
-
Face Anti-Spoofing Via Disentangled Representation Learning
Face anti-spoofing is crucial to security of face recognition systems. P...
read it
-
Learning Robust Representations with Graph Denoising Policy Network
Graph representation learning, aiming to learn low-dimensional represent...
read it
-
Brain Tumor Anomaly Detection via Latent Regularized Adversarial Network
With the development of medical imaging technology, medical images have ...
read it
-
Cascaded Detail-Preserving Networks for Super-Resolution of Document Images
The accuracy of OCR is usually affected by the quality of the input docu...
read it
-
Learning Structured Communication for Multi-agent Reinforcement Learning
This work explores the large-scale multi-agent communication mechanism u...
read it
-
Meta Segmentation Network for Ultra-Resolution Medical Images
Despite recent progress on semantic segmentation, there still exist huge...
read it
-
Infinite-horizon Off-Policy Policy Evaluation with Multiple Behavior Policies
We consider off-policy policy evaluation when the trajectory data are ge...
read it
-
Heterogeneous Graph-based Knowledge Transfer for Generalized Zero-shot Learning
Generalized zero-shot learning (GZSL) tackles the problem of learning to...
read it
-
LTLf Synthesis with Fairness and Stability Assumptions
In synthesis, assumptions are constraints on the environment that rule o...
read it
-
HighEr-Resolution Network for Image Demosaicing and Enhancing
Neural-networks based image restoration methods tend to use low-resoluti...
read it
-
Novelty Detection via Non-Adversarial Generative Network
One-class novelty detection is the process of determining if a query exa...
read it
-
Video Crowd Counting via Dynamic Temporal Modeling
Crowd counting aims to count the number of instantaneous people in a cro...
read it
-
Supervised Reinforcement Learning with Recurrent Neural Network for Dynamic Treatment Recommendation
Dynamic treatment recommendation systems based on large-scale electronic...
read it
-
Edge-Aware Deep Image Deblurring
Image deblurring is a fundamental and challenging low-level vision probl...
read it
-
Structural Landmarking and Interaction Modelling: on Resolution Dilemmas in Graph Classification
Graph neural networks are promising architecture for learning and infere...
read it
-
Multi-Scale Video Frame-Synthesis Network with Transitive Consistency Loss
Traditional approaches to interpolating/extrapolating frames in a video ...
read it
-
Preselection via Classification: A Case Study on Evolutionary Multiobjective Optimization
In evolutionary algorithms, a preselection operator aims to select the p...
read it
-
Learning from Non-Stationary Stream Data in Multiobjective Evolutionary Algorithm
Evolutionary algorithms (EAs) have been well acknowledged as a promising...
read it
-
Modeling The Intensity Function Of Point Process Via Recurrent Neural Networks
Event sequence, asynchronously generated with random timestamp, is ubiqu...
read it
-
Multi-view Regularized Gaussian Processes
Gaussian processes (GPs) have been proven to be powerful tools in variou...
read it
-
Learning Correspondence Structures for Person Re-identification
This paper addresses the problem of handling spatial misalignments due t...
read it
-
A Survey on Multi-View Clustering
With the fast development of information technology, especially the popu...
read it
-
Kernel Regression with Sparse Metric Learning
Kernel regression is a popular non-parametric fitting technique. It aims...
read it
-
Weighted Data Normalization Based on Eigenvalues for Artificial Neural Network Classification
Artificial neural network (ANN) is a very useful tool in solving learnin...
read it
-
Infinite Mixtures of Multivariate Gaussian Processes
This paper presents a new model called infinite mixtures of multivariate...
read it
-
A Multiphase Image Segmentation Based on Fuzzy Membership Functions and L1-norm Fidelity
In this paper, we propose a variational multiphase image segmentation mo...
read it
-
LSBN: A Large-Scale Bayesian Structure Learning Framework for Model Averaging
The motivation for this paper is to apply Bayesian structure learning us...
read it
-
Neural Network Multitask Learning for Traffic Flow Forecasting
Traditional neural network approaches for traffic flow forecasting are u...
read it
-
A Provably Secure Ring Signature Scheme in Certificateless Cryptography
Ring signature is a kind of group-oriented signature. It allows a member...
read it
-
Towards an executable semantics of automobile RTOS standard and its application to conformance verification
The automobile Real-Time Operating System (RTOS) is hard to design and i...
read it
-
BiRank: Towards Ranking on Bipartite Graphs
The bipartite graph is a ubiquitous data structure that can model the re...
read it
-
A Multi-task Learning Approach for Improving Product Title Compression with User Search Log Data
It is a challenging and practical research problem to obtain effective c...
read it
-
tau-FPL: Tolerance-Constrained Learning in Linear Time
Learning a classifier with control on the false-positive rate plays a cr...
read it
-
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
Mobile apps have become ubiquitous. For app developers, it is a key prio...
read it
-
An efficient algorithm for global interval solution of nonlinear algebraic equations and its GPGPU implementation
Solving nonlinear algebraic equations is a classic mathematics problem, ...
read it
-
A Fast Proximal Point Method for Wasserstein Distance
Wasserstein distance plays increasingly important roles in machine learn...
read it
-
Finding Top-k Optimal Sequenced Routes -- Full Version
Motivated by many practical applications in logistics and mobility-as-a-...
read it
-
SmartUnit: Empirical Evaluations for Automated Unit Testing of Embedded Software in Industry
In this paper, we aim at the automated unit coverage-based testing for e...
read it
-
Towards Efficient Data-flow Test Data Generation Using KLEE
Dataflow coverage, one of the white-box testing criteria, focuses on the...
read it
-
Precise Temporal Action Localization by Evolving Temporal Proposals
Locating actions in long untrimmed videos has been a challenging problem...
read it
-
The Adversarial Attack and Detection under the Fisher Information Metric
Many deep learning models are vulnerable to the adversarial attack, i.e....
read it
-
SAT-based Explicit LTLf Satisfiability Checking
We present here a SAT-based framework for LTLf (Linear Temporal Logic on...
read it
-
Efficient Super Resolution Using Binarized Neural Network
Deep convolutional neural networks (DCNNs) have recently demonstrated hi...
read it
-
Distributed Economic Dispatch for Energy Internet Based on Multi-Agent Consensus Control
We consider the economic dispatch (ED) for an Energy Internet composed o...
read it
-
Guaranteeing Recoverability via Partially Constrained Transaction Logs
Transaction logging is an essential constituent to guarantee the atomici...
read it
-
A Large-scale Empirical Study on Industrial Fake Apps
While there have been various studies towards Android apps and their dev...
read it
-
Service Capacity Enhanced Task Offloading and Resource Allocation in Multi-Server Edge Computing Environment
An edge computing environment features multiple edge servers and multipl...
read it
-
Online Anomaly Detection with Sparse Gaussian Processes
Online anomaly detection of time-series data is an important and challen...
read it
-
Concurrency Protocol Aiming at High Performance of Execution and Replay for Smart Contracts
Although the emergence of the programmable smart contract makes blockcha...
read it
-
Variational Langevin Hamiltonian Monte Carlo for Distant Multi-modal Sampling
The Hamiltonian Monte Carlo (HMC) sampling algorithm exploits Hamiltonia...
read it