
DeepPrivacy: A Generative Adversarial Network for Face Anonymization
We propose a novel architecture which is able to automatically anonymize...
read it

Learning similarity measures from data
Defining similarity measures is a requirement for some machine learning ...
read it

EfficientPose: Scalable singleperson pose estimation
Human pose estimation facilitates markerless movement analysis in sports...
read it

Smartphone Multimodal Biometric Authentication: Database and Evaluation
Biometricbased verification is widely employed on the smartphones for v...
read it

Datadriven prediction of vortexinduced vibration response of marine risers subjected to threedimensional current
Slender marine structures such as deepwater marine risers are subjected...
read it

MonoSF: MultiView Geometry Meets SingleView Depth for Monocular Scene Flow Estimation of Dynamic Traffic Scenes
Existing 3D scene flow estimation methods provide the 3D geometry and 3D...
read it

Deep learning for dehazing: Comparison and analysis
We compare a recent dehazing method based on deep learning, Dehazenet, w...
read it

A Deep Network Model for Paraphrase Detection in Short Text Messages
This paper is concerned with paraphrase detection. The ability to detect...
read it

Deep Reservoir Computing Using Cellular Automata
Recurrent Neural Networks (RNNs) have been a prominent concept within ar...
read it

Adaptive multipenalty regularization based on a generalized Lasso path
For many algorithms, parameter tuning remains a challenging and critical...
read it

Reservoir Computing Using NonUniform Binary Cellular Automata
The Reservoir Computing (RC) paradigm utilizes a dynamical system, i.e.,...
read it

Variational perturbation and extended Plefka approaches to dynamics on random networks: the case of the kinetic Ising model
We describe and analyze some novel approaches for studying the dynamics ...
read it

Scaling Binarized Neural Networks on Reconfigurable Logic
Binarized neural networks (BNNs) are gaining interest in the deep learni...
read it

Looking Beyond Appearances: Synthetic Training Data for Deep CNNs in Reidentification
Reidentification is generally carried out by encoding the appearance of...
read it

Probabilistic Graphical Models on MultiCore CPUs using Java 8
In this paper, we discuss software design issues related to the developm...
read it

Sparse model selection in the highly undersampled regime
We propose a method for recovering the structure of a sparse undirected ...
read it

Similarity Assessment through blocking and affordance assignment in Textual CBR
It has been conceived that children learn new objects through their affo...
read it

LandmarkGuided Elastic Shape Analysis of Human Character Motions
Motions of virtual characters in movies or video games are typically gen...
read it

Fast multiscale edgedetection in medical ultrasound signals
In this article we suggest a fast multiscale edgedetection scheme for ...
read it

Shape Analysis on Lie Groups with Applications in Computer Animation
Shape analysis methods have in the past few years become very popular, b...
read it

Towards Building a Knowledge Base of Monetary Transactions from a News Collection
We address the problem of extracting structured representations of econo...
read it

A Study of Energy and Locality Effects using Spacefilling Curves
The cost of energy is becoming an increasingly important driver for the ...
read it

On the proper treatment of improper distributions
The axiomatic foundation of probability theory presented by Kolmogorov h...
read it

Conditional fiducial models
The fiducial is not unique in general, but we prove that in a restricted...
read it

Anticipating Information Needs Based on Checkin Activity
In this work we address the development of a smart personal assistant th...
read it

Bayesian inversion of convolved hidden Markov models with applications in reservoir prediction
Efficient assessment of convolved hidden Markov models is discussed. The...
read it

NonAsymptotic Delay Bounds for MultiServer Systems with Synchronization Constraints
Multiserver systems have received increasing attention with important i...
read it

Optimal Learning from the DoobDynkin lemma
The DoobDynkin Lemma gives conditions on two functions X and Y that ens...
read it

Detecting Offensive Language in Tweets Using Deep Learning
This paper addresses the important problem of discerning hateful content...
read it

On the Construction of QuasiBinary and QuasiOrthogonal Matrices over Finite Fields
Orthogonal and quasiorthogonal matrices have a long history of use in d...
read it

Network Traffic Driven Storage Repair
Recently we constructed an explicit family of locally repairable and loc...
read it

Joint Head Selection and Airtime Allocation for Data Dissemination in Mobile Social Networks
Mobile social networks (MSNs) enable people with similar interests to in...
read it

Predicting football tables by a maximally parsimonious model
This paper presents some useful mathematical results involved in footbal...
read it

Confidence Interval Estimators for MOS Values
For the quantification of QoE, subjects often provide individual rating ...
read it

Extracting News Events from Microblogs
Twitter stream has become a large source of information for many people,...
read it

StorageRepair Bandwidth Tradeoff for Wireless Caching with Partial Failure and Broadcast Repair
Repair of multiple partially failed cache nodes is studied in a distribu...
read it

CrossSender BitMixing Coding
Scheduling to avoid packet collisions is a longstanding challenge in ne...
read it

Securing Tagbased recommender systems against profile injection attacks: A comparative study
This work addresses challenges related to attacks on social tagging syst...
read it

Differentially Private Continual Release of Graph Statistics
Motivated by understanding the dynamics of sensitive social networks ove...
read it

EEGbased Subjects Identification based on Biometrics of Imagined Speech using EMD
When brain activity is translated into commands for real applications, t...
read it

Query Understanding via Entity Attribute Identification
Understanding searchers' queries is an essential component of semantic s...
read it

Understanding and Improving Recurrent Networks for Human Activity Recognition by Continuous Attention
Deep neural networks, including recurrent networks, have been successful...
read it

Time is of the Essence: a Joint Hierarchical RNN and Point Process Model for Time and Item Predictions
In recent years sessionbased recommendation has emerged as an increasin...
read it

Measured Channel Hardening in an Indoor Multiband Scenario
A study of channel hardening in a largescale antenna system has been ca...
read it

Word Embedding based on LowRank Doubly Stochastic Matrix Decomposition
Word embedding, which encodes words into vectors, is an important starti...
read it

Can Image Enhancement be Beneficial to Find Smoke Images in Laparoscopic Surgery?
Laparoscopic surgery has a limited field of view. Laser ablation in a la...
read it

Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks
Video streaming currently accounts for the majority of Internet traffic....
read it

CoercionResistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a QuantumSafe Scheme
We present an approach for performing the tallying work in the coercion...
read it

Securing Tagbased recommender systems against profile injection attacks: A comparative study. (Extended Report)
This work addresses the challenges related to attacks on collaborative t...
read it

Intuitive principlebased priors for attributing variance in additive model structures
Variance parameters in additive models are often assigned independent pr...
read it
NTNU
The Norwegian University of Science and Technology is a public research university with campuses in the cities of Trondheim, Gjøvik, and Ålesund in Norway, and has become the largest university in Norway, following the university merger in 2016.