Skip to main content

Showing 1–4 of 4 results for author: Sarkar, E

Searching in archive eess. Search in all archives.
.
  1. arXiv:2305.14035  [pdf, other

    cs.LG cs.SD eess.AS

    Can Self-Supervised Neural Representations Pre-Trained on Human Speech distinguish Animal Callers?

    Authors: Eklavya Sarkar, Mathew Magimai. -Doss

    Abstract: Self-supervised learning (SSL) models use only the intrinsic structure of a given signal, independent of its acoustic domain, to extract essential information from the input to an embedding space. This implies that the utility of such representations is not limited to modeling human speech alone. Building on this understanding, this paper explores the cross-transferability of SSL neural representa… ▽ More

    Submitted 8 June, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: Accepted at Interspeech 2023

  2. Unsupervised Voice Activity Detection by Modeling Source and System Information using Zero Frequency Filtering

    Authors: Eklavya Sarkar, RaviShankar Prasad, Mathew Magimai. -Doss

    Abstract: Voice activity detection (VAD) is an important pre-processing step for speech technology applications. The task consists of deriving segment boundaries of audio signals which contain voicing information. In recent years, it has been shown that voice source and vocal tract system information can be extracted using zero-frequency filtering (ZFF) without making any explicit model assumptions about th… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: Accepted at Interspeech 2022

  3. arXiv:2101.00008  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    Explainability Matters: Backdoor Attacks on Medical Imaging

    Authors: Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout

    Abstract: Deep neural networks have been shown to be vulnerable to backdoor attacks, which could be easily introduced to the training set prior to model training. Recent work has focused on investigating backdoor attacks on natural images or toy datasets. Consequently, the exact impact of backdoors is not yet fully understood in complex real-world applications, such as in medical imaging where misdiagnosis… ▽ More

    Submitted 30 December, 2020; originally announced January 2021.

  4. arXiv:2003.07859  [pdf, other

    cs.CR cs.LG eess.SY physics.soc-ph stat.ML

    Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

    Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Recent work has shown that the introduction of autonomous vehicles (AVs) in traffic could help reduce traffic jams. Deep reinforcement learning methods demonstrate good performance in complex control problems, including autonomous vehicle control, and have been used in state-of-the-art AV controllers. However, deep neural networks (DNNs) render automated driving vulnerable to machine learning-base… ▽ More

    Submitted 26 August, 2021; v1 submitted 17 March, 2020; originally announced March 2020.

    Report number: 2021

    Journal ref: IEEE Transactions on Information Forensics and Security, 2021