Skip to main content

Showing 1–11 of 11 results for author: Sekhar, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.08123  [pdf, other

    cs.LG cs.CL

    Memory-efficient Stochastic methods for Memory-based Transformers

    Authors: Vishwajit Kumar Vishnu, C. Chandra Sekhar

    Abstract: Training Memory-based transformers can require a large amount of memory and can be quite inefficient. We propose a novel two-phase training mechanism and a novel regularization technique to improve the training efficiency of memory-based transformers, which are often used for long-range context problems. For our experiments, we consider transformer-XL as our baseline model which is one of memoryba… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  2. arXiv:2108.02850  [pdf, other

    eess.AS cs.LG cs.SD

    Unsupervised Domain Adaptation in Speech Recognition using Phonetic Features

    Authors: Rupam Ojha, C Chandra Sekhar

    Abstract: Automatic speech recognition is a difficult problem in pattern recognition because several sources of variability exist in the speech input like the channel variations, the input might be clean or noisy, the speakers may have different accent and variations in the gender, etc. As a result, domain adaptation is important in speech recognition where we train the model for a particular source domain… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: 5 pages, 3 figures

  3. arXiv:2105.05061  [pdf, other

    cs.LG cs.CV

    Semi-Supervised Metric Learning: A Deep Resurrection

    Authors: Ujjal Kr Dutta, Mehrtash Harandi, Chellu Chandra Sekhar

    Abstract: Distance Metric Learning (DML) seeks to learn a discriminative embedding where similar examples are closer, and dissimilar examples are apart. In this paper, we address the problem of Semi-Supervised DML (SSDML) that tries to learn a metric using a few labeled examples, and abundantly available unlabeled examples. SSDML is important because it is infeasible to manually annotate all the examples pr… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: In AAAI-2021

  4. arXiv:2103.03215  [pdf, other

    eess.AS cs.SD

    Front-end Diarization for Percussion Separation in Taniavartanam of Carnatic Music Concerts

    Authors: Nauman Dawalatabad, Jilt Sebastian, Jom Kuriakose, C. Chandra Sekhar, Shrikanth Narayanan, Hema A. Murthy

    Abstract: Instrument separation in an ensemble is a challenging task. In this work, we address the problem of separating the percussive voices in the taniavartanam segments of Carnatic music. In taniavartanam, a number of percussive instruments play together or in tandem. Separation of instruments in regions where only one percussion is present leads to interference and artifacts at the output, as source se… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  5. Unsupervised Deep Metric Learning via Orthogonality based Probabilistic Loss

    Authors: Ujjal Kr Dutta, Mehrtash Harandi, Chellu Chandra Sekhar

    Abstract: Metric learning is an important problem in machine learning. It aims to group similar examples together. Existing state-of-the-art metric learning approaches require class labels to learn a metric. As obtaining class labels in all applications is not feasible, we propose an unsupervised approach that learns a metric without making use of class labels. The lack of class labels is compensated by obt… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

    Comments: In the IEEE Transactions on Artificial Intelligence (IEEE TAI)

  6. arXiv:2002.12394  [pdf, other

    cs.CV cs.LG

    Affinity guided Geometric Semi-Supervised Metric Learning

    Authors: Ujjal Kr Dutta, Mehrtash Harandi, Chellu Chandra Sekhar

    Abstract: In this paper, we revamp the forgotten classical Semi-Supervised Distance Metric Learning (SSDML) problem from a Riemannian geometric lens, to leverage stochastic optimization within a end-to-end deep framework. The motivation comes from the fact that apart from a few classical SSDML approaches learning a linear Mahalanobis metric, deep SSDML has not been studied. We first extend existing SSDML me… ▽ More

    Submitted 6 November, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: Paper accepted in NeurIPS 2020 workshop on Differential Geometry meets Deep Learning

  7. arXiv:1905.08574  [pdf

    cs.CV

    Online Signature Verification Based on Writer Specific Feature Selection and Fuzzy Similarity Measure

    Authors: Chandra Sekhar V, Prerana Mukherjee, D. S. Guru, Viswanath Pulabaigari

    Abstract: Online Signature Verification (OSV) is a widely used biometric attribute for user behavioral characteristic verification in digital forensics. In this manuscript, owing to large intra-individual variability, a novel method for OSV based on an interval symbolic representation and a fuzzy similarity measure grounded on writer specific parameter selection is proposed. The two parameters, namely, writ… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

    Comments: accepted in Applications of Computer Vision and Pattern Recognition to Media Forensics, CVPRW, 2019, Long Beach, California

  8. arXiv:1904.00240  [pdf, other

    cs.CV

    OSVNet: Convolutional Siamese Network for Writer Independent Online Signature Verification

    Authors: Chandra Sekhar, Prerana Mukherjee, Devanur S Guru, Viswanath Pulabaigari

    Abstract: Online signature verification (OSV) is one of the most challenging tasks in writer identification and digital forensics. Owing to the large intra-individual variability, there is a critical requirement to accurately learn the intra-personal variations of the signature to achieve higher classification accuracy. To achieve this, in this paper, we propose an OSV framework based on deep convolutional… ▽ More

    Submitted 21 May, 2019; v1 submitted 30 March, 2019; originally announced April 2019.

    Comments: accepted in International Conference on Document Analysis and Recognition (ICDAR 2019), University of Technology Sydney (UTS), Australia

  9. Incremental Transfer Learning in Two-pass Information Bottleneck based Speaker Diarization System for Meetings

    Authors: Nauman Dawalatabad, Srikanth Madikeri, C Chandra Sekhar, Hema A Murthy

    Abstract: The two-pass information bottleneck (TPIB) based speaker diarization system operates independently on different conversational recordings. TPIB system does not consider previously learned speaker discriminative information while diarizing new conversations. Hence, the real time factor (RTF) of TPIB system is high owing to the training time required for the artificial neural network (ANN). This pap… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: 5 pages, 2 figures, To appear in Proc. ICASSP 2019, May 12-17, 2019, Brighton, UK

  10. arXiv:1401.6121  [pdf

    cs.CR

    A Robust Password-Based Multi-Server Authentication Scheme

    Authors: Vorugunti Chandra Sekhar, Mrudula Sarvabhatla

    Abstract: In 2013, Tsai et al. cryptanalyzed Yeh et al. scheme and shown that Yeh et al., scheme is vulnerable to various cryptographic attacks and proposed an improved scheme. In this poster we will show that Tsai et al., scheme is also vulnerable to undetectable online password guessing attack, on success of the attack, the adversary can perform all major cryptographic attacks. As apart of our contributio… ▽ More

    Submitted 6 December, 2013; originally announced January 2014.

  11. arXiv:1401.1318  [pdf

    cs.CR

    A Robust Biometric-Based Three-factor Remote User Authentication Scheme

    Authors: Vorugunti Chandra Sekhar, Mrudula Sarvabhatla

    Abstract: The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnerable… ▽ More

    Submitted 7 January, 2014; originally announced January 2014.