Alert button
Picture for Rajiv Ratn Shah

Rajiv Ratn Shah

Alert button

Intent Classification Using Pre-Trained Embeddings For Low Resource Languages

Add code
Bookmark button
Alert button
Oct 18, 2021
Hemant Yadav, Akshat Gupta, Sai Krishna Rallabandi, Alan W Black, Rajiv Ratn Shah

Figure 1 for Intent Classification Using Pre-Trained Embeddings For Low Resource Languages
Figure 2 for Intent Classification Using Pre-Trained Embeddings For Low Resource Languages
Figure 3 for Intent Classification Using Pre-Trained Embeddings For Low Resource Languages
Figure 4 for Intent Classification Using Pre-Trained Embeddings For Low Resource Languages
Viaarxiv icon

Speech Toxicity Analysis: A New Spoken Language Processing Task

Add code
Bookmark button
Alert button
Oct 14, 2021
Sreyan Ghosh, Samden Lepcha, S Sakshi, Rajiv Ratn Shah

Figure 1 for Speech Toxicity Analysis: A New Spoken Language Processing Task
Figure 2 for Speech Toxicity Analysis: A New Spoken Language Processing Task
Figure 3 for Speech Toxicity Analysis: A New Spoken Language Processing Task
Figure 4 for Speech Toxicity Analysis: A New Spoken Language Processing Task
Viaarxiv icon

AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses

Add code
Bookmark button
Alert button
Oct 14, 2021
Yaman Kumar Singla, Swapnil Parekh, Somesh Singh, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen

Figure 1 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 2 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 3 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 4 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Viaarxiv icon

NoisyActions2M: A Multimedia Dataset for Video Understanding from Noisy Labels

Add code
Bookmark button
Alert button
Oct 13, 2021
Mohit Sharma, Raj Patra, Harshal Desai, Shruti Vyas, Yogesh Rawat, Rajiv Ratn Shah

Figure 1 for NoisyActions2M: A Multimedia Dataset for Video Understanding from Noisy Labels
Figure 2 for NoisyActions2M: A Multimedia Dataset for Video Understanding from Noisy Labels
Figure 3 for NoisyActions2M: A Multimedia Dataset for Video Understanding from Noisy Labels
Figure 4 for NoisyActions2M: A Multimedia Dataset for Video Understanding from Noisy Labels
Viaarxiv icon

Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks

Add code
Bookmark button
Alert button
Oct 13, 2021
Anuj Saraswat, Mehar Bhatia, Yaman Kumar Singla, Changyou Chen, Rajiv Ratn Shah

Figure 1 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 2 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 3 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 4 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Viaarxiv icon

MINIMAL: Mining Models for Data Free Universal Adversarial Triggers

Add code
Bookmark button
Alert button
Sep 25, 2021
Swapnil Parekh, Yaman Singla Kumar, Somesh Singh, Changyou Chen, Balaji Krishnamurthy, Rajiv Ratn Shah

Figure 1 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 2 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 3 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 4 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Viaarxiv icon

AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses

Add code
Bookmark button
Alert button
Sep 24, 2021
Yaman Kumar Singla, Swapnil Parekh, Somesh Singh, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen

Figure 1 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 2 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 3 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 4 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Viaarxiv icon

Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring

Add code
Bookmark button
Alert button
Aug 30, 2021
Yaman Kumar Singla, Avykat Gupta, Shaurya Bagga, Changyou Chen, Balaji Krishnamurthy, Rajiv Ratn Shah

Figure 1 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 2 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 3 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 4 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Viaarxiv icon

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jun 15, 2021
Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Figure 1 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 2 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 3 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 4 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Viaarxiv icon