Top 10 Arxiv Papers Today in Electrical Engineering And Systems Science


2.005 Mikeys
#1. Joint Acoustic and Class Inference for Weakly Supervised Sound Event Detection
Sandeep Kothinti, Keisuke Imoto, Debmalya Chakrabarty, Gregory Sell, Shinji Watanabe, Mounya Elhilali
Sound event detection is a challenging task, especially for scenes with multiple simultaneous events. While event classification methods tend to be fairly accurate, event localization presents additional challenges, especially when large amounts of labeled data are not available. Task4 of the 2018 DCASE challenge presents an event detection task that requires accuracy in both segmentation and recognition of events while providing only weakly labeled training data. Supervised methods can produce accurate event labels but are limited in event segmentation when training data lacks event timestamps. On the other hand, unsupervised methods that model the acoustic properties of the audio can produce accurate event boundaries but are not guided by the characteristics of event classes and sound categories. We present a hybrid approach that combines an acoustic-driven event boundary detection and a supervised label inference using a deep neural network. This framework leverages benefits of both unsupervised and supervised methodologies and...
more | pdf | html
Figures
Tweets
nmfeeds: [O] https://t.co/55hzeMxjks Joint Acoustic and Class Inference for Weakly Supervised Sound Event Detection. Sound event de...
ComputerPapers: Joint Acoustic and Class Inference for Weakly Supervised Sound Event Detection. https://t.co/VrJ3UKRbvl
imotts: RT @ComputerPapers: Joint Acoustic and Class Inference for Weakly Supervised Sound Event Detection. https://t.co/VrJ3UKRbvl
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 4450
Unqiue Words: 1662

2.001 Mikeys
#2. Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Tomi Kinnunen, Rosa González Hautamäki, Ville Vestman, Md Sahidullah
We consider technology-assisted mimicry attacks in the context of automatic speaker verification (ASV). We use ASV itself to select targeted speakers to be attacked by human-based mimicry. We recorded 6 naive mimics for whom we select target celebrities from VoxCeleb1 and VoxCeleb2 corpora (7,365 potential targets) using an i-vector system. The attacker attempts to mimic the selected target, with the utterances subjected to ASV tests using an independently developed x-vector system. Our main finding is negative: even if some of the attacker scores against the target speakers were slightly increased, our mimics did not succeed in spoofing the x-vector system. Interestingly, however, the relative ordering of the selected targets (closest, furthest, median) are consistent between the systems, which suggests some level of transferability between the systems.
more | pdf | html
Figures
Tweets
arxivml: "Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speak… https://t.co/JlDO2ebzdS
StatsPapers: Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection. https://t.co/f7Op7ed04D
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 4785
Unqiue Words: 1834

2.001 Mikeys
#3. Plug-In Stochastic Gradient Method
Yu Sun, Brendt Wohlberg, Ulugbek S. Kamilov
Plug-and-play priors (PnP) is a popular framework for regularized signal reconstruction by using advanced denoisers within an iterative algorithm. In this paper, we discuss our recent online variant of PnP that uses only a subset of measurements at every iteration, which makes it scalable to very large datasets. We additionally present novel convergence results for both batch and online PnP algorithms.
more | pdf | html
Figures
None.
Tweets
arxivml: "Plug-In Stochastic Gradient Method", Yu Sun, Brendt Wohlberg, Ulugbek S. Kamilov https://t.co/S1JbK3VFyg
wustlcig: Our work on “Plug-In Stochastic Gradient Method” with Brendt Wohlberg, @YuSun05856777, and @ukmlv was accepted to #BASP2019 https://t.co/0RV8U2R41n
Memoirs: Plug-In Stochastic Gradient Method. https://t.co/VYDjSEjApA
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 853
Unqiue Words: 461

1.997 Mikeys
#4. A new insight into the secondary path modeling problem in active noise control
Meiling Hu, Jing Lu, Jun Wang, Jinpei Xue
Secondary path modelling is a critical problem in active noise control (ANC). Usually either an off-line or an online modeling process with additive random noise is required to ensure the convergence of the ANC system. In this paper, the close relationship between the feedforward ANC system and the stereo acoustic echo cancellation (SAEC) system is revealed. Accordingly, the convergence behavior of the ANC system can be analyzed by investigating the joint auto-correlation matrix of the reference and the filtered reference signal. It is proved that the straightforward secondary path modeling can be carried out without the injection of any additive noise as long as the control filter is of a sufficient long length. Furthermore, by taking advantage of the time-varying characteristic of the control filter, effective modeling of the secondary path can be even achieved without any restriction on the control filter length. Simulation and experimental results both validate the theoretical analysis.
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 3564
Unqiue Words: 1050

1.997 Mikeys
#5. Feature Analysis for Classification of Physical Actions using surface EMG Data
Anish C. Turlapaty, Balakrishna Gokaraju
Based on recent health statistics, there are several thousands of people with limb disability and gait disorders that require a medical assistance. A robot assisted rehabilitation therapy can help them recover and return to a normal life. In this scenario, a successful methodology is to use the EMG signal based information to control the support robotics. For this mechanism to function properly, the EMG signal from the muscles has to be sensed and then the biological motor intention has to be decoded and finally the resulting information has to be communicated to the controller of the robot. An accurate detection of the motor intention requires a pattern recognition based categorical identification. Hence in this paper, we propose an improved classification framework by identification of the relevant features that drive the pattern recognition algorithm. Major contributions include a set of modified spectral moment based features and another relevant inter-channel correlation feature that contribute to an improved classification...
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 6719
Unqiue Words: 1922

1.997 Mikeys
#6. Codeword Position Index based Sparse Code Multiple Access System
Ke Lai, Lei Wen, Jing Lei, Gaojie Chen, Pei Xiao, Amine Maaref
In this letter, a novel variation of sparse code multiple access (SCMA), called codeword position index based SCMA (CPI-SCMA), is proposed. In this scheme, the information is transmitted not only by the codewords in M point SCMA codebook, but also by the indices of the codeword positions in a data block. As such, both the power and transmission efficiency (TE) can be improved, moreover, CPI-SCMA can achieve a better error rate performance compare to conventional SCMA (C-SCMA).
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 3614
Unqiue Words: 1181

0.0 Mikeys
#7. MCE 2018: The 1st Multi-target Speaker Detection and Identification Challenge Evaluation (MCE) Plan, Dataset and Baseline System
Suwon Shon, Najim Dehak, Douglas Reynolds, James Glass
The Multitarget Challenge aims to assess how well current speech technology is able to determine whether or not a recorded utterance was spoken by one of a large number of 'blacklisted' speakers. It is a form of multi-target speaker detection based on real-world telephone conversations. Data recordings are generated from call center customer-agent conversations. Each conversation is represented by a single i-vector. Given a pool of training and development data from non-Blacklist and Blacklist speakers, the task is to measure how accurately one can detect 1) whether a test recording is spoken by a Blacklist speaker, and 2) which specific Blacklist speaker was talking.
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 2127
Unqiue Words: 796

0.0 Mikeys
#8. Pattern Synthesis via Complex-Coefficient Weight Vector Orthogonal Decomposition--Part I: Fundamentals
Xuejing Zhang, Zishu He, Xuepan Zhang
This paper presents a new array response control scheme named complex-coefficient weight vector orthogonal decomposition ($ \textrm{C}^2\textrm{-WORD} $) and its application to pattern synthesis. The proposed $ \textrm{C}^2\textrm{-WORD} $ algorithm is a modified version of the existing WORD approach. We extend WORD by allowing a complex-valued combining coefficient in $ \textrm{C}^2\textrm{-WORD} $, and find the optimal combining coefficient by maximizing white noise gain (WNG). Our algorithm offers a closed-from expression to precisely control the array response level of a given point starting from an arbitrarily-specified weight vector. In addition, it results less pattern variations on the uncontrolled angles. Elaborate analysis shows that the proposed $ \textrm{C}^2\textrm{-WORD} $ scheme performs at least as good as the state-of-the-art $\textrm{A}^\textrm{2}\textrm{RC} $ or WORD approach. By applying $ \textrm{C}^2\textrm{-WORD} $ successively, we present a flexible and effective approach to pattern synthesis. Numerical...
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 11432
Unqiue Words: 2473

0.0 Mikeys
#9. Robust Differential Received Signal Strength-Based Localization
Yongchang Hu, Geert Leus
Source localization based on signal strength measurements has become very popular due to its practical simplicity. However, the severe nonlinearity and non-convexity make the related optimization problem mathematically difficult to solve, especially when the transmit power or the path-loss exponent (PLE) is unknown. Moreover, even if the PLE is known but not perfectly estimated or the anchor location information is not accurate, the constructed data model will become uncertain, making the problem again hard to solve. This paper particularly focuses on differential received signal strength (DRSS)-based localization with model uncertainties in case of unknown transmit power and PLE. A new whitened model for DRSS-based localization with unknown transmit powers is first presented and investigated. When assuming the PLE is known, we introduce two estimators based on an exact data model, an advanced best linear unbiased estimator (A-BLUE) and a Lagrangian estimator (LE), and then we present a robust semidefinite programming (SDP)-based...
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 14342
Unqiue Words: 3308

0.0 Mikeys
#10. Ballistocardiogram-based Authentication using Convolutional Neural Networks
Joshua Hebert, Brittany Lewis, Hang Cai, Krishna K. Venkatasubramanian, Matthew Provost, Kelly Charlebois
The goal of this work is to demonstrate the use of the ballistocardiogram (BCG) signal, derived using head-mounted wearable devices, as a viable biometric for authentication. The BCG signal is the measure of an person's body acceleration as a result of the heart's ejection of blood. It is a characterization of the cardiac cycle and can be derived non-invasively from the measurement of subtle movements of a person's extremities. In this paper, we use several versions of the BCG signal, derived from accelerometer and gyroscope sensors on a Smart Eyewear (SEW) device, for authentication. The derived BCG signals are used to train a convolutional neural network (CNN) as an authentication model, which is personalized for each subject. We evaluate our authentication models using data from 12 subjects and show that our approach has an equal error rate (EER) of 3.5% immediately after training and 13\% after about 2 months, in the worst case. We also explore the use of our authentication approach for people with motor disabilities. Our...
more | pdf | html
Figures
Tweets
nmfeeds: [O] https://t.co/IeDkV8XJEj Ballistocardiogram-based Authentication using Convolutional Neural Networks. The goal of this ...
nmfeeds: [CV] https://t.co/IeDkV8XJEj Ballistocardiogram-based Authentication using Convolutional Neural Networks. The goal of this...
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 6180
Unqiue Words: 1861

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 56,474 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 56,474 papers.