Skip to main content

Showing 1–26 of 26 results for author: Patel, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10284  [pdf, other

    cs.CL cs.SD eess.AS

    Improving child speech recognition with augmented child-like speech

    Authors: Yuanyuan Zhang, Zhengjun Yue, Tanvina Patel, Odette Scharenborg

    Abstract: State-of-the-art ASRs show suboptimal performance for child speech. The scarcity of child speech limits the development of child speech recognition (CSR). Therefore, we studied child-to-child voice conversion (VC) from existing child speakers in the dataset and additional (new) child speakers via monolingual and cross-lingual (Dutch-to-German) VC, respectively. The results showed that cross-lingua… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 5 pages, 1 figure Accepted to INTERSPEECH 2024

  2. arXiv:2405.20247  [pdf, other

    cs.AI cs.CV cs.LG cs.SE

    KerasCV and KerasNLP: Vision and Language Power-Ups

    Authors: Matthew Watson, Divyashree Shivakumar Sreepathihalli, Francois Chollet, Martin Gorner, Kiranbir Sodhia, Ramesh Sampath, Tirth Patel, Haifeng **, Neel Kovelamudi, Gabriel Rasskin, Samaneh Saadat, Luke Wood, Chen Qian, Jonathan Bischof, Ian Stenbit, Abheesht Sharma, Anshuman Mishra

    Abstract: We present the Keras domain packages KerasCV and KerasNLP, extensions of the Keras API for Computer Vision and Natural Language Processing workflows, capable of running on either JAX, TensorFlow, or PyTorch. These domain packages are designed to enable fast experimentation, with a focus on ease-of-use and performance. We adopt a modular, layered design: at the library's lowest level of abstraction… ▽ More

    Submitted 5 June, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: Submitted to Journal of Machine Learning Open Source Software

    ACM Class: I.2.5; I.2.7; I.2.10

  3. arXiv:2312.17670  [pdf, other

    cs.CV cs.LG q-bio.QM q-bio.TO

    Benchmarking the CoW with the TopCoW Challenge: Topology-Aware Anatomical Segmentation of the Circle of Willis for CTA and MRA

    Authors: Kaiyuan Yang, Fabio Musio, Yihui Ma, Norman Juchler, Johannes C. Paetzold, Rami Al-Maskari, Luciano Höher, Hongwei Bran Li, Ibrahim Ethem Hamamci, Anjany Sekuboyina, Suprosanna Shit, Hou**g Huang, Chinmay Prabhakar, Ezequiel de la Rosa, Diana Waldmannstetter, Florian Kofler, Fernando Navarro, Martin Menten, Ivan Ezhov, Daniel Rueckert, Iris Vos, Ynte Ruigrok, Birgitta Velthuis, Hugo Kuijf, Julien Hämmerli , et al. (59 additional authors not shown)

    Abstract: The Circle of Willis (CoW) is an important network of arteries connecting major circulations of the brain. Its vascular architecture is believed to affect the risk, severity, and clinical outcome of serious neuro-vascular diseases. However, characterizing the highly variable CoW anatomy is still a manual and time-consuming expert task. The CoW is usually imaged by two angiographic imaging modaliti… ▽ More

    Submitted 29 April, 2024; v1 submitted 29 December, 2023; originally announced December 2023.

    Comments: 24 pages, 11 figures, 9 tables. Summary Paper for the MICCAI TopCoW 2023 Challenge

  4. arXiv:2312.15813  [pdf, other

    cs.LG

    Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits!

    Authors: Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt

    Abstract: Industry practitioners care about small improvements in malware detection accuracy because their models are deployed to hundreds of millions of machines, meaning a 0.1\% change can cause an overwhelming number of false positives. However, academic research is often restrained to public datasets on the order of ten thousand samples and is too small to detect improvements that may be relevant to ind… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

    Comments: To appear in Conference on Applied Machine Learning for Information Security 2023

  5. arXiv:2312.01059  [pdf, other

    cs.RO

    Swarm-GPT: Combining Large Language Models with Safe Motion Planning for Robot Choreography Design

    Authors: Aoran Jiao, Tanmay P. Patel, Sanjmi Khurana, Anna-Mariya Korol, Lukas Brunke, Vivek K. Adajania, Utku Culha, Siqi Zhou, Angela P. Schoellig

    Abstract: This paper presents Swarm-GPT, a system that integrates large language models (LLMs) with safe swarm motion planning - offering an automated and novel approach to deployable drone swarm choreography. Swarm-GPT enables users to automatically generate synchronized drone performances through natural language instructions. With an emphasis on safety and creativity, Swarm-GPT addresses a critical gap i… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

    Comments: 10 pages, 9 figures

  6. Improving Whispered Speech Recognition Performance using Pseudo-whispered based Data Augmentation

    Authors: Zhaofeng Lin, Tanvina Patel, Odette Scharenborg

    Abstract: Whispering is a distinct form of speech known for its soft, breathy, and hushed characteristics, often used for private communication. The acoustic characteristics of whispered speech differ substantially from normally phonated speech and the scarcity of adequate training data leads to low automatic speech recognition (ASR) performance. To address the data scarcity issue, we use a signal processin… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted to ASRU 2023

  7. arXiv:2309.15259  [pdf, other

    quant-ph cs.CV eess.IV

    SLIQ: Quantum Image Similarity Networks on Noisy Quantum Computers

    Authors: Daniel Silver, Tirthak Patel, Aditya Ranjan, Harshitta Gandhi, William Cutler, Devesh Tiwari

    Abstract: Exploration into quantum machine learning has grown tremendously in recent years due to the ability of quantum computers to speed up classical programs. However, these efforts have yet to solve unsupervised similarity detection tasks due to the challenge of porting them to run on quantum computers. To overcome this challenge, we propose SLIQ, the first open-sourced work for resource-efficient quan… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Journal ref: Vol. 37 No. 8: AAAI-2023 Technical Tracks 8

  8. QUILT: Effective Multi-Class Classification on Quantum Computers Using an Ensemble of Diverse Quantum Classifiers

    Authors: Daniel Silver, Tirthak Patel, Devesh Tiwari

    Abstract: Quantum computers can theoretically have significant acceleration over classical computers; but, the near-future era of quantum computing is limited due to small number of qubits that are also error prone. Quilt is a framework for performing multi-class classification task designed to work effectively on current error-prone quantum computers. Quilt is evaluated with real quantum machines as well a… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence 2022, 36(8), 8324-8332

  9. arXiv:2309.04635  [pdf, other

    cs.CL

    Can NLP Models 'Identify', 'Distinguish', and 'Justify' Questions that Don't have a Definitive Answer?

    Authors: Ayushi Agarwal, Nisarg Patel, Neeraj Varshney, Mihir Parmar, Pavan Mallina, Aryan Bhavin Shah, Srihari Raju Sangaraju, Tirth Patel, Nihar Thakkar, Chitta Baral

    Abstract: Though state-of-the-art (SOTA) NLP systems have achieved remarkable performance on a variety of language understanding tasks, they primarily focus on questions that have a correct and a definitive answer. However, in real-world applications, users often ask questions that don't have a definitive answer. Incorrectly answering such questions certainly hampers a system's reliability and trustworthine… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: TrustNLP Workshop at ACL 2023

  10. arXiv:2308.11096  [pdf, other

    quant-ph cs.AR cs.CV

    MosaiQ: Quantum Generative Adversarial Networks for Image Generation on NISQ Computers

    Authors: Daniel Silver, Tirthak Patel, William Cutler, Aditya Ranjan, Harshitta Gandhi, Devesh Tiwari

    Abstract: Quantum machine learning and vision have come to the fore recently, with hardware advances enabling rapid advancement in the capabilities of quantum machines. Recently, quantum image generation has been explored with many potential advantages over non-quantum techniques; however, previous techniques have suffered from poor quality and robustness. To address these problems, we introduce, MosaiQ, a… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: Accepted to appear at ICCV'23

  11. arXiv:2308.10036  [pdf, other

    cs.LG

    Semi-Supervised Anomaly Detection for the Determination of Vehicle Hijacking Tweets

    Authors: Taahir Aiyoob Patel, Clement N. Nyirenda

    Abstract: In South Africa, there is an ever-growing issue of vehicle hijackings. This leads to travellers constantly being in fear of becoming a victim to such an incident. This work presents a new semi-supervised approach to using tweets to identify hijacking incidents by using unsupervised anomaly detection algorithms. Tweets consisting of the keyword "hijacking" are obtained, stored, and processed using… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

  12. arXiv:2307.16799  [pdf, other

    quant-ph cs.AR cs.DC cs.ET

    Toward Privacy in Quantum Program Execution On Untrusted Quantum Cloud Computing Machines for Business-sensitive Quantum Needs

    Authors: Tirthak Patel, Daniel Silver, Aditya Ranjan, Harshitta Gandhi, William Cutler, Devesh Tiwari

    Abstract: Quantum computing is an emerging paradigm that has shown great promise in accelerating large-scale scientific, optimization, and machine-learning workloads. With most quantum computing solutions being offered over the cloud, it has become imperative to protect confidential and proprietary quantum code from being accessed by untrusted and/or adversarial agents. In response to this challenge, we pro… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

  13. arXiv:2307.02762  [pdf, other

    cs.CL cs.AI

    PRD: Peer Rank and Discussion Improve Large Language Model based Evaluations

    Authors: Ruosen Li, Teerth Patel, Xinya Du

    Abstract: Nowadays, the quality of responses generated by different modern large language models (LLMs) is hard to evaluate and compare automatically. Recent studies suggest and predominantly use LLMs for reference-free evaluation of open-ended question answering. More specifically, they use the recognized "strongest" LLM as the evaluator, which conducts pairwise comparisons of candidate models' answers and… ▽ More

    Submitted 3 July, 2024; v1 submitted 6 July, 2023; originally announced July 2023.

    Comments: Accepted by TMLR

  14. arXiv:2307.02009  [pdf, other

    cs.CL

    Using Data Augmentations and VTLN to Reduce Bias in Dutch End-to-End Speech Recognition Systems

    Authors: Tanvina Patel, Odette Scharenborg

    Abstract: Speech technology has improved greatly for norm speakers, i.e., adult native speakers of a language without speech impediments or strong accents. However, non-norm or diverse speaker groups show a distinct performance gap with norm speakers, which we refer to as bias. In this work, we aim to reduce bias against different age groups and non-native speakers of Dutch. For an end-to-end (E2E) ASR syst… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 5 Pages, 2 Figures, 5 Tables

  15. arXiv:2306.06228  [pdf, other

    cs.CR cs.LG

    AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora

    Authors: Robert J. Joyce, Tirth Patel, Charles Nicholas, Edward Raff

    Abstract: When investigating a malicious file, searching for related files is a common task that malware analysts must perform. Given that production malware corpora may contain over a billion files and consume petabytes of storage, many feature extraction and similarity search approaches are computationally infeasible. Our work explores the potential of antivirus (AV) scan data as a scalable source of feat… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

  16. arXiv:2212.05028  [pdf, other

    cs.CR cs.NI

    A systematic literature review on Security of Unmanned Aerial Vehicle Systems

    Authors: Tirth Patel, Niyatiben Salot, Vrusha Parikh

    Abstract: Unmanned aerial vehicles (UAVs) are becoming more common, and their operational range is expanding tremendously, making the security aspect of the inquiry essential. This study does a thorough assessment of the literature to determine the most common cyberattacks and the effects they have on UAV assaults on civilian targets. The STRIDE assault paradigm, the challenge they present, and the proper t… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: 10 Pages, 4 Figures

  17. arXiv:2211.10028  [pdf

    cs.CR

    Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments

    Authors: Tanvi S. Patel, Srinivasakranthikiran Kolachina, Daxesh P. Patel, Pranav S. Shrivastav

    Abstract: A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive data, as well as improve the security of clie… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 20 pages, 4 Figures

  18. arXiv:2211.09903  [pdf, other

    quant-ph cs.ET

    CHARTER: Identifying the Most-Critical Gate Operations in Quantum Circuits via Amplified Gate Reversibility

    Authors: Tirthak Patel, Daniel Silver, Devesh Tiwari

    Abstract: When quantum programs are executed on noisy intermediate-scale quantum (NISQ) computers, they experience hardware noise; consequently, the program outputs are often erroneous. To mitigate the adverse effects of hardware noise, it is necessary to understand the effect of hardware noise on the program output and more fundamentally, understand the impact of hardware noise on specific regions within a… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: This worked was published in SC'22

    Journal ref: SC22: International Conference for High Performance Computing, Networking, Storage and Analysis (SC), pp. 189-204. IEEE Computer Society, 2022

  19. arXiv:2208.10280  [pdf, other

    cs.CL cs.LG

    A Twitter-Driven Deep Learning Mechanism for the Determination of Vehicle Hijacking Spots in Cities

    Authors: Taahir Aiyoob Patel, Clement N. Nyirenda

    Abstract: Vehicle hijacking is one of the leading crimes in many cities. For instance, in South Africa, drivers must constantly remain vigilant on the road in order to ensure that they do not become hijacking victims. This work is aimed at develo** a map depicting hijacking spots in a city by using Twitter data. Tweets, which include the keyword "hijacking", are obtained in a designated city of Cape Town,… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  20. RIBBON: Cost-Effective and QoS-Aware Deep Learning Model Inference using a Diverse Pool of Cloud Computing Instances

    Authors: Baolin Li, Rohan Basu Roy, Tirthak Patel, Vijay Gadepally, Karen Gettings, Devesh Tiwari

    Abstract: Deep learning model inference is a key service in many businesses and scientific discovery processes. This paper introduces RIBBON, a novel deep learning inference serving system that meets two competing objectives: quality-of-service (QoS) target and cost-effectiveness. The key idea behind RIBBON is to intelligently employ a diverse set of cloud computing instances (heterogeneous instances) to me… ▽ More

    Submitted 28 July, 2022; v1 submitted 23 July, 2022; originally announced July 2022.

  21. MISO: Exploiting Multi-Instance GPU Capability on Multi-Tenant Systems for Machine Learning

    Authors: Baolin Li, Tirthak Patel, Siddarth Samsi, Vijay Gadepally, Devesh Tiwari

    Abstract: GPU technology has been improving at an expedited pace in terms of size and performance, empowering HPC and AI/ML researchers to advance the scientific discovery process. However, this also leads to inefficient resource usage, as most GPU workloads, including complicated AI/ML models, are not able to utilize the GPU resources to their fullest extent -- encouraging support for GPU multi-tenancy. We… ▽ More

    Submitted 6 October, 2022; v1 submitted 23 July, 2022; originally announced July 2022.

  22. arXiv:2206.12489  [pdf, other

    eess.AS cs.SD

    Predicting within and across language phoneme recognition performance of self-supervised learning speech pre-trained models

    Authors: Hang Ji, Tanvina Patel, Odette Scharenborg

    Abstract: In this work, we analyzed and compared speech representations extracted from different frozen self-supervised learning (SSL) speech pre-trained models on their ability to capture articulatory features (AF) information and their subsequent prediction of phone recognition performance for within and across language scenarios. Specifically, we compared CPC, wav2vec 2.0, and HuBert. First, frame-level… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

    Comments: Submitted to INTERSPEECH 2022

  23. arXiv:2108.12714  [pdf, other

    quant-ph cs.ET

    Robust and Resource-Efficient Quantum Circuit Approximation

    Authors: Tirthak Patel, Ed Younis, Costin Iancu, Wibe de Jong, Devesh Tiwari

    Abstract: We present QEst, a procedure to systematically generate approximations for quantum circuits to reduce their CNOT gate count. Our approach employs circuit partitioning for scalability with procedures to 1) reduce circuit length using approximate synthesis, 2) improve fidelity by running circuits that represent key samples in the approximation space, and 3) reason about approximation upper bound. Ou… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  24. arXiv:2102.01153  [pdf, other

    quant-ph cs.ET

    DisQ: A Novel Quantum Output State Classification Method on IBM Quantum Computers using OpenPulse

    Authors: Tirthak Patel, Devesh Tiwari

    Abstract: Superconducting quantum computing technology has ushered in a new era of computational possibilities. While a considerable research effort has been geared toward improving the quantum technology and building the software stack to efficiently execute quantum algorithms with reduced error rate, effort toward optimizing how quantum output states are defined and classified for the purpose of reducing… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Journal ref: In Proceedings of the 39th International Conference on Computer-Aided Design (pp. 1-9) (2020)

  25. arXiv:2101.11935  [pdf, other

    cs.LG eess.IV

    A Machine Learning Challenge for Prognostic Modelling in Head and Neck Cancer Using Multi-modal Data

    Authors: Michal Kazmierski, Mattea Welch, Se** Kim, Chris McIntosh, Princess Margaret Head, Neck Cancer Group, Katrina Rey-McIntyre, Shao Hui Huang, Tirth Patel, Tony Tadic, Michael Milosevic, Fei-Fei Liu, Andrew Hope, Scott Bratman, Benjamin Haibe-Kains

    Abstract: Accurate prognosis for an individual patient is a key component of precision oncology. Recent advances in machine learning have enabled the development of models using a wider range of data, including imaging. Radiomics aims to extract quantitative predictive and prognostic biomarkers from routine medical imaging, but evidence for computed tomography radiomics for prognosis remains inconclusive. W… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: 27 pages, 7 figures, under review

  26. arXiv:1504.07713  [pdf

    cs.SE

    Comparative Stability of Cloned and Non-cloned Code: A Replication Study

    Authors: Oualid El Halimi, Trith Patel, Zohaib S. Kiyani, Naresh. Kumar, Ankit Singh

    Abstract: Code cloning is an important software engineering aspect. It is a common software reuse principle that consists of duplicating source code within a program or across different systems owned or maintained by the same entity. There are several contradictory claims concerning the impact of cloning on software stability and maintenance effort. Some papers state that cloning is desired since it speeds… ▽ More

    Submitted 28 April, 2015; originally announced April 2015.

    Comments: 10 pages, 11 Tables, 3 figures