Skip to main content

Showing 1–12 of 12 results for author: G, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.05127  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Data-Free Model Extraction Attacks in the Context of Object Detection

    Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar

    Abstract: A significant number of machine learning models are vulnerable to model extraction attacks, which focus on stealing the models by using specially curated queries against the target model. This task is well accomplished by using part of the training data or a surrogate dataset to train a new model that mimics a target model in a white-box environment. In pragmatic situations, however, the target mo… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Submitted to The 14th International Conference on Computer Vision Systems (ICVS 2023), to be published in Springer, Lecture Notes in Computer Science

  2. arXiv:2207.13333  [pdf, other

    eess.AS cs.SD

    Knowledge-driven Subword Grammar Modeling for Automatic Speech Recognition in Tamil and Kannada

    Authors: Madhavaraj A, Bharathi Pilar, Ramakrishnan A G

    Abstract: In this paper, we present specially designed automatic speech recognition (ASR) systems for the highly agglutinative and inflective languages of Tamil and Kannada that can recognize unlimited vocabulary of words. We use subwords as the basic lexical units for recognition and construct subword grammar weighted finite state transducer (SG-WFST) graphs for word segmentation that captures most of the… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  3. arXiv:2207.13331  [pdf, other

    eess.AS cs.SD

    Subword Dictionary Learning and Segmentation Techniques for Automatic Speech Recognition in Tamil and Kannada

    Authors: Madhavaraj A, Bharathi Pilar, Ramakrishnan A G

    Abstract: We present automatic speech recognition (ASR) systems for Tamil and Kannada based on subword modeling to effectively handle unlimited vocabulary due to the highly agglutinative nature of the languages. We explore byte pair encoding (BPE), and proposed a variant of this algorithm named extended-BPE, and Morfessor tool to segment each word as subwords. We have effectively incorporated maximum likeli… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  4. Early Diagnosis of Lung Cancer Using Computer Aided Detection via Lung Segmentation Approach

    Authors: Abhir Bhandary, Ananth Prabhu G, Mustafa Basthikodi, Chaitra K M

    Abstract: Lung cancer begins in the lungs and leading to the reason of cancer demise amid population in the creation. According to the American Cancer Society, which estimates about 27% of the deaths because of cancer. In the early phase of its evolution, lung cancer does not cause any symptoms usually. Many of the patients have been diagnosed in a developed phase where symptoms become more prominent, that… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 9 pages, 10 figures, Published with International Journal of Engineering Trends and Technology (IJETT)

    Journal ref: International Journal of Engineering Trends and Technology 69.5(2021):85-93

  5. arXiv:2105.00777  [pdf, ps, other

    cs.CV cs.AI

    Recognition of Oracle Bone Inscriptions by using Two Deep Learning Models

    Authors: Yoshiyuki Fujikawa, Hengyi Li, Xuebin Yue, Aravinda C V, Amar Prabhu G, Lin Meng

    Abstract: Oracle bone inscriptions (OBIs) contain some of the oldest characters in the world and were used in China about 3000 years ago. As an ancient form of literature, OBIs store a lot of information that can help us understand the world history, character evaluations, and more. However, as OBIs were found only discovered about 120 years ago, few studies have described them, and the aging process has ma… ▽ More

    Submitted 4 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

  6. arXiv:2009.08322  [pdf, other

    cs.SI

    Moving with the Times: Investigating the Alt-Right Network Gab with Temporal Interaction Graphs

    Authors: Naomi A. Arnold, Benjamin A. Steer, Imane Hafnaoui, Hugo A. Parada G., Raul J. Mondragon, Felix Cuadrado, Richard G. Clegg

    Abstract: Gab is an online social network often associated with the alt-right political movement and users barred from other networks. It presents an interesting opportunity for research because near-complete data is available from day one of the network's creation. In this paper, we investigate the evolution of the user interaction graph, that is the graph where a link represents a user interacting with an… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: 10 pages, 9 figures

  7. arXiv:1909.06734  [pdf

    cs.SE

    A brief TOGAF description using SEMAT Essence Kernel

    Authors: David C. Múnera, Fernán A. Villa G

    Abstract: This work aims to explore the possibility of describing the enterprise architecture framework TOGAF using the Essence kernel SEMAT, see if they fit together, and if such marriage brings into lights any weaknesses of the models.

    Submitted 15 September, 2019; originally announced September 2019.

  8. arXiv:1901.00413  [pdf

    cs.CV

    Lipi Gnani - A Versatile OCR for Documents in any Language Printed in Kannada Script

    Authors: Shiva Kumar H R, Ramakrishnan A G

    Abstract: A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 21 pages, 16 figures, 12 tables, submitted to ACM Transactions on Asian and Low-Resource Language Information Processing

    Report number: mile_shr_agr_01_2019

  9. arXiv:1412.2857  [pdf

    cs.CR

    Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes

    Authors: Jeril Kuriakose, Amruth V., Sandesh A. G., Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty

    Abstract: Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nod… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 10 pages, 13 pages, conference

  10. Portable Camera-Based Product Label Reading For Blind People

    Authors: Rajkumar N, Anand M. G, Barathiraja N

    Abstract: We propose a camera-based assistive text reading framework to help blind persons read text labels and product packaging from hand-held objects in their daily life. To isolate the object from untidy backgrounds or other surrounding objects in the camera vision, we initially propose an efficient and effective motion based method to define a region of interest (ROI) in the video by asking the user to… ▽ More

    Submitted 16 January, 2019; v1 submitted 7 May, 2014; originally announced May 2014.

    Comments: This article has been withdrawn by arXiv administrators due to verbatim text overlap from external sources

    Journal ref: IJETT,V10(11),521-524 April 2014.ISSN:2231-5381

  11. arXiv:1111.1586  [pdf, other

    cs.SE

    Evaluation of Computability Criterions for Runtime Web Service Integration

    Authors: Thirumaran. M, Dhavachelvan. P, Aranganayagi. G, S. Abarna

    Abstract: Today's competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to exponential problem which stipulates developers to comprehend the whole service… ▽ More

    Submitted 7 November, 2011; originally announced November 2011.

    Comments: 16 pages

  12. arXiv:cs/0103001  [pdf, ps, other

    cs.DC cs.DS

    Construction of an algorithm in parallel for the Fast Fourier Transform

    Authors: G. Mario A. Higuera, Humberto Sarria, Diana Fonseca, John Idarraga

    Abstract: It has been designed,built and executed a code for the Fast Fourier Transform (FFT),compiled and executed in a cluster of 2^n computers under the operating system MacOS and using the routines MacMPI. As practical application,the code has been used to obtain the transformed from an astronomic imagen,to execute a filter on its and with a transformed inverse to recover the image with the variates g… ▽ More

    Submitted 1 March, 2001; originally announced March 2001.

    ACM Class: D.1.3