Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan
Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan
Turkish Journal of Electrical Engineering and Computer Sciences
Learning a robust and invariant representation of various unwanted factors in sign language recognition (SLR) applications is essential. One of the factors that might degrade the sign recognition performance is the lack of signer diversity in the training datasets, causing a dependence on the singer’s identity during representation learning. Consequently, capturing signer-specific features hinders the generalizability of SLR systems. This study proposes a feature disentanglement framework comprising a convolutional neural network (CNN) and a long short-term memory (LSTM) network based on adversarial training to learn a signer-independent sign language representation that might enhance the recognition of signs. We aim to …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …