1 code implementation • 10 Apr 2024 • Lucas Goncalves, Prashant Mathur, Chandrashekhar Lavania, Metehan Cekic, Marcello Federico, Kyu J. Han
Recent advancements in audio-visual generative modeling have been propelled by progress in deep learning and the availability of data-rich benchmarks.
1 code implementation • 26 Feb 2022 • Metehan Cekic, Can Bakiskan, Upamanyu Madhow
While end-to-end training of Deep Neural Networks (DNNs) yields state of the art performance in an increasing array of applications, it does not provide insight into, or control over, the features being extracted.
no code implementations • 7 Feb 2022 • Metehan Cekic, Ruirui Li, Zeya Chen, Yuguang Yang, Andreas Stolcke, Upamanyu Madhow
Speaker recognition, recognizing speaker identities based on voice alone, enables important downstream applications, such as personalization and authentication.
1 code implementation • 12 Apr 2021 • Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow
Deep Neural Networks are known to be vulnerable to small, adversarially crafted, perturbations.
1 code implementation • 21 Nov 2020 • Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow
Our nominal design is to train the decoder and classifier together in standard supervised fashion, but we also consider unsupervised decoder training based on a regression objective (as in a conventional autoencoder) with separate supervised training of the classifier.
1 code implementation • 25 Feb 2020 • Metehan Cekic, Soorya Gopalakrishnan, Upamanyu Madhow
The opportunity for doing so arises due to subtle nonlinear variations across transmitters, even those made by the same manufacturer.
1 code implementation • 22 Feb 2020 • Can Bakiskan, Soorya Gopalakrishnan, Metehan Cekic, Upamanyu Madhow, Ramtin Pedarsani
The vulnerability of deep neural networks to small, adversarially designed perturbations can be attributed to their "excessive linearity."
no code implementations • 19 May 2019 • Soorya Gopalakrishnan, Metehan Cekic, Upamanyu Madhow
A "wireless fingerprint" which exploits hardware imperfections unique to each device is a potentially powerful tool for wireless security.
1 code implementation • 24 Oct 2018 • Soorya Gopalakrishnan, Zhinus Marzi, Metehan Cekic, Upamanyu Madhow, Ramtin Pedarsani
We also devise attacks based on the locally linear model that outperform the well-known FGSM attack.