Search

Your search keyword '"Kang, Hong"' showing total 3,665 results

Search Constraints

Start Over You searched for: Author "Kang, Hong" Remove constraint Author: "Kang, Hong"
3,665 results on '"Kang, Hong"'

Search Results

1. Optimization of DNN-based speaker verification model through efficient quantization technique

2. Speaker-Independent Acoustic-to-Articulatory Inversion through Multi-Channel Attention Discriminator

3. Speak in the Scene: Diffusion-based Acoustic Scene Transfer toward Immersive Speech Generation

4. Enhanced Deep Speech Separation in Clustered Ad Hoc Distributed Microphone Environments

5. Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking

6. Fuzzing MLIR by Synthesizing Custom Mutations

7. BugsInPy: A Database of Existing Bugs in Python Programs to Enable Controlled Testing and Debugging Studies

8. Self-supervised Complex Network for Machine Sound Anomaly Detection

9. Style Modeling for Multi-Speaker Articulation-to-Speech

10. BrainTalker: Low-Resource Brain-to-Speech Synthesis with Transfer Learning using Wav2Vec 2.0

11. C2C: Cough to COVID-19 Detection in BHI 2023 Data Challenge

15. Greening Large Language Models of Code

16. Pruning Self-Attention for Zero-Shot Multi-Speaker Text-to-Speech

17. Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel

18. MF-PAM: Accurate Pitch Estimation through Periodicity Analysis and Multi-level Feature Fusion

19. Feature Normalization for Fine-tuning Self-Supervised Models in Speech Enhancement

20. HD-DEMUCS: General Speech Restoration with Heterogeneous Decoders

21. Multi-Granularity Detector for Vulnerability Fixes

22. HappyQuokka System for ICASSP 2023 Auditory EEG Challenge

23. The elderly population are more vulnerable for the management of colorectal cancer during the COVID-19 pandemic: a nationwide, population-based study.

26. CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports

27. Stealthy Backdoor Attack for Code Models

28. SkipFuzz: Active Learning-based Input Selection for Fuzzing Deep Learning Libraries

29. Clinical significance and potential pathogenesis of VCAN in adult non-cystic fibrosis bronchiectasis: a retrospective study

30. VulCurator: A Vulnerability-Fixing Commit Detector

31. AutoPruner: Transformer-Based Call Graph Pruning

32. Compressing Pre-trained Models of Code into 3 MB

33. Learning Audio-Text Agreement for Open-vocabulary Keyword Spotting

34. Progressive Multi-scale Consistent Network for Multi-class Fundus Lesion Segmentation

35. How to Find Actionable Static Analysis Warnings: A Case Study with FindBugs

36. ReCAB-VAE: Gumbel-Softmax Variational Inference Based on Analytic Divergence

39. Active Learning of Discriminative Subgraph Patterns for API Misuse Detection

40. Adversarial Learning of Intermediate Acoustic Feature for End-to-End Lightweight Text-to-Speech

41. Phase Continuity: Learning Derivatives of Phase Spectrum for Speech Enhancement

42. Detecting False Alarms from Automatic Static Analysis Tools: How Far are We?

47. SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan

Catalog

Books, media, physical & digital resources