recentpopularlog in

e2e

« earlier   
Char2Wav: End-to-End Speech Synthesis | OpenReview
Abstract: We present Char2Wav, an end-to-end model for speech synthesis. Char2Wav has two components: a reader and a neural vocoder. The reader is an encoder-decoder model with attention. The encoder is a bidirectional recurrent neural network that accepts text or phonemes as inputs, while the decoder is a recurrent neural network (RNN) with attention that produces vocoder acoustic features. Neural vocoder refers to a conditional extension of SampleRNN which generates raw waveform samples from intermediate representations. Unlike traditional models for speech synthesis, Char2Wav learns to produce audio directly from text.
speech-synthesis  deep-learning  char2wav  e2e 
17 days ago by arsyed
[1703.05423] End-to-end optimization of goal-driven and visually grounded dialogue systems
End-to-end design of dialogue systems has recently become a popular research topic thanks to powerful tools such as encoder-decoder architectures for sequence-to-sequence learning. Yet, most current approaches cast human-machine dialogue management as a supervised learning problem, aiming at predicting the next utterance of a participant given the full history of the dialogue. This vision is too simplistic to render the intrinsic planning problem inherent to dialogue as well as its grounded nature, making the context of a dialogue larger than the sole history. This is why only chit-chat and question answering tasks have been addressed so far using end-to-end architectures. In this paper, we introduce a Deep Reinforcement Learning method to optimize visually grounded task-oriented dialogues, based on the policy gradient algorithm. This approach is tested on a dataset of 120k dialogues collected through Mechanical Turk and provides encouraging results at solving both the problem of generating natural dialogues and the task of discovering a specific object in a complex picture.
dialogue  reinforcement-learning  e2e 
27 days ago by arsyed
stealth/drops: opmsg p2p transport network
Interesting, uses the opmsg end-to-end encryption message format
e2e  P2P  deaddrop  encrypted  message  network  software  anonymous 
6 weeks ago by asteroza
smooth-code/jest-puppeteer: Run your tests using Jest & Puppeteer 🎪✨
GitHub is where people build software. More than 28 million people use GitHub to discover, fork, and contribute to over 79 million projects.
jest  puppeteer  testing  e2e  headless  chrome 
7 weeks ago by jimthedev
Nextcloud
Nextcloud is an open source, self-hosted file share and communication platform. Access & sync your files, contacts, calendars & communicate and collaborate across your devices. You decide what happens with your data, where it is and who can access it!
hosting  dropbox  backup  owncloud  storage  sync  opensource  selfhosted  encryption  e2e 
10 weeks ago by e2b
End-To-End Testing A VueJS HackerNews clone
In this blog post I will show how to test a HackerNews clone without pulling out hair.

There is an elegant and fast Vue.js 2 HackerNews clone made by the framework’s author himself: vuejs/vue-hackernews-2.0 with live demo hosted at https://vue-hn.now.sh/. The clone has all the bells and whistles one can expect from a modern progressive application: includes server-side rendering, inlined CSS, routing, single file components, etc. There is only one thing the code is missing - tests! Hmm.
vuejs  e2e  testing 
12 weeks ago by reoring
Attack of the Week: Group Messaging in WhatsApp and Signal - @matthew_d_green
New research released at the Real World Crypto security conference shows some theoretical flaws affecting the security of group messaging apps. However, the attacks would be exceedingly difficult to actually carry out, so there is no real risk here. Executing the attack would require knowing a a group chat's "group ID," which is a random 128-bit number, which would be extremely difficult to attain (let alone guess). As crypto expert (and OTF AC member) Matthew Green writes, the research "takes a close look at the problem of group messaging, and finds that while messengers may be doing fine with normal (pairwise) messaging, group messaging is still kind of a hack.

If all you want is the TL;DR, here’s the headline finding: due to flaws in both Signal and WhatsApp (which I single out because I use them), it’s theoretically possible for strangers to add themselves to an encrypted group chat. However, the caveat is that these attacks are extremely difficult to pull off in practice, so nobody needs to panic."

There are some differences between how this issues affects Signal vs. WhatsApp, as laid out by Green in fuller detail in the full blog post linked to above. The full research (here https://eprint.iacr.org/2017/713.pdf) also looks at messaging app Threema.
otf  messaging  security  e2e  encryption  privacy  whatsapp  signal 
january 2018 by dmcdev

Copy this bookmark:





to read