Skip to main content

Showing 1–3 of 3 results for author: Khade, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.09930  [pdf, other

    cs.CV

    Robust Semi-Supervised Learning for Histopathology Images through Self-Supervision Guided Out-of-Distribution Scoring

    Authors: Nikhil Cherian Kurian, Varsha S, Abhijit Patil, Shashikant Khade, Amit Sethi

    Abstract: Semi-supervised learning (semi-SL) is a promising alternative to supervised learning for medical image analysis when obtaining good quality supervision for medical imaging is difficult. However, semi-SL assumes that the underlying distribution of unaudited data matches that of the few labeled samples, which is often violated in practical settings, particularly in medical images. The presence of ou… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

  2. arXiv:2112.08421  [pdf

    cs.LG cs.NE

    A White-Box SVM Framework and its Swarm-Based Optimization for Supervision of Toothed Milling Cutter through Characterization of Spindle Vibrations

    Authors: Tejas Y. Deo, Abhishek D. Patange, Sujit S. Pardeshi, R. Jegadeeshwaran, Apoorva N. Khairnar, Hrushikesh S. Khade

    Abstract: In this paper, a white-Box support vector machine (SVM) framework and its swarm-based optimization is presented for supervision of toothed milling cutter through characterization of real-time spindle vibrations. The anomalous moments of vibration evolved due to in-process tool failures (i.e., flank and nose wear, crater and notch wear, edge fracture) have been investigated through time-domain resp… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

  3. arXiv:2001.11137  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

    Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt

    Abstract: Numerous recent studies have demonstrated how Deep Neural Network (DNN) classifiers can be fooled by adversarial examples, in which an attacker adds perturbations to an original sample, causing the classifier to misclassify the sample. Adversarial attacks that render DNNs vulnerable in real life represent a serious threat in autonomous vehicles, malware filters, or biometric authentication systems… ▽ More

    Submitted 8 February, 2021; v1 submitted 29 January, 2020; originally announced January 2020.

    Comments: 18 pages, 8 figures, fixed typos, replotted figures, restyled the plots and tables

    ACM Class: I.5.1; I.5.4; I.5.5