Paper
7 September 2022 Research on the application of artificial emotional intelligence in the border: take iBorderCtrl as an example
Xin Zhou, Zenghui Yang, Wenjun Han, Jie Kuang, Donghua Liao
Author Affiliations +
Proceedings Volume 12329, Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022); 123290I (2022) https://doi.org/10.1117/12.2646933
Event: Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022), 2022, Changsha, China
Abstract
Artificial intelligence (AI) technologies are rapidly proliferating around the world. In this paper, we first present the current state of AI applications around the world, analyzing the current use of iBorderCtrl in border control and the problems that exist. The current state of domestic security against terrorist attacks and mass migration problems highlights the need for a better and more effective border management system. At the heart of the AI-based iBorderCtrl project is the ability to perform automated "deception detection" and "risk assessment" in border crossing security. iBorderCtrl's technology is built on the controversial discipline of "emotion recognition science". Systems that rely on machine learning, especially those involving facial recognition technology, have so far been problematic and biased.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xin Zhou, Zenghui Yang, Wenjun Han, Jie Kuang, and Donghua Liao "Research on the application of artificial emotional intelligence in the border: take iBorderCtrl as an example", Proc. SPIE 12329, Third International Conference on Artificial Intelligence and Electromechanical Automation (AIEA 2022), 123290I (7 September 2022); https://doi.org/10.1117/12.2646933
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Facial recognition systems

Artificial intelligence

Security technologies

Computer security

Databases

Detection and tracking algorithms

Surveillance

Back to Top