Skip to main content

Showing 1–10 of 10 results for author: Sahin, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.03964  [pdf, other

    cs.CV

    Enhancing Multimodal Compositional Reasoning of Visual Language Models with Generative Negative Mining

    Authors: Ugur Sahin, Hang Li, Qadeer Khan, Daniel Cremers, Volker Tresp

    Abstract: Contemporary large-scale visual language models (VLMs) exhibit strong representation capacities, making them ubiquitous for enhancing image and text understanding tasks. They are often trained in a contrastive manner on a large and diverse corpus of images and corresponding text captions scraped from the internet. Despite this, VLMs often struggle with compositional reasoning tasks which require a… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: Accepted to WACV

  2. arXiv:2307.14913  [pdf, other

    cs.CL

    ARC-NLP at PAN 2023: Transition-Focused Natural Language Inference for Writing Style Detection

    Authors: Izzet Emre Kucukkaya, Umitcan Sahin, Cagri Toraman

    Abstract: The task of multi-author writing style detection aims at finding any positions of writing style change in a given text document. We formulate the task as a natural language inference problem where two consecutive paragraphs are paired. Our approach focuses on transitions between paragraphs while truncating input tokens for the task. As backbone models, we employ different Transformer-based encoder… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: Accepted by PAN at CLEF 2023

  3. arXiv:2307.14912  [pdf, other

    cs.CL cs.SI

    ARC-NLP at PAN 2023: Hierarchical Long Text Classification for Trigger Detection

    Authors: Umitcan Sahin, Izzet Emre Kucukkaya, Cagri Toraman

    Abstract: Fanfiction, a popular form of creative writing set within established fictional universes, has gained a substantial online following. However, ensuring the well-being and safety of participants has become a critical concern in this community. The detection of triggering content, material that may cause emotional distress or trauma to readers, poses a significant challenge. In this paper, we descri… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: Accepted by PAN at CLEF 2023

  4. arXiv:2307.13829  [pdf, other

    cs.CL cs.SI

    ARC-NLP at Multimodal Hate Speech Event Detection 2023: Multimodal Methods Boosted by Ensemble Learning, Syntactical and Entity Features

    Authors: Umitcan Sahin, Izzet Emre Kucukkaya, Oguzhan Ozcelik, Cagri Toraman

    Abstract: Text-embedded images can serve as a means of spreading hate speech, propaganda, and extremist beliefs. Throughout the Russia-Ukraine war, both opposing factions heavily relied on text-embedded images as a vehicle for spreading propaganda and hate speech. Ensuring the effective detection of hate speech and propaganda is of utmost importance to mitigate the negative effect of hate speech disseminati… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Submitted to CASE at RANLP 2023

  5. arXiv:2302.13403  [pdf, other

    cs.SI cs.CL cs.IR

    Tweets Under the Rubble: Detection of Messages Calling for Help in Earthquake Disaster

    Authors: Cagri Toraman, Izzet Emre Kucukkaya, Oguzhan Ozcelik, Umitcan Sahin

    Abstract: The importance of social media is again exposed in the recent tragedy of the 2023 Turkey and Syria earthquake. Many victims who were trapped under the rubble called for help by posting messages in Twitter. We present an interactive tool to provide situational awareness for missing and trapped people, and disaster relief for rescue and donation efforts. The system (i) collects tweets, (ii) classifi… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

  6. arXiv:2301.03206  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Introducing Model Inversion Attacks on Automatic Speaker Recognition

    Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger

    Abstract: Model inversion (MI) attacks allow to reconstruct average per-class representations of a machine learning (ML) model's training data. It has been shown that in scenarios where each class corresponds to a different individual, such as face classifiers, this represents a severe privacy risk. In this work, we explore a new application for MI: the extraction of speakers' voices from a speaker recognit… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: for associated pdf, see https://www.isca-speech.org/archive/pdfs/spsc_2022/pizzi22_spsc.pdf

    Journal ref: Proc. 2nd Symposium on Security and Privacy in Speech Communication, 2022

  7. arXiv:2212.03616  [pdf, other

    eess.IV cs.MM

    Image Compression With Learned Lifting-Based DWT and Learned Tree-Based Entropy Models

    Authors: Ugur Berk Sahin, Fatih Kamisli

    Abstract: This paper explores learned image compression based on traditional and learned discrete wavelet transform (DWT) architectures and learned entropy models for coding DWT subband coefficients. A learned DWT is obtained through the lifting scheme with learned nonlinear predict and update filters. Several learned entropy models are proposed to exploit inter and intra-DWT subband coefficient dependencie… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: 11 pages, 17 figures

  8. arXiv:2012.01736  [pdf, other

    q-bio.BM cs.LG

    Designing a Prospective COVID-19 Therapeutic with Reinforcement Learning

    Authors: Marcin J. Skwark, Nicolás López Carranza, Thomas Pierrot, Joe Phillips, Slim Said, Alexandre Laterre, Amine Kerkeni, Uğur Şahin, Karim Beguir

    Abstract: The SARS-CoV-2 pandemic has created a global race for a cure. One approach focuses on designing a novel variant of the human angiotensin-converting enzyme 2 (ACE2) that binds more tightly to the SARS-CoV-2 spike protein and diverts it from human cells. Here we formulate a novel protein design framework as a reinforcement learning problem. We generate new designs efficiently through the combination… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

  9. arXiv:2007.13212  [pdf, other

    cs.DC

    Demo: A Proof-of-Concept Implementation of Guard Secure Routing Protocol

    Authors: Sanaz Taheri-Boshrooyeh, Ali Utkan Şahin, Yahya Hassanzadeh-Nazarabadi, Öznur Özkasap

    Abstract: Skip Graphs belong to the family of Distributed Hash Table (DHT) structures that are utilized as routing overlays in various peer-to-peer applications including blockchains, cloud storage, and social networks. In a Skip Graph overlay, any misbehavior of peers during the routing of a query compromises the system functionality. Guard is the first authenticated search mechanism for Skip Graphs, enabl… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: 3 pages

  10. arXiv:2007.13200  [pdf, other

    cs.DC

    SkipSim: Scalable Skip Graph Simulator

    Authors: Yahya Hassanzadeh-Nazarabadi, Ali Utkan Şahin, Öznur Özkasap, Alptekin Küpçü

    Abstract: SkipSim is an offline Skip Graph simulator that enables Skip Graph-based algorithms including blockchains and P2P cloud storage to be simulated while preserving their scalability and decentralized nature. To the best of our knowledge, it is the first Skip Graph simulator that provides several features for experimentation on Skip Graph-based overlay networks. In this demo paper, we present SkipSim… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.