a video). To apply this method, images or videos need to be obtained from a camera to create a "camera fingerprint" which then can be compared against the PRNU of the query media whose origin is under question. The fingerprint extraction process can be ti… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 11 pages, 9 figures, submitted to IEEE Transactions on Information Forensics and Security journal

  17. arXiv:1908.06148  [pdf, other

    cs.CR cs.MM

    FiFTy: Large-scale File Fragment Type Identification using Neural Networks

    Authors: Govind Mittal, Pawel Korus, Nasir Memon

    Abstract: We present FiFTy, a modern file type identification tool for memory forensics and data carving. In contrast to previous approaches based on hand-crafted features, we design a compact neural network architecture, which uses a trainable embedding space, akin to successful natural language processing models. Our approach dispenses with explicit feature extraction which is a bottleneck in legacy syste… ▽ More

    Submitted 7 June, 2020; v1 submitted 16 August, 2019; originally announced August 2019.

    Comments: Paper accepted for publication in the IEEE Transactions on Information Forensics and Security

  18. arXiv:1904.01533  [pdf, other

    cs.MM

    Source Camera Attribution of Multi-Format Devices

    Authors: Samet Taspinar, Manoranjan Mohanty, Nasir Memon

    Abstract: Photo Response Non-Uniformity (PRNU) based source camera attribution is an effective method to determine the origin camera of visual media (an image or a video). However, given that modern devices, especially smartphones, capture images, and videos at different resolutions using the same sensor array, PRNU attribution can become ineffective as the camera fingerprint and query visual media can be m… ▽ More

    Submitted 18 April, 2020; v1 submitted 2 April, 2019; originally announced April 2019.

    Comments: 16 pages, 9 figures, 11 tables. "The paper is under consideration at Pattern Recognition Letters"

  19. Analysis of Rolling Shutter Effect on ENF based Video Forensics

    Authors: Saffet Vatansever, Ahmet Emir Dirik, Nasir Memon

    Abstract: ENF is a time-varying signal of the frequency of mains electricity in a power grid. It continuously fluctuates around a nominal value (50/60 Hz) due to changes in supply and demand of power over time. Depending on these ENF variations, the luminous intensity of a mains-powered light source also fluctuates. These fluctuations in luminance can be captured by video recordings. Accordingly, ENF can be… ▽ More

    Submitted 23 March, 2019; originally announced March 2019.

  20. Detecting the Presence of ENF Signal in Digital Videos: a Superpixel based Approach

    Authors: Saffet Vatansever, Ahmet Emir Dirik, Nasir Memon

    Abstract: ENF (Electrical Network Frequency) instantaneously fluctuates around its nominal value (50/60 Hz) due to a continuous disparity between generated power and consumed power. Consequently, luminous intensity of a mains-powered light source varies depending on ENF fluctuations in the grid network. Variations in the luminance over time can be captured from video recordings and ENF can be estimated thro… ▽ More

    Submitted 23 March, 2019; originally announced March 2019.

  21. arXiv:1902.10707  [pdf, other

    cs.CV cs.MM

    Neural Imaging Pipelines - the Scourge or Hope of Forensics?

    Authors: Pawel Korus, Nasir Memon

    Abstract: Forensic analysis of digital photographs relies on intrinsic statistical traces introduced at the time of their acquisition or subsequent editing. Such traces are often removed by post-processing (e.g., down-sampling and re-compression applied upon distribution in the Web) which inhibits reliable provenance analysis. Increasing adoption of computational methods within digital cameras further compl… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

    Comments: Manuscript + supplement; currently under review; compressed figures to minimize file size. arXiv admin note: text overlap with arXiv:1812.01516

  22. arXiv:1902.05684  [pdf

    cs.CY cs.LG

    Crime Analysis using Open Source Information

    Authors: Sarwat Nizamani, Nasrullah Memon, Azhar Ali Shah, Sehrish Nizamani, Saad Nizamani, Imdad Ali Ismaili

    Abstract: In this paper, we present a method of crime analysis from open source information. We employed un-supervised methods of data mining to explore the facts regarding the crimes of an area of interest. The analysis is based on well known clustering and association techniques. The results show that the proposed method of crime analysis is efficient and gives a broad picture of the crimes of an area to… ▽ More

    Submitted 15 February, 2019; originally announced February 2019.

    Journal ref: Sindh University Research Journal (Science Series) Vol. 47 (4) 677- 682 (2015)

  23. arXiv:1812.01516  [pdf, other

    cs.CV cs.MM

    Content Authentication for Neural Imaging Pipelines: End-to-end Optimization of Photo Provenance in Complex Distribution Channels

    Authors: Pawel Korus, Nasir Memon

    Abstract: Forensic analysis of digital photo provenance relies on intrinsic traces left in the photograph at the time of its acquisition. Such analysis becomes unreliable after heavy post-processing, such as down-sampling and re-compression applied upon distribution in the Web. This paper explores end-to-end optimization of the entire image acquisition and distribution workflow to facilitate reliable forens… ▽ More

    Submitted 25 February, 2019; v1 submitted 4 December, 2018; originally announced December 2018.

    Comments: Camera ready + supplement, CVPR'19

  24. arXiv:1808.01680  [pdf, other

    cs.HC cs.CV

    Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices

    Authors: Toan Nguyen, Aditi Roy, Nasir Memon

    Abstract: Studies have shown that children can be exposed to smart devices at a very early age. This has important implications on research in children-computer interaction, children online safety and early education. Many systems have been built based on such research. In this work, we present multiple techniques to automatically detect the presence of a child on a smart device, which could be used as the… ▽ More

    Submitted 5 August, 2018; originally announced August 2018.

    Comments: Under peer review

  25. Tap-based User Authentication for Smartwatches

    Authors: Toan Nguyen, Nasir Memon

    Abstract: This paper presents TapMeIn, an eyes-free, two-factor authentication method for smartwatches. It allows users to tap a memorable melody (tap-password) of their choice anywhere on the touchscreen to unlock their watch. A user is verified based on the tap-password as well as her physiological and behavioral characteristics when tapping. Results from preliminary experiments with 41 participants show… ▽ More

    Submitted 5 August, 2018; v1 submitted 2 July, 2018; originally announced July 2018.

    Comments: 11 pages, 8 figures

    Journal ref: Computer & Security, Volume 78, September 2018, Pages 174-186

  26. An HMM-based behavior modeling approach for continuous mobile authentication

    Authors: Aditi Roy, Tzipora Halevi, Nasir Memon

    Abstract: This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach models the horizontal and vertical scrolling… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

  27. An HMM-based Multi-sensor Approach for Continuous Mobile Authentication

    Authors: Aditi Roy, Tzipora Halevi, Nasir Memon

    Abstract: With the increased popularity of smart phones, there is a greater need to have a robust authentication mechanism that handles various security threats and privacy leakages effectively. This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

  28. IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images

    Authors: Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir Memon

    Abstract: We address the problem of shoulder-surfing attacks on authentication schemes by proposing IllusionPIN (IPIN), a PIN-based authentication method that operates on touchscreen devices. IPIN uses the technique of hybrid images to blend two keypads with different digit orderings in such a way, that the user who is close to the device is seeing one keypad to enter her PIN, while the attacker who is look… ▽ More

    Submitted 22 August, 2017; originally announced August 2017.

    Comments: 15 pages, 10 figures, IEEE Transactions on Information Forensics and Security, 2017

  29. arXiv:1705.07386  [pdf, other

    cs.CV cs.CR cs.LG

    DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

    Authors: Philip Bontrager, Aditi Roy, Julian Togelius, Nasir Memon, Arun Ross

    Abstract: Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that can fortuitously match with a large number of fingerprints thereby undermining the security afforded by fingerprint systems. Previous work by Roy et al. generated synthetic MasterPrints at the feature-level. In this… ▽ More

    Submitted 18 October, 2018; v1 submitted 20 May, 2017; originally announced May 2017.

    Comments: 8 pages; added new verification systems and diagrams. Accepted to conference Biometrics: Theory, Applications, and Systems 2018

  30. arXiv:1604.00552  [pdf

    cs.NE

    pH Prediction by Artificial Neural Networks for the Drinking Water of the Distribution System of Hyderabad City

    Authors: Niaz Ahmed Memon, Mukhtiar Ali Unar, Abdul Khalique Ansari

    Abstract: In this research, feedforward ANN (Artificial Neural Network) model is developed and validated for predicting the pH at 10 different locations of the distribution system of drinking water of Hyderabad city. The developed model is MLP (Multilayer Perceptron) with back propagation algorithm.The data for the training and testing of the model are collected through an experimental analysis on weekly ba… ▽ More

    Submitted 2 April, 2016; originally announced April 2016.

    Comments: 10 pages, Mehran University Research Journal of Engineering and Technology, Vol. 31, No. 1, January 2012

  31. arXiv:1406.2398  [pdf, other

    cs.SI cs.CY physics.soc-ph

    Leveraging Personalization To Facilitate Privacy

    Authors: Tehila Minkus, Nasir Memon

    Abstract: Online social networks have enabled new methods and modalities of collaboration and sharing. These advances bring privacy concerns: online social data is more accessible and persistent and simultaneously less contextualized than traditional social interactions. To allay these concerns, many web services allow users to configure their privacy settings based on a set of multiple-choice questions.… ▽ More

    Submitted 9 June, 2014; originally announced June 2014.

  32. arXiv:1312.2451  [pdf

    cs.LG

    CEAI: CCM based Email Authorship Identification Model

    Authors: Sarwat Nizamani, Nasrullah Memon

    Abstract: In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuation m… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Journal ref: Egyptian Informatics Journal,Volume 14, Issue 3, November 2013

  33. arXiv:1312.1971  [pdf

    cs.AI

    Modeling Suspicious Email Detection using Enhanced Feature Selection

    Authors: Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas

    Abstract: The paper presents a suspicious email detection model which incorporates enhanced feature selection. In the paper we proposed the use of feature selection strategies along with classification technique for terrorists email detection. The presented model focuses on the evaluation of machine learning algorithms such as decision tree (ID3), logistic regression, Naïve Bayes (NB), and Support Vector Ma… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Journal ref: IJMO 2012 Vol.2(4): 371-377 ISSN: 2010-3697

  34. arXiv:1312.1969  [pdf

    cs.SI

    PSN: Portfolio Social Network

    Authors: Jordi M. Cortes, Sarwat Nizamani, Nasrullah Memon

    Abstract: In this paper we present a web-based information system which is a portfolio social network (PSN) that provides solutions to recruiters and job seekers. The proposed system enables users to create portfolios so that he/she can add his specializations with piece of code, if any, specifically for software engineers, which is accessible online. The unique feature of the system is to enable the recrui… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Journal ref: IJCEE 2014 Vol.6 (1): 12-15 ISSN: 1793-8163

  35. arXiv:1310.0731  [pdf, ps, other

    physics.soc-ph cs.SI

    From Public Outrage to the Burst of Public Violence: An Epidemic-Like Model

    Authors: Sarwat Nizamani, Nasrullah Memon, Serge Galam

    Abstract: This study extends classical models of spreading epidemics to describe the phenomenon of contagious public outrage, which eventually leads to the spread of violence following a disclosure of some unpopular political decisions and/or activity. Accordingly, a mathematical model is proposed to simulate from the start, the internal dynamics by which an external event is turned into internal violence w… ▽ More

    Submitted 2 October, 2013; originally announced October 2013.

    Comments: 22 pages, 9 figures

  36. arXiv:1301.7643  [pdf, other

    cs.HC cs.CY

    Phishing, Personality Traits and Facebook

    Authors: Tzipora Halevi, Jim Lewis, Nasir Memon

    Abstract: Phishing attacks have become an increasing threat to online users. Recent research has begun to focus on the factors that cause people to respond to them. Our study examines the correlation between the Big Five personality traits and email phishing response. We also examine how these factors affect users behavior on Facebook, including posting personal information and choosing Facebook privacy set… ▽ More

    Submitted 7 February, 2013; v1 submitted 31 January, 2013; originally announced January 2013.

  37. arXiv:1111.4699  [pdf

    cond-mat.mtrl-sci

    Flame Synthesis of Graphene Films in Open Environments

    Authors: Nasir K. Memon, Stephen D. Tse, Jafar F. Al-Sharab, Hisato Yamaguchi, Alem-Mar B. Goncalves, Bernard H. Kear, Yogesh Jaluria, Eva Y. Andrei, Manish Chhowalla

    Abstract: Few-layer graphene (FLG) is grown on copper and nickel substrates at high rates using a novel flame synthesis method in open-atmosphere environments. Transmittance and resistance properties of the transferred films are similar to those grown by other methods, but the concentration of oxygen, as assessed by XPS, is actually less than that for CVD-grown graphene under near vacuum conditions. The met… ▽ More

    Submitted 20 November, 2011; originally announced November 2011.

    Comments: 21 pages, 8 figures

    Journal ref: Carbon 2011;49:5064-70