Skip to main content

Showing 1–12 of 12 results for author: V., K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14489  [pdf, other

    cs.SD cs.AI eess.AS

    End-to-End User-Defined Keyword Spotting using Shifted Delta Coefficients

    Authors: Kesavaraj V, Anuprabha M, Anil Kumar Vuppala

    Abstract: Identifying user-defined keywords is crucial for personalizing interactions with smart devices. Previous approaches of user-defined keyword spotting (UDKWS) have relied on short-term spectral features such as mel frequency cepstral coefficients (MFCC) to detect the spoken keyword. However, these features may face challenges in accurately identifying closely related pronunciation of audio-text pair… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2404.04654  [pdf

    cs.CV cs.IR

    Music Recommendation Based on Facial Emotion Recognition

    Authors: Rajesh B, Keerthana V, Narayana Darapaneni, Anwesh Reddy P

    Abstract: Introduction: Music provides an incredible avenue for individuals to express their thoughts and emotions, while also serving as a delightful mode of entertainment for enthusiasts and music lovers. Objectives: This paper presents a comprehensive approach to enhancing the user experience through the integration of emotion recognition, music recommendation, and explainable AI using GRAD-CAM. Methods:… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  3. arXiv:2404.03914  [pdf, other

    cs.HC cs.SD eess.AS

    Open vocabulary keyword spotting through transfer learning from speech synthesis

    Authors: Kesavaraj V, Anil Kumar Vuppala

    Abstract: Identifying keywords in an open-vocabulary context is crucial for personalizing interactions with smart devices. Previous approaches to open vocabulary keyword spotting dependon a shared embedding space created by audio and text encoders. However, these approaches suffer from heterogeneous modality representations (i.e., audio-text mismatch). To address this issue, our proposed framework leverages… ▽ More

    Submitted 18 April, 2024; v1 submitted 5 April, 2024; originally announced April 2024.

  4. arXiv:2401.11324  [pdf, other

    cs.DC

    BANG: Billion-Scale Approximate Nearest Neighbor Search using a Single GPU

    Authors: Karthik V., Saim Khan, Somesh Singh, Harsha Vardhan Simhadri, Jyothi Vedurada

    Abstract: Approximate Nearest Neighbour Search (ANNS) is a subroutine in algorithms routinely employed in information retrieval, pattern recognition, data mining, image processing, and beyond. Recent works have established that graph-based ANNS algorithms are practically more efficient than the other methods proposed in the literature, on large datasets. The growing volume and dimensionality of data necessi… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  5. arXiv:2304.06861  [pdf, other

    cs.CL cs.CY cs.LG

    Evaluation of Social Biases in Recent Large Pre-Trained Models

    Authors: Swapnil Sharma, Nikita Anand, Kranthi Kiran G. V., Alind Jain

    Abstract: Large pre-trained language models are widely used in the community. These models are usually trained on unmoderated and unfiltered data from open sources like the Internet. Due to this, biases that we see in platforms online which are a reflection of those in society are in turn captured and learned by these models. These models are deployed in applications that affect millions of people and their… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: 7 pages, 4 Tables

  6. arXiv:2211.06153  [pdf, other

    cs.CR

    SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware

    Authors: Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V

    Abstract: Malware programs are diverse, with varying objectives, functionalities, and threat levels ranging from mere pop-ups to financial losses. Consequently, their run-time footprints across the system differ, impacting the optimal data source (Network, Operating system (OS), Hardware) and features that are instrumental to malware detection. Further, the variations in threat levels of malware classes aff… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  7. arXiv:2201.08574  [pdf, other

    cs.CV cs.AI cs.MM

    Classroom Slide Narration System

    Authors: Jobin K. V., Ajoy Mondal, C. V. Jawahar

    Abstract: Slide presentations are an effective and efficient tool used by the teaching community for classroom communication. However, this teaching model can be challenging for blind and visually impaired (VI) students. The VI student required personal human assistance for understand the presented slide. This shortcoming motivates us to design a Classroom Slide Narration System (CSNS) that generates audio… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

    Journal ref: CVIP 2021

  8. White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis

    Authors: Gargi Mitra, Prasanna Karthik Vairam, Patanjali SLPSK, Nitin Chandrachoodan, Kamakoti V

    Abstract: Privacy leaks from Netflix videos/movies is well researched. Current state-of-the-art works have been able to obtain coarse-grained information such as the genre and the title of videos by passive observation of encrypted traffic. However, leakage of fine-grained information from encrypted traffic has not been studied so far. Such information can be used to build behavioural profiles of viewers.… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: 2 pages, 2 figures, 1 table

  9. arXiv:1903.04143  [pdf, other

    cs.CV

    The Unconstrained Ear Recognition Challenge 2019 - ArXiv Version With Appendix

    Authors: Žiga Emeršič, Aruna Kumar S. V., B. S. Harish, Weronika Gutfeter, Jalil Nourmohammadi Khiarak, Andrzej Pacut, Earnest Hansley, Mauricio Pamplona Segundo, Sudeep Sarkar, Hyeonjung Park, Gi Pyo Nam, Ig-Jae Kim, Sagar G. Sangodkar, Ümit Kaçar, Murvet Kirci, Li Yuan, Jishou Yuan, Haonan Zhao, Fei Lu, Junying Mao, Xiaoshuang Zhang, Dogucan Yaman, Fevziye Irem Eyiokur, Kadir Bulut Özler, Hazım Kemal Ekenel , et al. (6 additional authors not shown)

    Abstract: This paper presents a summary of the 2019 Unconstrained Ear Recognition Challenge (UERC), the second in a series of group benchmarking efforts centered around the problem of person recognition from ear images captured in uncontrolled settings. The goal of the challenge is to assess the performance of existing ear recognition techniques on a challenging large-scale ear dataset and to analyze perfor… ▽ More

    Submitted 14 March, 2019; v1 submitted 11 March, 2019; originally announced March 2019.

    Comments: The content of this paper was published in ICB, 2019. This ArXiv version is from before the peer review

  10. arXiv:1806.00683  [pdf, other

    cs.AI

    Deep Pepper: Expert Iteration based Chess agent in the Reinforcement Learning Setting

    Authors: Sai Krishna G. V., Kyle Goyette, Ahmad Chamseddine, Breandan Considine

    Abstract: An almost-perfect chess playing agent has been a long standing challenge in the field of Artificial Intelligence. Some of the recent advances demonstrate we are approaching that goal. In this project, we provide methods for faster training of self-play style algorithms, mathematical details of the algorithm used, various potential future directions, and discuss most of the relevant work in the are… ▽ More

    Submitted 17 October, 2018; v1 submitted 2 June, 2018; originally announced June 2018.

    Comments: Tabula Rasa, Chess engine, Learning Fast and Slow, Reinforcement Learning, Alpha Zero

  11. Privacy Shielding against Mass Surveillance

    Authors: Kashyap. V, Boominathan. P

    Abstract: Privacy Shielding against Mass Surveillance provides a step by step tactical approach to protecting the privacy of all the users of the internet from mass surveillance programs by the governments and other state agencies. Protection of privacy is of prime importance and Privacy Shielding provides the right means against mass surveillance programs and from malicious users trying to gain access to y… ▽ More

    Submitted 17 February, 2014; originally announced February 2014.

    Comments: 8 pages,8 figures,Published with International Journal of Engineering Trends and Technology (IJETT)

  12. arXiv:1303.0908  [pdf

    cs.PL

    KRAB Algorithm - A Revised Algorithm for Incremental Call Graph Generation

    Authors: Rajasekhara Babu, Krishnakumar V., George Abraham, Kiransinh Borasia

    Abstract: This paper is aimed to present the importance and implementation of an incremental call graph plugin. An algorithm is proposed for the call graph implementation which has better overall performance than the algorithm that has been proposed previously. In addition to this, the algorithm has been empirically proved to have excellent performance on recursive codes. The algorithm also readily checks f… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: 6 pages, 7 figures, 1 Table, Conference

    Journal ref: World Applied Programming, Vol (2), Issue (5), May 2012. 294-299, Special section for proceeding of International E-Conference on Information Technology and Applications (IECITA), ISSN: 2222-2510