
Explaining Convolutional Neural Networks using Softmax Gradient Layerwise Relevance Propagation
Convolutional Neural Networks (CNN) have become stateoftheart in the ...
read it

SDGM: Sparse Bayesian Classifier Based on a Discriminative Gaussian Mixture Model
In probabilistic classification, a discriminative model based on Gaussia...
read it

Weakly Supervised Cell Instance Segmentation by Propagating from Detection Response
Cell shape analysis is important in biomedical research. Deep learning m...
read it

TetraTSDF: 3D human reconstruction from a single image with a tetrahedral outer shell
Recovering the 3D shape of a person from its 2D appearance is illposed ...
read it

Perceptual Deep Neural Networks: Adversarial Robustness through Input Recreation
Adversarial examples have shown that albeit highly accurate, models lear...
read it

Towards effective AIpowered agile project management
The rise of Artificial intelligence (AI) has the potential to significan...
read it

Evolving Robust Neural Architectures to Defend from Adversarial Attacks
Deep neural networks were shown to misclassify slightly modified input i...
read it

Characterindependent font identification
There are a countless number of fonts with various shapes and styles. In...
read it

Self Organizing Classifiers: First Steps in Structured Evolutionary Machine Learning
Learning classifier systems (LCSs) are evolutionary machine learning alg...
read it

Using Robust Regression to Find Font Usage Trends
Fonts have had trends throughout their history, not only in when they we...
read it

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning
Adversarial attacks against conventional Deep Learning (DL) systems and ...
read it

Modality Conversion of Handwritten Patterns by Cross Variational Autoencoders
This research attempts to construct a network that can convert online an...
read it

One pixel attack for fooling deep neural networks
Recent research has revealed that the output of Deep Neural Networks (DN...
read it

Virtual Blood Vessels in Complex Background using Stereo Xray Images
We propose a fully automatic system to reconstruct and visualize 3D bloo...
read it

Scene Text Eraser
The character information in natural scene images contains various perso...
read it

Hierarchical Gaussian Descriptors with Application to Person ReIdentification
Describing the color and textural information of a person image is one o...
read it

Dynamic Weight Alignment for Convolutional Neural Networks
In this paper, we propose a method of improving Convolutional Neural Net...
read it

Minimum Description Length Principle in Supervised Learning with Application to Lasso
The minimum description length (MDL) principle in supervised learning is...
read it

Globally Optimal Object Tracking with Fully Convolutional Networks
Tracking is one of the most important but still difficult tasks in compu...
read it

Simultaneous Safe Screening of Features and Samples in Doubly Sparse Modeling
The problem of learning a sparse model is conceptually interpreted as th...
read it

Judging a Book By its Cover
Book covers communicate information to potential readers, but can that s...
read it

Incremental RANSAC for Online Relocation in Large Dynamic Environments
Vehicle relocation is the problem in which a mobile robot has to estimat...
read it

SemiSupervised learning with DensityRatio Estimation
In this paper, we study statistical properties of semisupervised learni...
read it

Mobile Camera Array Calibration for Light Field Acquisition
The light field camera is useful for computer graphics and vision applic...
read it

Dappled tiling
We consider a certain tiling problem of a planar region in which there a...
read it

Anticommutative Dual Complex Numbers and 2D Rigid Transformation
We introduce a new presentation of the two dimensional rigid transformat...
read it

A concise parametrisation of affine transformation
Good parametrisations of affine transformations are essential to interpo...
read it

Data driven time scale in Gaussian quasilikelihood inference
We study parametric estimation of ergodic diffusions observed at high fr...
read it

The bbranching problem in digraphs
In this paper, we introduce the concept of bbranchings in digraphs, whi...
read it

Lightweight Classification of IoT Malware based on Image Recognition
The Internet of Things (IoT) is an extension of the traditional Internet...
read it

Estimating Diffusion With Compound Poisson Jumps Based On Selfnormalized Residuals
This paper considers parametric estimation problem of the continuous par...
read it

Online LZ77 Parsing and Matching Statistics with RLBWTs
LempelZiv 1977 (LZ77) parsing, matching statistics and the BurrowsWhee...
read it

Contained Neural Style Transfer for Decorated Logo Generation
Making decorated logos requires image editing skills, without sufficient...
read it

Attacking Convolutional Neural Network using Differential Evolution
The output of Convolutional Neural Networks (CNN) has been shown to be d...
read it

Efficient estimation of stable Levy process with symmetric jumps
Efficient estimation of a nonGaussian stable Levy process with drift an...
read it

Codes and Stability
We introduce new yet easily accessible codes for elements of GL_r(A) wit...
read it

O(n n)time text compression by LZstyle longest first substitution
Mauer et al. [A LempelZivstyle Compression Method for Repetitive Texts...
read it

Robust relative error estimation
Relative error estimation has been recently used in regression analysis....
read it

Fair allocation of combinations of indivisible goods and chores
We consider the problem of fairly dividing a set of items. Much of the f...
read it

Exploration of Finite 2D Square Grid by a Metamorphic Robotic System
We consider exploration of finite 2D square grid by a metamorphic roboti...
read it

Righttoleft online construction of parameterized position heaps
Two strings of equal length are said to parameterized match if there is ...
read it

How do Convolutional Neural Networks Learn Design?
In this paper, we aim to understand the design principles in book cover ...
read it

Adelic Extension Classes, Atiyah Bundles and NonCommutative Codes
This paper consists of three components. In the first, we give an adelic...
read it

Noveltyorganizing team of classifiers in noisy and dynamic environments
In the real world, the environment is constantly changing with the input...
read it

Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding
Developers increasingly rely on text matching tools to analyze the relat...
read it

Forming Probably Stable Communities with Limited Interactions
A community needs to be partitioned into disjoint groups; each community...
read it

MRRePair: Grammar Compression based on Maximal Repeats
We analyze the grammar generation algorithm of the RePair compression al...
read it

Self Organizing Classifiers and Niched Fitness
Learning classifier systems are adaptive learning systems which have bee...
read it

Contingency Training
When applied to highdimensional datasets, feature selection algorithms ...
read it

MultipleInstance Learning by Boosting Infinitely Many Shapeletbased Classifiers
We propose a new formulation of MultipleInstance Learning (MIL). In typ...
read it
KYUSHU UNIVERSITY
Kyushu University, abbreviated to Kyudai, is a Japanese national university located in Fukuoka, in the island of Kyushu.