
-
The DKU-Duke-Lenovo System Description for the Third DIHARD Speech Diarization Challenge
In this paper, we present the submitted system for the third DIHARD Spee...
read it
-
A Unified Deep Speaker Embedding Framework for Mixed-Bandwidth Speech Data
This paper proposes a unified deep speaker embedding framework for model...
read it
-
Exploring Voice Conversion based Data Augmentation in Text-Dependent Speaker Verification
In this paper, we focus on improving the performance of the text-depende...
read it
-
Training Wake Word Detection with Synthesized Speech Data on Confusion Words
Confusing-words are commonly encountered in real-life keyword spotting a...
read it
-
An iterative framework for self-supervised deep speaker representation learning
In this paper, we propose an iterative framework for self-supervised spe...
read it
-
AISHELL-3: A Multi-speaker Mandarin TTS Corpus and the Baselines
In this paper, we present AISHELL-3, a large-scale and high-fidelity mul...
read it
-
Self-Supervised Visual Attention Learning for Vehicle Re-Identification
Visual attention learning (VAL) aims to produce a confidence map as weig...
read it
-
RNN Training along Locally Optimal Trajectories via Frank-Wolfe Algorithm
We propose a novel and efficient training method for RNNs by iteratively...
read it
-
PointIso: Point Cloud Based Deep Learning Model for Detecting Arbitrary-Precision Peptide Features in LC-MS Map through Attention Based Segmentation
A promising technique of discovering disease biomarkers is to measure th...
read it
-
LodoNet: A Deep Neural Network with 2D Keypoint Matchingfor 3D LiDAR Odometry Estimation
Deep learning based LiDAR odometry (LO) estimation attracts increasing r...
read it
-
To Paraphrase or Not To Paraphrase: User-Controllable Selective Paraphrase Generation
In this article, we propose a paraphrase generation technique to keep th...
read it
-
On the Approximation Lower Bound for Neural Nets with Random Weights
A random net is a shallow neural network where the hidden layer is froze...
read it
-
Synergy between Machine/Deep Learning and Software Engineering: How Far Are We?
Since 2009, the deep learning revolution, which was triggered by the int...
read it
-
Mask Detection and Breath Monitoring from Speech: on Data Augmentation, Feature Representation and Modeling
This paper introduces our approaches for the Mask and Breathing Sub-Chal...
read it
-
Graph Neural Networks with Haar Transform-Based Convolution and Pooling: A Complete Guide
Graph Neural Networks (GNNs) have recently caught great attention and ac...
read it
-
Prediction of the onset of cardiovascular diseases from electronic health records using multi-task gated recurrent units
In this work, we propose a multi-task recurrent neural network with atte...
read it
-
Demo: iJam with Channel Randomization
Physical-layer key generation methods utilize the variations of the comm...
read it
-
Path Integral Based Convolution and Pooling for Graph Neural Networks
Graph neural networks (GNNs) extends the functionality of traditional ne...
read it
-
TreeRNN: Topology-Preserving Deep GraphEmbedding and Learning
In contrast to the literature where the graph local patterns are capture...
read it
-
Learning to Utilize Correlated Auxiliary Classical or Quantum Noise
This paper has two messages. First, we demonstrate that neural networks ...
read it
-
Acoustic Word Embedding System for Code-Switching Query-by-example Spoken Term Detection
In this paper, we propose a deep convolutional neural network-based acou...
read it
-
Cross-lingual Multispeaker Text-to-Speech under Limited-Data Scenario
Modeling voices for multiple speakers and multiple languages in one text...
read it
-
Atss-Net: Target Speaker Separation via Attention-based Neural Network
Recently, Convolutional Neural Network (CNN) and Long short-term memory ...
read it
-
The INTERSPEECH 2020 Far-Field Speaker Verification Challenge
The INTERSPEECH 2020 Far-Field Speaker Verification Challenge (FFSVC 202...
read it
-
From Speaker Verification to Multispeaker Speech Synthesis, Deep Transfer with Feedback Constraint
High-fidelity speech can be synthesized by end-to-end text-to-speech mod...
read it
-
Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting
In this paper, we focus on the task of small-footprint keyword spotting ...
read it
-
SegaBERT: Pre-training of Segment-aware BERT for Language Understanding
Pre-trained language models have achieved state-of-the-art results in va...
read it
-
Semantics of the Unwritten
The semantics of a text is manifested not only by what is read, but also...
read it
-
Peripheral-free Device Pairing by Randomly Switching Power
The popularity of Internet-of-Things (IoT) comes with security concerns....
read it
-
DIHARD II is Still Hard: Experimental Results and Discussions from the DKU-LENOVO Team
In this paper, we present the submitted system for the second DIHARD Spe...
read it
-
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization
Orthogonal blinding based schemes for wireless physical layer security a...
read it
-
Wireless Federated Learning with Local Differential Privacy
In this paper, we study the problem of federated learning (FL) over a wi...
read it
-
Diversity-Achieving Slow-DropBlock Network for Person Re-Identification
A big challenge of person re-identification (Re-ID) using a multi-branch...
read it
-
Within-sample variability-invariant loss for robust speaker recognition under noisy environments
Despite the significant improvements in speaker recognition enabled by d...
read it
-
The FFSVC 2020 Evaluation Plan
The Far-Field Speaker Verification Challenge 2020 (FFSVC20) is designed ...
read it
-
SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles
Mobile edge computing (MEC) is an emerging technology to transform the c...
read it
-
Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach
Due to increasing concerns of data privacy, databases are being encrypte...
read it
-
GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems
In vision-based object classification systems, imaging sensors perceive ...
read it
-
Learning Diverse Features with Part-Level Resolution for Person Re-Identification
Learning diverse features is key to the success of person re-identificat...
read it
-
Deep Time-Stream Framework for Click-Through Rate Prediction by Tracking Interest Evolution
Click-through rate (CTR) prediction is an essential task in industrial a...
read it
-
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation
In this paper, we study local information privacy (LIP), and design LIP ...
read it
-
HI-MIA : A Far-field Text-Dependent Speaker Verification Database and the Baselines
This paper presents a large far-field text-dependent speaker verificatio...
read it
-
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility
Data collection under local differential privacy (LDP) has been mostly s...
read it
-
RWF-2000: An Open Large Scale Video Database for Violence Detection
In recent years, surveillance cameras are widely deployed in public plac...
read it
-
Providing Input-Discriminative Protection for Local Differential Privacy
Local Differential Privacy (LDP) provides provable privacy protection fo...
read it
-
Variational Quantum Algorithms for Dimensionality Reduction and Classification
Dimensionality reduction and classification play an absolutely critical ...
read it
-
Parameter Constrained Transfer Learning for Low Dose PET Image Denoising
Positron emission tomography (PET) is widely used in clinical practice. ...
read it
-
Pixel-Wise PolSAR Image Classification via a Novel Complex-Valued Deep Fully Convolutional Network
Although complex-valued (CV) neural networks have shown better classific...
read it
-
HaarPooling: Graph Pooling with Compressive Haar Basis
Deep Graph Neural Networks (GNNs) are instrumental in graph classificati...
read it
-
Two Birds, One Stone: A Simple, Unified Model for Text Generation from Structured and Unstructured Data
A number of researchers have recently questioned the necessity of increa...
read it