Skip to main content

Showing 1–24 of 24 results for author: Muller, N M

.
  1. arXiv:2503.19244  [pdf, ps, other

    math.CO

    Maximum number of edge colorings avoiding rainbow copies of $K_4$

    Authors: Hiêp Hàn, Carlos Hoppen, Nicolas Moro Müller, Dionatan Ricardo Schmidt

    Abstract: In this paper we show that for $r\geq 12$ and any sufficiently large $n$-vertex graph $G$ the number of $r$-edge-colorings of $G$ with no rainbow $K_4$ is at most $r^{ex(n,K_4)}$, where $ex(n,K_4)$ denotes the Turán number of $K_4$. Moreover, $G$ attains equality if and only if it is the Turán graph $T_3(n)$. The bound on the number of colors $r\geq 12$ is best possible. It improves upon a resul… ▽ More

    Submitted 30 April, 2025; v1 submitted 24 March, 2025; originally announced March 2025.

    Comments: 15 pages

    MSC Class: 05C35 ACM Class: G.2.2

  2. arXiv:2408.15775  [pdf, other

    eess.AS cs.AI cs.SD

    Easy, Interpretable, Effective: openSMILE for voice deepfake detection

    Authors: Octavian Pascu, Dan Oneata, Horia Cucu, Nicolas M. Müller

    Abstract: In this paper, we demonstrate that attacks in the latest ASVspoof5 dataset -- a de facto standard in the field of voice authenticity and deepfake detection -- can be identified with surprising accuracy using a small subset of very simplistic features. These are derived from the openSMILE library, and are scalar-valued, easy to compute, and human interpretable. For example, attack A10`s unvoiced se… ▽ More

    Submitted 29 August, 2024; v1 submitted 28 August, 2024; originally announced August 2024.

  3. arXiv:2406.03512  [pdf, other

    cs.SD cs.AI eess.AS

    Harder or Different? Understanding Generalization of Audio Deepfake Detection

    Authors: Nicolas M. Müller, Nicholas Evans, Hemlata Tak, Philip Sperl, Konstantin Böttinger

    Abstract: Recent research has highlighted a key issue in speech deepfake detection: models trained on one set of deepfakes perform poorly on others. The question arises: is this due to the continuously improving quality of Text-to-Speech (TTS) models, i.e., are newer DeepFakes just 'harder' to detect? Or, is it because deepfakes generated with one model are fundamentally different to those generated using a… ▽ More

    Submitted 12 June, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

    Journal ref: Interspeech 2024

  4. arXiv:2402.11963  [pdf, other

    cs.LG cs.AI

    Imbalance in Regression Datasets

    Authors: Daniel Kowatsch, Nicolas M. Müller, Kilian Tscharke, Philip Sperl, Konstantin Bötinger

    Abstract: For classification, the problem of class imbalance is well known and has been extensively studied. In this paper, we argue that imbalance in regression is an equally important problem which has so far been overlooked: Due to under- and over-representations in a data set's target distribution, regressors are prone to degenerate to naive models, systematically neglecting uncommon training data and o… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  5. arXiv:2402.06304  [pdf, ps, other

    cs.SD cs.AI eess.AS

    A New Approach to Voice Authenticity

    Authors: Nicolas M. Müller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, Konstantin Böttinger

    Abstract: Voice faking, driven primarily by recent advances in text-to-speech (TTS) synthesis technology, poses significant societal challenges. Currently, the prevailing assumption is that unaltered human speech can be considered genuine, while fake speech comes from TTS synthesis. We argue that this binary distinction is oversimplified. For instance, altered playback speeds can be used for malicious purpo… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  6. arXiv:2401.09512  [pdf, other

    cs.SD eess.AS

    MLAAD: The Multi-Language Audio Anti-Spoofing Dataset

    Authors: Nicolas M. Müller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Gölge, Thorsten Müller, Piotr Syga, Philip Sperl, Konstantin Böttinger

    Abstract: Text-to-Speech (TTS) technology offers notable benefits, such as providing a voice for individuals with speech impairments, but it also facilitates the creation of audio deepfakes and spoofing attacks. AI-based detection methods can help mitigate these risks; however, the performance of such models is inherently dependent on the quality and diversity of their training data. Presently, the availabl… ▽ More

    Submitted 26 April, 2025; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: IJCNN 2024

  7. arXiv:2310.19381  [pdf, other

    cs.AI

    Protecting Publicly Available Data With Machine Learning Shortcuts

    Authors: Nicolas M. Müller, Maximilian Burgert, Pascal Debus, Jennifer Williams, Philip Sperl, Konstantin Böttinger

    Abstract: Machine-learning (ML) shortcuts or spurious correlations are artifacts in datasets that lead to very good training and test performance but severely limit the model's generalization capability. Such shortcuts are insidious because they go unnoticed due to good in-domain test performance. In this paper, we explore the influence of different shortcuts and show that even simple shortcuts are difficul… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: Published at BMVC 2023

  8. arXiv:2308.11800  [pdf, other

    cs.SD cs.LG eess.AS

    Complex-valued neural networks for voice anti-spoofing

    Authors: Nicolas M. Müller, Philip Sperl, Konstantin Böttinger

    Abstract: Current anti-spoofing and audio deepfake detection systems use either magnitude spectrogram-based features (such as CQT or Melspectrograms) or raw audio processed through convolution or sinc-layers. Both methods have drawbacks: magnitude spectrograms discard phase information, which affects audio naturalness, and raw-feature-based models cannot use traditional explainable AI methods. This paper pr… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: Interspeech 2023

  9. arXiv:2302.04246  [pdf, other

    cs.LG cs.CV

    Shortcut Detection with Variational Autoencoders

    Authors: Nicolas M. Müller, Simon Roschmann, Shahbaz Khan, Philip Sperl, Konstantin Böttinger

    Abstract: For real-world applications of machine learning (ML), it is essential that models make predictions based on well-generalizing features rather than spurious correlations in the data. The identification of such spurious correlations, also known as shortcuts, is a challenging problem and has so far been scarcely addressed. In this work, we present a novel approach to detect shortcuts in image and aud… ▽ More

    Submitted 21 July, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: Accepted at the ICML 2023 Workshop on Spurious Correlations, Invariance and Stability

  10. arXiv:2211.15510  [pdf, other

    cs.CV cs.LG eess.IV

    Localized Shortcut Removal

    Authors: Nicolas M. Müller, Jochen Jacobs, Jennifer Williams, Konstantin Böttinger

    Abstract: Machine learning is a data-driven field, and the quality of the underlying datasets plays a crucial role in learning success. However, high performance on held-out test data does not necessarily indicate that a model generalizes or learns anything meaningful. This is often due to the existence of machine learning shortcuts - features in the data that are predictive but unrelated to the problem at… ▽ More

    Submitted 23 May, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

    Comments: Accepted at XAI4CV @ CVPR2023

  11. arXiv:2203.16263  [pdf, other

    cs.SD cs.LG eess.AS

    Does Audio Deepfake Detection Generalize?

    Authors: Nicolas M. Müller, Pavel Czempin, Franziska Dieckmann, Adam Froghyar, Konstantin Böttinger

    Abstract: Current text-to-speech algorithms produce realistic fakes of human voices, making deepfake detection a much-needed area of research. While researchers have presented various techniques for detecting audio spoofs, it is often unclear exactly why these architectures are successful: Preprocessing steps, hyperparameter settings, and the degree of fine-tuning are not consistent across related work. Whi… ▽ More

    Submitted 27 August, 2024; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: Interspeech 2022

  12. arXiv:2203.15563  [pdf, other

    cs.CR cs.LG cs.SD

    Attacker Attribution of Audio Deepfakes

    Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams

    Abstract: Deepfakes are synthetically generated media often devised with malicious intent. They have become increasingly more convincing with large training datasets advanced neural networks. These fakes are readily being misused for slander, misinformation and fraud. For this reason, intensive research for developing countermeasures is also expanding. However, recent work is almost exclusively limited to d… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: Submitted to Insterspeech 2022

  13. arXiv:2107.09667  [pdf, other

    cs.HC cs.AI cs.SD eess.AS

    Human Perception of Audio Deepfakes

    Authors: Nicolas M. Müller, Karla Pizzi, Jennifer Williams

    Abstract: The recent emergence of deepfakes has brought manipulated and generated content to the forefront of machine learning research. Automatic detection of deepfakes has seen many new machine learning techniques, however, human detection capabilities are far less explored. In this paper, we present results from comparing the abilities of humans and machines for detecting audio deepfakes used to imitate… ▽ More

    Submitted 27 August, 2024; v1 submitted 20 July, 2021; originally announced July 2021.

    Comments: Published at ACM Multimedia 2022 Workshop DDAM First International Workshop on Deepfake Detection for Audio Multimedia at ACM Multimedia 2022

  14. arXiv:2106.12914  [pdf, other

    cs.SD eess.AS

    Speech is Silver, Silence is Golden: What do ASVspoof-trained Models Really Learn?

    Authors: Nicolas M. Müller, Franziska Dieckmann, Pavel Czempin, Roman Canals, Konstantin Böttinger, Jennifer Williams

    Abstract: We present our analysis of a significant data artifact in the official 2019/2021 ASVspoof Challenge Dataset. We identify an uneven distribution of silence duration in the training and test splits, which tends to correlate with the target prediction label. Bonafide instances tend to have significantly longer leading and trailing silences than spoofed instances. In this paper, we explore this phenom… ▽ More

    Submitted 28 September, 2021; v1 submitted 23 June, 2021; originally announced June 2021.

    Journal ref: ASVspoof 2021 Workshop

  15. arXiv:2104.06744  [pdf, other

    cs.CR cs.AI

    Defending Against Adversarial Denial-of-Service Data Poisoning Attacks

    Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger

    Abstract: Data poisoning is one of the most relevant security threats against machine learning and data-driven technologies. Since many applications rely on untrusted training data, an attacker can easily craft malicious samples and inject them into the training dataset to degrade the performance of machine learning models. As recent work has shown, such Denial-of-Service (DoS) data poisoning attacks are hi… ▽ More

    Submitted 30 November, 2021; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: Published at ACSAC DYNAMICS 2020

  16. arXiv:2104.05557  [pdf, other

    eess.AS cs.SD

    SC-GlowTTS: an Efficient Zero-Shot Multi-Speaker Text-To-Speech Model

    Authors: Edresson Casanova, Christopher Shulby, Eren Gölge, Nicolas Michael Müller, Frederico Santos de Oliveira, Arnaldo Candido Junior, Anderson da Silva Soares, Sandra Maria Aluisio, Moacir Antonelli Ponti

    Abstract: In this paper, we propose SC-GlowTTS: an efficient zero-shot multi-speaker text-to-speech model that improves similarity for speakers unseen during training. We propose a speaker-conditional architecture that explores a flow-based decoder that works in a zero-shot scenario. As text encoders, we explore a dilated residual convolutional-based encoder, gated convolutional-based encoder, and transform… ▽ More

    Submitted 15 June, 2021; v1 submitted 2 April, 2021; originally announced April 2021.

    Comments: Accepted on Interspeech 2021

  17. arXiv:2101.10792  [pdf, other

    cs.LG cs.CR

    Adversarial Vulnerability of Active Transfer Learning

    Authors: Nicolas M. Müller, Konstantin Böttinger

    Abstract: Two widely used techniques for training supervised machine learning models on small datasets are Active Learning and Transfer Learning. The former helps to optimally use a limited budget to label new data. The latter uses large pre-trained models as feature extractors and enables the design of complex, non-linear models even on tiny datasets. Combining these two approaches is an effective, state-o… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Accepted for publication at IDA 2021

  18. arXiv:2010.07190  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Towards Resistant Audio Adversarial Examples

    Authors: Tom Dörr, Karla Markert, Nicolas M. Müller, Konstantin Böttinger

    Abstract: Adversarial examples tremendously threaten the availability and integrity of machine learning-based systems. While the feasibility of such attacks has been observed first in the domain of image processing, recent research shows that speech recognition is also susceptible to adversarial attacks. However, reliably bridging the air gap (i.e., making the adversarial examples work when recorded via a m… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    ACM Class: I.2

    Journal ref: SPAI 20: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial IntelligenceOctober 2020 Pages 3-10

  19. arXiv:2009.07008  [pdf, other

    cs.LG stat.ML

    Data Poisoning Attacks on Regression Learning and Corresponding Defenses

    Authors: Nicolas Michael Müller, Daniel Kowatsch, Konstantin Böttinger

    Abstract: Adversarial data poisoning is an effective attack against machine learning and threatens model integrity by introducing poisoned data into the training dataset. So far, it has been studied mostly for classification, even though regression learning is used in many mission critical systems (such as dosage of medication, control of cyber-physical systems and managing power supply). Therefore, in the… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

    Comments: Accepted for Publication at PRDC2020, Copyright by IEEE 2020

  20. Identifying Mislabeled Instances in Classification Datasets

    Authors: Nicolas Michael Müller, Karla Markert

    Abstract: A key requirement for supervised machine learning is labeled training data, which is created by annotating unlabeled data with the appropriate class. Because this process can in many cases not be done by machines, labeling needs to be performed by human domain experts. This process tends to be expensive both in time and money, and is prone to errors. Additionally, reviewing an entire labeled datas… ▽ More

    Submitted 11 December, 2019; originally announced December 2019.

    Journal ref: 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 2019

  21. Quantum group symmetry and particle scattering in (2+1)-dimensional quantum gravity

    Authors: F. A. Bais, N. M. Muller, B. J. Schroers

    Abstract: Starting with the Chern-Simons formulation of (2+1)-dimensional gravity we show that the gravitational interactions deform the Poincare symmetry of flat space-time to a quantum group symmetry. The relevant quantum group is the quantum double of the universal cover of the (2+1)-dimensional Lorentz group, or Lorentz double for short. We construct the Hilbert space of two gravitating particles and… ▽ More

    Submitted 2 May, 2002; originally announced May 2002.

    Comments: 45 pages, amslatex

    Report number: HWM-01-45, EMPG-02-07, ITFA-2002-12

    Journal ref: Nucl.Phys. B640 (2002) 3-45

  22. Topological field theory and the quantum double of SU(2)

    Authors: F. A. Bais, N. M. Muller

    Abstract: We study the quantum mechanics of a system of topologically interacting particles in 2+1 dimensions, which is described by coupling the particles to a Chern-Simons gauge field of an inhomogeneous group. Analysis of the phase space shows that for the particular case of ISO(3) Chern-Simons theory the underlying symmetry is that of the quantum double D(SU(2)), based on the homogeneous part of the g… ▽ More

    Submitted 15 July, 1998; v1 submitted 20 April, 1998; originally announced April 1998.

    Comments: 48 pages, 3 figures, LaTeX2e; two remarks and a reference added, typos corrected; to appear in Nucl.Phys.B

    Report number: UvA-WINS-ITFA 98-07

    Journal ref: Nucl.Phys. B530 (1998) 349-400

  23. Tensor product representations of the quantum double of a compact group

    Authors: T. H. Koornwinder, F. A. Bais, N. M. Muller

    Abstract: We consider the quantum double D(G) of a compact group G, following an earlier paper. We use the explicit comultiplication on D(G) in order to build tensor products of irreducible *-representations. Then we study their behaviour under the action of the R-matrix, and their decomposition into irreducible *-representations. The example of D(SU(2)) is treated in detail, with explicit formulas for di… ▽ More

    Submitted 20 April, 1998; v1 submitted 17 December, 1997; originally announced December 1997.

    Comments: LaTeX2e, 27 pages, corrected references, accepted by Comm.Math.Phys

    Report number: UvA-WINS-Wisk.97-14, UvA-WINS-ITFA.97-44 MSC Class: 22D20; 22D30 (Primary); 81R50 (secondary)

    Journal ref: Commun.Math.Phys. 198 (1998) 157-186

  24. arXiv:q-alg/9605044  [pdf, ps, other

    math.QA hep-th

    Quantum double of a (locally) compact group

    Authors: T. H. Koornwinder, N. M. Muller

    Abstract: We generalise the quantum double construction of Drinfel'd to the case of the (Hopf) algebra of suitable functions on a compact or locally compact group. We will concentrate on the *-algebra structure of the quantum double. If the conjugacy classes in the group are countably separated, then we classify the irreducible *-representations by using the connection with so-called transformation group… ▽ More

    Submitted 2 October, 1996; v1 submitted 29 May, 1996; originally announced May 1996.

    Comments: LaTeX2e, 18 pages. Univ. of Amsterdam, Depts. of Math. and of Theor.Phys., to be published in the Journal of Lie Theory

    Report number: UvA-WINS-Wisk. 96-08, UvA-WINS-ITFA 96-19 MSC Class: 22D20; 22D30 (Primary); 81R50 (secondary)