Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
DCASE2017 Challenge Setup: Tasks, Datasets and Baseline System
- A. Mesaros, T. Heittola, T. Virtanen
- Computer Science, PhysicsDCASE
- 16 November 2017
TLDR
Sound Event Detection in Domestic Environments with Weakly Labeled Data and Soundscape Synthesis
- Nicolas Turpault, R. Serizel, Ankit Shah, J. Salamon
- Computer ScienceDCASE
- 20 June 2019
TLDR
Experiments on the DCASE Challenge 2016: Acoustic Scene Classification and Sound Event Detection in Real Life Recording
- Benjamin Elizalde, Anurag Kumar, I. Lane
- Computer Science, PhysicsDCASE
- 22 July 2016
TLDR
XAspects: an extensible system for domain-specific aspect languages
- Macneil Shonle, K. Lieberherr, Ankit Shah
- Computer ScienceOOPSLA '03
- 26 October 2003
TLDR
A Closer Look at Weak Label Learning for Audio Events
- Ankit Shah, Anurag Kumar, Alexander Hauptmann, B. Raj
- Computer ScienceArXiv
- 24 April 2018
TLDR
A Survey of Lightweight Cryptographic Algorithms for IoT-Based Applications
- Ankit Shah
- Computer ScienceSmart Innovations in Communication and…
- 20 November 2018
TLDR
Statistical Tuning of Walfisch-Ikegami Model in Urban and Suburban Environments
- D. Ambawade, D. Karia, Tejas Potdar, B. K. Lande, R. Daruwala, Ankit Shah
- BusinessFourth Asia International Conference on…
- 26 May 2010
TLDR
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management
- K. Farris, Ankit Shah, G. Cybenko, R. Ganesan, S. Jajodia
- Computer ScienceACM Trans. Priv. Secur.
- 13 October 2018
TLDR
Bayesian Inference of Linear Temporal Logic Specifications for Contrastive Explanations
- Joseph Kim, Christian Muise, Ankit Shah, Shubham Agarwal, J. Shah
- Computer ScienceIJCAI
- 1 August 2019
TLDR
A methodology to measure and monitor level of operational effectiveness of a CSOC
- Ankit Shah, R. Ganesan, S. Jajodia, H. Çam
- Computer ScienceInternational Journal of Information Security
- 1 April 2018
In a cybersecurity operations center (CSOC), under normal operating conditions in a day, sufficient numbers of analysts are available to analyze the amount of alert workload generated by intrusion…
...
...