Joseph (Yossi) Keshet
Joseph (Yossi) Keshet
Professor, Dept. of Computer Science, Bar-Ilan University
Verified email at - Homepage
Cited by
Cited by
Online passive aggressive algorithms
K Crammer, O Dekel, J Keshet, S Shalev-Shwartz, Y Singer
Houdini: Fooling deep structured visual and speech recognition models with adversarial examples
MM Cisse, Y Adi, N Neverova, J Keshet
Advances in neural information processing systems 30, 2017
Large margin hierarchical classification
O Dekel, J Keshet, Y Singer
Proceedings of the twenty-first international conference on Machine learning, 27, 2004
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Y Adi, C Baum, M Cisse, B Pinkas, J Keshet
27th {USENIX} Security Symposium ({USENIX} Security 18), 1615-1631, 2018
Kernel design using boosting
K Crammer, J Keshet, Y Singer
Advances in neural information processing systems 15, 553-560, 2002
Discriminative keyword spotting
J Keshet, D Grangier, S Bengio
Speech Communication 51 (4), 317-329, 2009
Direct Loss Minimization for Structured Prediction.
DA McAllester, T Hazan, J Keshet
NIPS 1 (2), 3, 2010
The projectron: a bounded kernel-based perceptron
F Orabona, J Keshet, B Caputo
Proceedings of the 25th international conference on Machine learning, 720-727, 2008
Support vector machines with a reject option
Y Grandvalet, A Rakotomamonjy, J Keshet, S Canu
Proceedings of the 22nd Annual Conference on Neural Information Processing …, 2008
Bounded Kernel-Based Online Learning.
F Orabona, J Keshet, B Caputo
Journal of Machine Learning Research 10 (11), 2009
Automatic speech and speaker recognition: Large margin and kernel methods
J Keshet, S Bengio
John Wiley & Sons, 2009
Fooling end-to-end speaker verification with adversarial examples
F Kreuk, Y Adi, M Cisse, J Keshet
2018 IEEE international conference on acoustics, speech and signal …, 2018
Robust discriminative keyword spotting for emotionally colored spontaneous speech using bidirectional LSTM networks
M Wollmer, F Eyben, J Keshet, A Graves, B Schuller, G Rigoll
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
Adversarial examples on discrete sequences for beating whole-binary malware detection
F Kreuk, A Barak, S Aviv-Reuven, M Baruch, B Pinkas, J Keshet
arXiv preprint arXiv:1802.04528, 490-510, 2018
An online algorithm for hierarchical phoneme classification
O Dekel, J Keshet, Y Singer
International workshop on machine learning for multimodal interaction, 146-158, 2004
Generalization Bounds and Consistency for Latent Structural Probit and Ramp Loss.
DA McAllester, J Keshet
NIPS, 2205-2212, 2011
Explicit approximations of the Gaussian kernel
A Cotter, J Keshet, N Srebro
arXiv preprint arXiv:1109.4603, 2011
Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm
S Singh, A Mishra, U Singh
2016 Symposium on Colossal Data Analysis and Networking (CDAN), 1-6, 2016
A GPU-tailored approach for training kernelized SVMs
A Cotter, N Srebro, J Keshet
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
A large margin algorithm for speech-to-phoneme and music-to-score alignment
J Keshet, S Shalev-Shwartz, Y Singer, D Chazan
IEEE Transactions on Audio, Speech, and Language Processing 15 (8), 2373-2382, 2007
The system can't perform the operation now. Try again later.
Articles 1–20