Alert button
Picture for Daniel Park

Daniel Park

Alert button

Large-scale Language Model Rescoring on Long-form Data

Add code
Bookmark button
Alert button
Jun 13, 2023
Tongzhou Chen, Cyril Allauzen, Yinghui Huang, Daniel Park, David Rybach, W. Ronny Huang, Rodrigo Cabrera, Kartik Audhkhasi, Bhuvana Ramabhadran, Pedro J. Moreno, Michael Riley

Figure 1 for Large-scale Language Model Rescoring on Long-form Data
Figure 2 for Large-scale Language Model Rescoring on Long-form Data
Figure 3 for Large-scale Language Model Rescoring on Long-form Data
Figure 4 for Large-scale Language Model Rescoring on Long-form Data
Viaarxiv icon

Universal Paralinguistic Speech Representations Using Self-Supervised Conformers

Add code
Bookmark button
Alert button
Oct 09, 2021
Joel Shor, Aren Jansen, Wei Han, Daniel Park, Yu Zhang

Figure 1 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 2 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 3 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 4 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Viaarxiv icon

Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models

Add code
Bookmark button
Alert button
Jul 08, 2021
Daniel Park, Haidar Khan, Azer Khan, Alex Gittens, Bülent Yener

Figure 1 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 2 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 3 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 4 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Viaarxiv icon

SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network

Add code
Bookmark button
Alert button
Apr 27, 2021
William Chan, Daniel Park, Chris Lee, Yu Zhang, Quoc Le, Mohammad Norouzi

Figure 1 for SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network
Figure 2 for SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network
Viaarxiv icon

Towards Obfuscated Malware Detection for Low Powered IoT Devices

Add code
Bookmark button
Alert button
Nov 06, 2020
Daniel Park, Hannah Powers, Benji Prashker, Leland Liu, Bülent Yener

Figure 1 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 2 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 3 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 4 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Viaarxiv icon

A survey on practical adversarial examples for malware classifiers

Add code
Bookmark button
Alert button
Nov 06, 2020
Daniel Park, Bülent Yener

Figure 1 for A survey on practical adversarial examples for malware classifiers
Figure 2 for A survey on practical adversarial examples for malware classifiers
Figure 3 for A survey on practical adversarial examples for malware classifiers
Viaarxiv icon

Thwarting finite difference adversarial attacks with output randomization

Add code
Bookmark button
Alert button
May 23, 2019
Haidar Khan, Daniel Park, Azer Khan, Bülent Yener

Figure 1 for Thwarting finite difference adversarial attacks with output randomization
Figure 2 for Thwarting finite difference adversarial attacks with output randomization
Figure 3 for Thwarting finite difference adversarial attacks with output randomization
Figure 4 for Thwarting finite difference adversarial attacks with output randomization
Viaarxiv icon

Short Paper: Creating Adversarial Malware Examples using Code Insertion

Add code
Bookmark button
Alert button
Apr 09, 2019
Daniel Park, Haidar Khan, Bülent Yener

Figure 1 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 2 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 3 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 4 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Viaarxiv icon