
-
Mapping Hearthstone Deck Spaces through MAP-Elites with Sliding Boundaries
Quality diversity (QD) algorithms such as MAP-Elites have emerged as a p...
read it
-
Covariance Matrix Adaptation for the Rapid Illumination of Behavior Space
Quality Diversity (QD) algorithms like Novelty Search with Local Competi...
read it
-
Illuminating Mario Scenes in the Latent Space of a Generative Adversarial Network
Recent developments in machine learning techniques have allowed automati...
read it
-
CPOT: Channel Pruning via Optimal Transport
Recent advances in deep neural networks (DNNs) lead to tremendously grow...
read it
-
The Many AI Challenges of Hearthstone
Games have benchmarked AI methods since the inception of the field, with...
read it
-
Low-Power Neuromorphic Hardware for Signal Processing Applications
Machine learning has emerged as the dominant tool for implementing compl...
read it
-
Evolving the Hearthstone Meta
Balancing an ever growing strategic game of high complexity, such as Hea...
read it
-
Stochastic Deep Learning in Memristive Networks
We study the performance of stochastically trained deep neural networks ...
read it
-
Learning and Real-time Classification of Hand-written Digits With Spiking Neural Networks
We describe a novel spiking neural network (SNN) for automated, real-tim...
read it
-
Predicting Abandonment in Online Coding Tutorials
Learners regularly abandon online coding tutorials when they get bored o...
read it
-
Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning
In this paper, we focus on developing a novel mechanism to preserve diff...
read it
-
On Scalable Inference with Stochastic Gradient Descent
In many applications involving large dataset or online updating, stochas...
read it
-
Preserving Differential Privacy in Convolutional Deep Belief Networks
The remarkable development of deep learning in medicine and healthcare d...
read it
-
Feature Based Task Recommendation in Crowdsourcing with Implicit Observations
Existing research in crowdsourcing has investigated how to recommend tas...
read it
-
Optimal strategies for the control of autonomous vehicles in data assimilation
We propose a method to compute optimal control paths for autonomous vehi...
read it
-
Learning to Sketch Human Facial Portraits using Personal Styles by Case-Based Reasoning
This paper employs case-based reasoning (CBR) to capture the personal st...
read it
-
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Active authentication is the problem of continuously verifying the ident...
read it
-
Modulation Classification via Gibbs Sampling Based on a Latent Dirichlet Bayesian Network
A novel Bayesian modulation classification scheme is proposed for a sing...
read it
-
JPEG Steganalysis Based on DenseNet
Current research has indicated that convolution neural networks (CNNs) c...
read it
-
Online Edge Caching and Wireless Delivery in Fog-Aided Networks with Dynamic Content Popularity
Fog Radio Access Network (F-RAN) architectures can leverage both cloud p...
read it
-
Finite Blocklength and Dispersion Bounds for the Arbitrarily-Varying Channel
Finite blocklength and second-order (dispersion) results are presented f...
read it
-
Achievable Rate of Private Function Retrieval from MDS Coded Databases
We study the problem of private function retrieval (PFR) in a distribute...
read it
-
ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
We design and implement the first private and anonymous decentralized cr...
read it
-
Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning
Computer-generated graphics are images generated by computer software. T...
read it
-
Optimal Placement of a UAV to Maximize the Lifetime of Wireless Devices
Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stat...
read it
-
Efficient (nonrandom) construction and decoding of non-adaptive group testing
The task of non-adaptive group testing is to identify up to d defective ...
read it
-
Spatial Image Steganography Based on Generative Adversarial Network
With the recent development of deep learning on steganalysis, embedding ...
read it
-
Spectrally Robust Graph Isomorphism
We initiate the study of spectral generalizations of the graph isomorphi...
read it
-
Coded Computation Against Distributed Straggling Decoders for Gaussian Channels in C-RAN
The uplink via additive white Gaussian noise channels of a cloud radio a...
read it
-
A Hybrid RF-VLC System for Energy Efficient Wireless Access
In this paper, we propose a new paradigm in designing and realizing ener...
read it
-
Random depthwise signed convolutional neural networks
Random weights in convolutional neural networks have shown promising res...
read it
-
Energy Efficient Resource Allocation in EH-enabled CR Networks for IoT
With the rapid growth of Internet of Things (IoT) devices, the next gene...
read it
-
Strong Coordination over Noisy Channels
We study the problem of strong coordination of the actions of two nodes ...
read it
-
A study of integer sorting on multicores
Integer sorting on multicores and GPUs can be realized by a variety of a...
read it
-
Achieving Low-Latency Mobile Edge Computing by Uplink and Downlink Decoupled Access in HetNets
Despite the physical proximity of computationally-enhanced Base Stations...
read it
-
Algebraic Optimization of Binary Spatially Coupled Measurement Matrices for Interval Passing
We consider binary spatially coupled (SC) low density measurement matric...
read it
-
A Blended Deep Learning Approach for Predicting User Intended Actions
User intended actions are widely seen in many areas. Forecasting these a...
read it
-
Programming Without Refining
To derive a program for a given specification R means to find an artifac...
read it
-
The Preemptive Resource Allocation Problem
We revisit a classical scheduling model to incorporate modern trends in ...
read it
-
Training Multilayer Spiking Neural Networks using NormAD based Spatio-Temporal Error Backpropagation
Spiking neural networks (SNNs) have garnered a great amount of interest ...
read it
-
A Family-based Graphical Approach for Testing Hierarchically Ordered Families of Hypotheses
In applications of clinical trials, tested hypotheses are often grouped ...
read it
-
NOMA Aided Narrowband IoT for Machine Type Communications with User Clustering
To support Machine Type Communications (MTC) in next generation mobile n...
read it
-
Scalable Fair Clustering
We study the fair variant of the classic k-median problem introduced by ...
read it
-
Statistical discrimination of RFI and astronomical transients in 2-bit digitized time domain signals
We investigate the performance of the generalized Spectral Kurtosis (SK)...
read it
-
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier
Machine learning models, especially neural network (NN) classifiers, are...
read it
-
Preserving Differential Privacy in Adversarial Learning with Provable Robustness
In this paper, we aim to develop a novel mechanism to preserve different...
read it
-
An Integral Equation Method for the Cahn-Hilliard Equation in the Wetting Problem
We present an integral equation approach to solve the Cahn-Hilliard equa...
read it
-
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks
Neural Network classifiers have been used successfully in a wide range o...
read it
-
Stochastic Fading Channel Models with Multiple Dominant Specular Components for 5G and Beyond
We introduce a comprehensive statistical characterization of the multipa...
read it
-
A Deep Spatio-Temporal Fuzzy Neural Network for Passenger Demand Prediction
In spite of its importance, passenger demand prediction is a highly chal...
read it