Skip to main content

Showing 1–14 of 14 results for author: Yadav, A K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13608  [pdf, other

    cs.IT cs.CR

    Wiretapped Commitment over Binary Channels

    Authors: Anuj Kumar Yadav, Manideep Mamindlapally, Amitalok J. Budkuley

    Abstract: We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve. We seek to determine the maximum commitment throughput in the presence of an eaves… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 13 Pages, 1 figure

  2. arXiv:2404.10989  [pdf, other

    cs.CV cs.LG cs.MM cs.SD eess.AS

    FairSSD: Understanding Bias in Synthetic Speech Detectors

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Davide Salvi, Paolo Bestagini, Edward J. Delp

    Abstract: Methods that can generate synthetic speech which is perceptually indistinguishable from speech recorded by a human speaker, are easily available. Several incidents report misuse of synthetic speech generated from these methods to commit fraud. To counter such misuse, many methods have been proposed to detect synthetic speech. Some of these detectors are more interpretable, can generalize to detect… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024 (WMF)

  3. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  4. Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India

    Authors: Hasmat Malik, Amit Kumar Yadav, Fausto Pedro García Márquez, Jesús María Pinar-Pérez

    Abstract: Wind power generated by wind has non-schedule nature due to stochastic nature of meteorological variable. Hence energy business and control of wind power generation requires prediction of wind speed (WS) from few seconds to different time steps in advance. To deal with prediction shortcomings, various WS prediction methods have been used. Predictive data mining offers variety of methods for WS pre… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Malik, H., Yadav, A. K., Márquez, F. P. G., & Pinar-Pérez, J. M. (2022). Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India. Energy Strategy Reviews, 41, 100864

    Journal ref: Energy Strategy Reviews 2022. Vol 41, 100864

  5. arXiv:2312.01523  [pdf, other

    cs.CL cs.LG

    SymNoise: Advancing Language Model Fine-tuning with Symmetric Noise

    Authors: Abhay Kumar Yadav, Arjun Singh

    Abstract: In this paper, we introduce a novel fine-tuning technique for language models, which involves incorporating symmetric noise into the embedding process. This method aims to enhance the model's function by more stringently regulating its local curvature, demonstrating superior performance over the current method, NEFTune. When fine-tuning the LLaMA-2-7B model using Alpaca, standard techniques yield… ▽ More

    Submitted 8 December, 2023; v1 submitted 3 December, 2023; originally announced December 2023.

  6. arXiv:2305.07118  [pdf, other

    cs.IT cs.CR

    Commitment over Gaussian Unfair Noisy Channels

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes, however, their imprecise statistical characterization can severely impair such schemes, especially their security guarantees. Kee** our focus on channel unreliability in this work, we study commitment over unreliable con… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: The paper follows alphabetical author order. AKY, MM, and PJ have equally contributed to this work

  7. arXiv:2305.05745  [pdf, other

    cs.IT math.PR

    Information Spectrum Converse for Minimum Entropy Couplings and Functional Representations

    Authors: Yanina Y. Shkel, Anuj Kumar Yadav

    Abstract: Given two jointly distributed random variables $(X,Y)$, a functional representation of $X$ is a random variable $Z$ independent of $Y$, and a deterministic function $g(\cdot, \cdot)$ such that $X=g(Y,Z)$. The problem of finding a minimum entropy functional representation is known to be equivalent to the problem of finding a minimum entropy coupling where, given a collection of probability distribu… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 2023 IEEE International Symposium on Information Theory (ISIT)

  8. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  9. arXiv:2303.01054  [pdf

    eess.IV cs.CV

    Deep Learning based Segmentation of Optical Coherence Tomographic Images of Human Saphenous Varicose Vein

    Authors: Maryam Viqar, Violeta Madjarova, Amit Kumar Yadav, Desislava Pashkuleva, Alexander S. Machikhin

    Abstract: Deep-learning based segmentation model is proposed for Optical Coherence Tomography images of human varicose vein based on the U-Net model employing atrous convolution with residual blocks, which gives an accuracy of 0.9932.

    Submitted 2 March, 2023; originally announced March 2023.

  10. arXiv:2205.06673  [pdf

    q-fin.ST cs.AI cs.LG

    Univariate and Multivariate LSTM Model for Short-Term Stock Market Prediction

    Authors: Vishal Kuber, Divakar Yadav, Arun Kr Yadav

    Abstract: Designing robust and accurate prediction models has been a viable research area since a long time. While proponents of a well-functioning market predictors believe that it is difficult to accurately predict market prices but many scholars disagree. Robust and accurate prediction systems will not only be helpful to the businesses but also to the individuals in making their financial investments. Th… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: 24 pages, 20 figures, 8 tables

  11. arXiv:2204.12067  [pdf, other

    cs.CV cs.MM

    An Overview of Recent Work in Media Forensics: Methods and Threats

    Authors: Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp

    Abstract: In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents. For each data modality, we discuss synthesis and manipulation techniques that can be used to create and modify digital media. We then review technological advancements for detecting and quantifying such manipulations. Finally, we consider open issues and suggest directions… ▽ More

    Submitted 12 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This is a longer version of a paper accepted to the 2022 IEEE International Conference on Multimedia Information Processing and Retrieval entitled "An Overview of Recent Work in Multimedia Forensics"

  12. arXiv:2204.01849  [pdf

    cs.CL cs.IR cs.LG

    Automatic Text Summarization Methods: A Comprehensive Review

    Authors: Divakar Yadav, Jalpa Desai, Arun Kumar Yadav

    Abstract: One of the most pressing issues that have arisen due to the rapid growth of the Internet is known as information overloading. Simplifying the relevant information in the form of a summary will assist many people because the material on any topic is plentiful on the Internet. Manually summarising massive amounts of text is quite challenging for humans. So, it has increased the need for more complex… ▽ More

    Submitted 3 March, 2022; originally announced April 2022.

    Comments: 20 pages, 7 figures and 4 tables

  13. arXiv:2111.08477  [pdf, other

    cs.IT cs.CR

    On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is an important cryptographic primitive. It is well known that noisy channels are a promising resource to realize commitment in an information-theoretically secure manner. However, oftentimes, channel behaviour may be poorly characterized thereby limiting the commitment throughput and/or degrading the security guarantees; particularly problematic is when a dishonest party, unbeknown to… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 16 pages, 3 figures

  14. arXiv:1701.02357  [pdf, other

    cs.CV cs.GR

    Son of Zorn's Lemma: Targeted Style Transfer Using Instance-aware Semantic Segmentation

    Authors: Carlos Castillo, Soham De, Xintong Han, Bharat Singh, Abhay Kumar Yadav, Tom Goldstein

    Abstract: Style transfer is an important task in which the style of a source image is mapped onto that of a target image. The method is useful for synthesizing derivative works of a particular artist or specific painting. This work considers targeted style transfer, in which the style of a template image is used to alter only part of a target image. For example, an artist may wish to alter the style of only… ▽ More

    Submitted 9 January, 2017; originally announced January 2017.

    Journal ref: ICASSP 2017