Search
Now showing items 221-230 of 276
Optimal negotiation decision functions in time-sensitive domains
(IEEE, 2015)
The last two decades have seen a growing interest in automated agents that are able to negotiate on behalf of human negotiators in a wide variety of negotiation domains. One key aspect of a successful negotiating agent is ...
Source behavior discovery for fusion of subjective opinions
(IEEE, 2016)
Information is at the center of decision making in many systems and use-cases. In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions ...
Inferring human values for safe AGI design
(Springer International Publishing, 2015)
Aligning goals of superintelligent machines with human values is one of the ways to pursue safety in AGI systems. To achieve this, it is first necessary to learn what human values are. However, human values are incredibly ...
A complex adaptive system of systems approach to human–automation interaction in smart grid
(Wiley, 2015)
This chapter expresses three cognitive genres: descriptive genre, normative/prescriptive genre, and know-how genre. The descriptive genre introduces and discusses on the following disciplines: the core concepts of complexity, ...
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Modeling the development of infant imitation using inverse reinforcement learning
(IEEE, 2018-09)
Little is known about the computational mechanisms of how imitation skills develop along with infant sensorimotor learning. In robotics, there are several well developed frameworks for imitation learning or so called ...
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)
Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ...
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)
Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ...
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)
With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
Share this page