Anindya Sarkar

According to our database1, Anindya Sarkar authored at least 44 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attacks on Node Attributes in Graph Neural Networks.
CoRR, 2024

A Visual Active Search Framework for Geospatial Exploration.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Geospatial Active Search for Preventing Evictions.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
A Partially-Supervised Reinforcement Learning Framework for Visual Active Search.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
A Visual Active Search Framework for Geospatial Exploration.
CoRR, 2022

Leveraging Test-Time Consensus Prediction for Robustness against Unseen Noise.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

How Powerful are K-hop Message Passing Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Reward Delay Attacks on Deep Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

A Framework for Learning Ante-hoc Explainable Models via Concepts.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Get Fooled for the Right Reason: Improving Adversarial Robustness through a Teacher-guided Curriculum Learning Approach.
CoRR, 2021

Inducing Semantic Grouping of Latent Concepts for Explanations: An Ante-Hoc Approach.
CoRR, 2021

Adversarial Robustness without Adversarial Training: A Teacher-Guided Curriculum Learning Approach.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Enhanced Regularizers for Attributional Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Neural Data Augmentation Techniques for Time Series Data and its Benefits.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Enforcing Linearity in DNN Succours Robustness and Adversarial Image Generation.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

2019
Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation.
CoRR, 2019

Zero-Shot Multilingual Sentiment Analysis using Hierarchical Attentive Network and BERT.
Proceedings of the NLPIR 2019: The 3rd International Conference on Natural Language Processing and Information Retrieval, Tokushima, Japan, June 28, 2019

Joint region and nucleus segmentation for characterization of tumor infiltrating lymphocytes in breast cancer.
Proceedings of the Medical Imaging 2019: Digital Pathology, 2019

2014
Prostate Cancer Grading: Use of Graph Cut and Spatial Arrangement of Nuclei.
IEEE Trans. Medical Imaging, 2014

A robust method for inter-marker whole slide registration of digital pathology images using lines based features.
Proceedings of the IEEE 11th International Symposium on Biomedical Imaging, 2014

Adaptive spectral unmixing for histopathology fluorescent images.
Proceedings of the IEEE 11th International Symposium on Biomedical Imaging, 2014

2012
Structure and Context in Prostatic Gland Segmentation and Classification.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2012, 2012

2011
Discrimination of Black Tea Quality using Electronic Nose: A GA based approach.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

2010
Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography.
IEEE Trans. Inf. Forensics Secur., 2010

Efficient and Robust Detection of Duplicate Videos in a Large Database.
IEEE Trans. Circuits Syst. Video Technol., 2010

Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels.
Proceedings of the Media Forensics and Security II, 2010

Improving re-sampling detection by adding noise.
Proceedings of the Media Forensics and Security II, 2010

Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability.
Proceedings of the Information Hiding - 12th International Conference, 2010

Precise localization of key-points to identify local regions for robust data hiding.
Proceedings of the International Conference on Image Processing, 2010

2009
Detection of seam carving and localization of seam insertions in digital images.
Proceedings of the Multimedia and Security Workshop, 2009

Double embedding in the quantization index modulation framework.
Proceedings of the International Conference on Image Processing, 2009

Adding Gaussian noise to "denoise" JPEG for detecting image resizing.
Proceedings of the International Conference on Image Processing, 2009

2008
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis.
Proceedings of the Security, 2008

Steganographic capacity estimation for the statistical restoration framework.
Proceedings of the Security, 2008

Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme.
Proceedings of the International Conference on Image Processing, 2008

2007
UThe Vision Research Lab of UCSB at TRECVID 2007.
Proceedings of the TRECVID 2007 workshop participants notebook papers, 2007

Adaptive MPEG-2 video data hiding scheme.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Feature fusion and redundancy pruning for rush video summarization.
Proceedings of the 1st ACM Workshop on Video Summarization, 2007

Online Evaluation of Steel Slab Quality in Production Phase by Surface Crack Image Segmentation using Relative Fuzzy Connectedness.
Proceedings of the 2007 International Conference on Image Processing, 2007

YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation.
Proceedings of the International Conference on Image Processing, 2007

Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security.
Proceedings of the IEEE International Conference on Acoustics, 2007

2005
Dynamic programming based segmentation approach to LSF matrix reconstruction.
Proceedings of the INTERSPEECH 2005, 2005

Automatic Speech Segmentation Using Average Level Crossing Rate Information.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005


  Loading...