
Mapping Hearthstone Deck Spaces through MAPElites with Sliding Boundaries
Quality diversity (QD) algorithms such as MAPElites have emerged as a p...
read it

Covariance Matrix Adaptation for the Rapid Illumination of Behavior Space
Quality Diversity (QD) algorithms like Novelty Search with Local Competi...
read it

Illuminating Mario Scenes in the Latent Space of a Generative Adversarial Network
Recent developments in machine learning techniques have allowed automati...
read it

CPOT: Channel Pruning via Optimal Transport
Recent advances in deep neural networks (DNNs) lead to tremendously grow...
read it

The Many AI Challenges of Hearthstone
Games have benchmarked AI methods since the inception of the field, with...
read it

LowPower Neuromorphic Hardware for Signal Processing Applications
Machine learning has emerged as the dominant tool for implementing compl...
read it

Evolving the Hearthstone Meta
Balancing an ever growing strategic game of high complexity, such as Hea...
read it

Stochastic Deep Learning in Memristive Networks
We study the performance of stochastically trained deep neural networks ...
read it

Learning and Realtime Classification of Handwritten Digits With Spiking Neural Networks
We describe a novel spiking neural network (SNN) for automated, realtim...
read it

Predicting Abandonment in Online Coding Tutorials
Learners regularly abandon online coding tutorials when they get bored o...
read it

Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning
In this paper, we focus on developing a novel mechanism to preserve diff...
read it

On Scalable Inference with Stochastic Gradient Descent
In many applications involving large dataset or online updating, stochas...
read it

Preserving Differential Privacy in Convolutional Deep Belief Networks
The remarkable development of deep learning in medicine and healthcare d...
read it

Feature Based Task Recommendation in Crowdsourcing with Implicit Observations
Existing research in crowdsourcing has investigated how to recommend tas...
read it

Optimal strategies for the control of autonomous vehicles in data assimilation
We propose a method to compute optimal control paths for autonomous vehi...
read it

Learning to Sketch Human Facial Portraits using Personal Styles by CaseBased Reasoning
This paper employs casebased reasoning (CBR) to capture the personal st...
read it

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Active authentication is the problem of continuously verifying the ident...
read it

Modulation Classification via Gibbs Sampling Based on a Latent Dirichlet Bayesian Network
A novel Bayesian modulation classification scheme is proposed for a sing...
read it

JPEG Steganalysis Based on DenseNet
Current research has indicated that convolution neural networks (CNNs) c...
read it

Online Edge Caching and Wireless Delivery in FogAided Networks with Dynamic Content Popularity
Fog Radio Access Network (FRAN) architectures can leverage both cloud p...
read it

Finite Blocklength and Dispersion Bounds for the ArbitrarilyVarying Channel
Finite blocklength and secondorder (dispersion) results are presented f...
read it

Achievable Rate of Private Function Retrieval from MDS Coded Databases
We study the problem of private function retrieval (PFR) in a distribute...
read it

ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
We design and implement the first private and anonymous decentralized cr...
read it

Distinguishing Computergenerated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning
Computergenerated graphics are images generated by computer software. T...
read it

Optimal Placement of a UAV to Maximize the Lifetime of Wireless Devices
Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stat...
read it

Efficient (nonrandom) construction and decoding of nonadaptive group testing
The task of nonadaptive group testing is to identify up to d defective ...
read it

Spatial Image Steganography Based on Generative Adversarial Network
With the recent development of deep learning on steganalysis, embedding ...
read it

Spectrally Robust Graph Isomorphism
We initiate the study of spectral generalizations of the graph isomorphi...
read it

Coded Computation Against Distributed Straggling Decoders for Gaussian Channels in CRAN
The uplink via additive white Gaussian noise channels of a cloud radio a...
read it

A Hybrid RFVLC System for Energy Efficient Wireless Access
In this paper, we propose a new paradigm in designing and realizing ener...
read it

Random depthwise signed convolutional neural networks
Random weights in convolutional neural networks have shown promising res...
read it

Energy Efficient Resource Allocation in EHenabled CR Networks for IoT
With the rapid growth of Internet of Things (IoT) devices, the next gene...
read it

Strong Coordination over Noisy Channels
We study the problem of strong coordination of the actions of two nodes ...
read it

A study of integer sorting on multicores
Integer sorting on multicores and GPUs can be realized by a variety of a...
read it

Achieving LowLatency Mobile Edge Computing by Uplink and Downlink Decoupled Access in HetNets
Despite the physical proximity of computationallyenhanced Base Stations...
read it

Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval Passing
We consider binary spatially coupled (SC) low density measurement matric...
read it

A Blended Deep Learning Approach for Predicting User Intended Actions
User intended actions are widely seen in many areas. Forecasting these a...
read it

Programming Without Refining
To derive a program for a given specification R means to find an artifac...
read it

The Preemptive Resource Allocation Problem
We revisit a classical scheduling model to incorporate modern trends in ...
read it

Training Multilayer Spiking Neural Networks using NormAD based SpatioTemporal Error Backpropagation
Spiking neural networks (SNNs) have garnered a great amount of interest ...
read it

A Familybased Graphical Approach for Testing Hierarchically Ordered Families of Hypotheses
In applications of clinical trials, tested hypotheses are often grouped ...
read it

NOMA Aided Narrowband IoT for Machine Type Communications with User Clustering
To support Machine Type Communications (MTC) in next generation mobile n...
read it

Scalable Fair Clustering
We study the fair variant of the classic kmedian problem introduced by ...
read it

Statistical discrimination of RFI and astronomical transients in 2bit digitized time domain signals
We investigate the performance of the generalized Spectral Kurtosis (SK)...
read it

GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier
Machine learning models, especially neural network (NN) classifiers, are...
read it

Preserving Differential Privacy in Adversarial Learning with Provable Robustness
In this paper, we aim to develop a novel mechanism to preserve different...
read it

An Integral Equation Method for the CahnHilliard Equation in the Wetting Problem
We present an integral equation approach to solve the CahnHilliard equa...
read it

ZKGanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks
Neural Network classifiers have been used successfully in a wide range o...
read it

Stochastic Fading Channel Models with Multiple Dominant Specular Components for 5G and Beyond
We introduce a comprehensive statistical characterization of the multipa...
read it

A Deep SpatioTemporal Fuzzy Neural Network for Passenger Demand Prediction
In spite of its importance, passenger demand prediction is a highly chal...
read it
New Jersey Institute of Technology
New Jersey Institute of Technology is the state's public polytechnic university and a leader in STEM education, research, economic development, and service.