default search action
Anindya Sarkar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Anindya Sarkar, Alex DiChristofano, Sanmay Das, Patrick J. Fowler, Nathan Jacobs, Yevgeniy Vorobeychik:
Geospatial Active Search for Preventing Evictions. AAMAS 2024: 2456-2458 - [c35]Anindya Sarkar, Michael Lanier, Scott Alfeld, Jiarui Feng, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik:
A Visual Active Search Framework for Geospatial Exploration. WACV 2024: 8301-8310 - [i12]Ying Xu, Michael Lanier, Anindya Sarkar, Yevgeniy Vorobeychik:
Attacks on Node Attributes in Graph Neural Networks. CoRR abs/2402.12426 (2024) - [i11]Quan Nguyen, Anindya Sarkar, Roman Garnett:
Amortized nonmyopic active search via deep imitation learning. CoRR abs/2405.15031 (2024) - [i10]Anindya Sarkar, Srikumar Sastry, Aleksis Pirinen, Chongjie Zhang, Nathan Jacobs, Yevgeniy Vorobeychik:
GOMAA-Geo: GOal Modality Agnostic Active Geo-localization. CoRR abs/2406.01917 (2024) - [i9]Anindya Sarkar, Alex DiChristofano, Sanmay Das, Patrick J. Fowler, Nathan Jacobs, Yevgeniy Vorobeychik:
Active Geospatial Search for Efficient Tenant Eviction Outreach. CoRR abs/2412.17854 (2024) - 2023
- [c34]Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik:
A Partially-Supervised Reinforcement Learning Framework for Visual Active Search. NeurIPS 2023 - [i8]Anindya Sarkar, Nathan Jacobs, Yevgeniy Vorobeychik:
A Partially Supervised Reinforcement Learning Framework for Visual Active Search. CoRR abs/2310.09689 (2023) - 2022
- [c33]Anirban Sarkar, Deepak Vijaykeerthy, Anindya Sarkar, Vineeth N. Balasubramanian:
A Framework for Learning Ante-hoc Explainable Models via Concepts. CVPR 2022: 10276-10285 - [c32]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. GameSec 2022: 212-230 - [c31]Jiarui Feng, Yixin Chen, Fuhai Li, Anindya Sarkar, Muhan Zhang:
How Powerful are K-hop Message Passing Graph Neural Networks. NeurIPS 2022 - [c30]Anindya Sarkar, Anirban Sarkar, Vineeth N. Balasubramanian:
Leveraging Test-Time Consensus Prediction for Robustness against Unseen Noise. WACV 2022: 3564-3573 - [i7]Jiarui Feng, Yixin Chen, Fuhai Li, Anindya Sarkar, Muhan Zhang:
How Powerful are K-hop Message Passing Graph Neural Networks. CoRR abs/2205.13328 (2022) - [i6]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. CoRR abs/2209.03540 (2022) - [i5]Anindya Sarkar, Michael Lanier, Scott Alfeld, Roman Garnett, Nathan Jacobs, Yevgeniy Vorobeychik:
A Visual Active Search Framework for Geospatial Exploration. CoRR abs/2211.15788 (2022) - 2021
- [c29]Anindya Sarkar, Anirban Sarkar, Vineeth N. Balasubramanian:
Enhanced Regularizers for Attributional Robustness. AAAI 2021: 2532-2540 - [c28]Anindya Sarkar, Anirban Sarkar, Sowrya Gali, Vineeth N. Balasubramanian:
Adversarial Robustness without Adversarial Training: A Teacher-Guided Curriculum Learning Approach. NeurIPS 2021: 12836-12848 - [i4]Anirban Sarkar, Deepak Vijaykeerthy, Anindya Sarkar, Vineeth N. Balasubramanian:
Inducing Semantic Grouping of Latent Concepts for Explanations: An Ante-Hoc Approach. CoRR abs/2108.11761 (2021) - [i3]Anindya Sarkar, Anirban Sarkar, Sowrya Gali, Vineeth N. Balasubramanian:
Get Fooled for the Right Reason: Improving Adversarial Robustness through a Teacher-guided Curriculum Learning Approach. CoRR abs/2111.00295 (2021) - 2020
- [c27]Anindya Sarkar, Raghu Sesha Iyengar:
Enforcing Linearity in DNN Succours Robustness and Adversarial Image Generation. ICANN (1) 2020: 52-64 - [c26]Anindya Sarkar, Anirudh Sunder Raj, Raghu Sesha Iyengar:
Neural Data Augmentation Techniques for Time Series Data and its Benefits. ICMLA 2020: 107-114 - [i2]Anindya Sarkar, Anirban Sarkar, Vineeth N. Balasubramanian:
Enhanced Regularizers for Attributional Robustness. CoRR abs/2012.14395 (2020)
2010 – 2019
- 2019
- [c25]Mohamed Amgad, Anindya Sarkar, Chukka Srinivas, Rachel Redman, Simrath Ratra, Charles J. Bechert, Benjamin C. Calhoun, Karen Mrazeck, Uday Kurkure, Lee A. D. Cooper, Michael Barnes:
Joint region and nucleus segmentation for characterization of tumor infiltrating lymphocytes in breast cancer. Digital Pathology 2019: 109560M - [c24]Anindya Sarkar, Sujeeth Reddy, Raghu Sesha Iyengar:
Zero-Shot Multilingual Sentiment Analysis using Hierarchical Attentive Network and BERT. NLPIR 2019: 49-56 - [i1]Anindya Sarkar, Nikhil Kumar Gupta, Raghu Sesha Iyengar:
Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation. CoRR abs/1910.08108 (2019) - 2014
- [j3]Kien Nguyen, Anindya Sarkar, Anil K. Jain:
Prostate Cancer Grading: Use of Graph Cut and Spatial Arrangement of Nuclei. IEEE Trans. Medical Imaging 33(12): 2254-2270 (2014) - [c23]Anindya Sarkar, Quan Yuan, Chukka Srinivas:
A robust method for inter-marker whole slide registration of digital pathology images using lines based features. ISBI 2014: 762-765 - [c22]Ting Chen, Anindya Sarkar, Chukka Srinivas:
Adaptive spectral unmixing for histopathology fluorescent images. ISBI 2014: 1287-1290 - 2012
- [c21]Kien Nguyen, Anindya Sarkar, Anil K. Jain:
Structure and Context in Prostatic Gland Segmentation and Classification. MICCAI (1) 2012: 115-123 - 2011
- [c20]Anindya Sarkar, Abhirup Saha, Bipan Tudu, Nabarun Bhattacharyya, Rajib Bandyopadhyay:
Discrimination of Black Tea Quality using Electronic Nose: A GA based approach. IICAI 2011: 245-255 - 2010
- [j2]Anindya Sarkar, Vishwakarma Singh, Pratim Ghosh, Bangalore S. Manjunath, Ambuj K. Singh:
Efficient and Robust Detection of Duplicate Videos in a Large Database. IEEE Trans. Circuits Syst. Video Technol. 20(6): 870-885 (2010) - [j1]Anindya Sarkar, Upamanyu Madhow, B. S. Manjunath:
Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography. IEEE Trans. Inf. Forensics Secur. 5(2): 225-239 (2010) - [c19]Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunath:
Precise localization of key-points to identify local regions for robust data hiding. ICIP 2010: 3681-3684 - [c18]Anindya Sarkar, Kaushal Solanki, B. S. Manjunath:
Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Information Hiding 2010: 178-192 - [c17]Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunath:
Improving re-sampling detection by adding noise. Media Forensics and Security 2010: 75410I - [c16]Anindya Sarkar, B. S. Manjunath:
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels. Media Forensics and Security 2010: 754113
2000 – 2009
- 2009
- [c15]Lakshmanan Nataraj, Anindya Sarkar, Bangalore S. Manjunath:
Adding Gaussian noise to "denoise" JPEG for detecting image resizing. ICIP 2009: 1493-1496 - [c14]Anindya Sarkar, Bangalore S. Manjunath:
Double embedding in the quantization index modulation framework. ICIP 2009: 3653-3656 - [c13]Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunath:
Detection of seam carving and localization of seam insertions in digital images. MM&Sec 2009: 107-116 - 2008
- [c12]Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunath, Upamanyu Madhow:
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme. ICIP 2008: 1292-1295 - [c11]Anindya Sarkar, Kenneth Sullivan, B. S. Manjunath:
Steganographic capacity estimation for the statistical restoration framework. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681916 - [c10]Anindya Sarkar, Kaushal Solanki, B. S. Manjunath:
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681917 - 2007
- [c9]Anindya Sarkar, Kaushal Solanki, Upamanyu Madhow, Shivkumar Chandrasekaran, Bangalore S. Manjunath:
Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security. ICASSP (2) 2007: 277-280 - [c8]Anindya Sarkar, B. S. Manjunath:
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation. ICIP (1) 2007: 409-412 - [c7]Kaushal Solanki, Anindya Sarkar, B. S. Manjunath:
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. Information Hiding 2007: 16-31 - [c6]Arya K. Bhattacharya, Ashish Tiwari, Debjani Aditya, Utpal Nandi, Anindya Sarkar:
Online Evaluation of Steel Slab Quality in Production Phase by Surface Crack Image Segmentation using Relative Fuzzy Connectedness. IPCV 2007: 353-362 - [c5]Jim Kleban, Anindya Sarkar, Emily Moxley, Stephen Mangiat, Swapna Joshi, Thomas Kuo, B. S. Manjunath:
Feature fusion and redundancy pruning for rush video summarization. TVS 2007: 84-88 - [c4]Anindya Sarkar, Upamanyu Madhow, Shivkumar Chandrasekaran, Bangalore S. Manjunath:
Adaptive MPEG-2 video data hiding scheme. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051D - [c3]Elisa Drelie Gelasca, Swapna Joshi, Jim Kleban, Stephen Mangiat, B. S. Manjunath, Emily Moxley, Anindya Sarkar, Jiejun Xu:
UThe Vision Research Lab of UCSB at TRECVID 2007. TRECVID 2007 - 2005
- [c2]Anindya Sarkar, Thippur V. Sreenivas:
Automatic Speech Segmentation Using Average Level Crossing Rate Information. ICASSP (1) 2005: 397-400 - [c1]Anindya Sarkar, T. V. Sreenivas:
Dynamic programming based segmentation approach to LSF matrix reconstruction. INTERSPEECH 2005: 649-652
Coauthor Index
aka: Bangalore S. Manjunath
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint