
-
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns
Person re-identification (re-ID) is the task of matching person images a...
read it
-
Image Super-Resolution by Neural Texture Transfer
Due to the significant information loss in low-resolution (LR) images, i...
read it
-
Unsupervised and Unregistered Hyperspectral Image Super-Resolution with Mutual Dirichlet-Net
Hyperspectral images (HSI) provide rich spectral information that contri...
read it
-
Hybrid Micro/Macro Level Convolution for Heterogeneous Graph Learning
Heterogeneous graphs are pervasive in practical scenarios, where each gr...
read it
-
LEMO: Learn to Equalize for MIMO-OFDM Systems with Low-Resolution ADCs
This paper develops a new deep neural network optimized equalization fra...
read it
-
One-Shot Mutual Affine-Transfer for Photorealistic Stylization
Photorealistic style transfer aims to transfer the style of a reference ...
read it
-
r-BTN: Cross-domain Face Composite and Synthesis from Limited Facial Patches
We start by asking an interesting yet challenging question, "If an eyewi...
read it
-
Age Progression/Regression by Conditional Adversarial Autoencoder
"If I provide you a face image of mine (without telling you the actual a...
read it
-
Variable subset selection via GA and information complexity in mixtures of Poisson and negative binomial regression models
Count data, for example the number of observed cases of a disease in a c...
read it
-
Image color transfer to evoke different emotions based on color combinations
In this paper, a color transfer framework to evoke different emotions fo...
read it
-
Gradient Driven Learning for Pooling in Visual Pipeline Feature Extraction Models
Hyper-parameter selection remains a daunting task when building a patter...
read it
-
Recurrent Online Clustering as a Spatio-Temporal Feature Extractor in DeSTIN
This paper presents a basic enhancement to the DeSTIN deep learning arch...
read it
-
Visual Progression Analysis of Student Records Data
University curriculum, both on a campus level and on a per-major level, ...
read it
-
Using data science as a community advocacy tool to promote equity in urban renewal programs: An analysis of Atlanta's Anti-Displacement Tax Fund
Cities across the United States are undergoing great transformation and ...
read it
-
Towards Simulation and Risk Assessment of Weather-Related Cascading Outages
Weather and environmental factors are verified to have played significan...
read it
-
Control and Limit Enforcements for VSC Multi-Terminal HVDC in Newton Power Flow
This paper proposes a novel method to automatically enforce controls and...
read it
-
Neurally Plausible Model of Robot Reaching Inspired by Infant Motor Babbling
In this paper we present a neurally plausible model of robot reaching in...
read it
-
Decoupled Learning for Conditional Adversarial Networks
Incorporating encoding-decoding nets with adversarial nets has been wide...
read it
-
Discriminative Cross-View Binary Representation Learning
Learning compact representation is vital and challenging for large scale...
read it
-
Reference-Conditioned Super-Resolution by Neural Texture Transfer
With the recent advancement in deep learning, we have witnessed a great ...
read it
-
Analysis on the Nonlinear Dynamics of Deep Neural Networks: Topological Entropy and Chaos
The theoretical explanation for deep neural network (DNN) is still an op...
read it
-
Unsupervised Sparse Dirichlet-Net for Hyperspectral Image Super-Resolution
In many computer vision applications, obtaining images of high resolutio...
read it
-
Talking Face Generation by Conditional Recurrent Adversarial Network
Given an arbitrary face image and an arbitrary speech clip, the proposed...
read it
-
Functional Variable Selection for EMG-based Control of a Robotic Hand Prosthetic
State-of-the-art robotic hand prosthetics generate finger and wrist move...
read it
-
PaPaS: A Portable, Lightweight, and Generic Framework for Parallel Parameter Studies
The current landscape of scientific research is widely based on modeling...
read it
-
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to remote cloud can be an economical solution t...
read it
-
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices
Implicit authentication (IA) is gaining popularity over recent years due...
read it
-
Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning
Modern advances in sensor, computing, and communication technologies ena...
read it
-
A Matching Based Theoretical Framework for Estimating Probability of Causation
The concept of Probability of Causation (PC) is critically important in ...
read it
-
On Deep Neural Networks for Detecting Heart Disease
Heart disease is the leading cause of death, and experts estimate that a...
read it
-
Boosting Binary Optimization via Binary Classification: A Case Study of Job Shop Scheduling
Many optimization techniques evaluate solutions consecutively, where the...
read it
-
Physics Informed Topology Learning in Networks of Linear Dynamical Systems
Learning influence pathways of a network of dynamically related processe...
read it
-
Unsupervised Trajectory Segmentation and Promoting of Multi-Modal Surgical Demonstrations
To improve the efficiency of surgical trajectory segmentation for robot ...
read it
-
Ball: An R package for detecting distribution difference and association in metric spaces
The rapid development of modern technology facilitates the appearance of...
read it
-
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning
Federated learning, i.e., a mobile edge computing framework for deep lea...
read it
-
A Stable Cardinality Distance for Topological Classification
This work incorporates topological and geometric features via persistenc...
read it
-
Bayesian Point Set Registration
Point set registration involves identifying a smooth invertible transfor...
read it
-
Applicability study of the PRIMAD model to LIGO gravitational wave search workflows
The PRIMAD model with its six components (i.e., Platform, Research Objec...
read it
-
SOMOSPIE: A modular SOil MOisture SPatial Inference Engine based on data driven decision
The current availability of soil moisture data over large areas comes fr...
read it
-
Measuring Irregular Geographic Exposure on the Internet
In this work, we examine to what extent the Internet's routing infrastru...
read it
-
Continuous-Time Systems for Solving 0-1 Integer Linear Programming Feasibility Problems
The 0-1 integer linear programming feasibility problem is an important N...
read it
-
SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep Learning
Bullet-screen is a technique that enables the website users to send real...
read it
-
The Maestro Attack: Orchestrating Malicious Flows with BGP
We present the Maestro attack, a novel Link Flooding Attack (LFA) that l...
read it
-
Robust learning with implicit residual networks
In this effort we propose a new deep architecture utilizing residual blo...
read it
-
A Polynomial-Based Approach for Architectural Design and Learning with Deep Neural Networks
In this effort we propose a novel approach for reconstructing multivaria...
read it
-
Greedy Shallow Networks: A New Approach for Constructing and Training Neural Networks
We present a novel greedy approach to obtain a single layer neural netwo...
read it
-
An Energy Stable BDF2 Fourier Pseudo-Spectral Numerical Scheme for the Square Phase Field Crystal Equation
In this paper we propose and analyze an energy stable numerical scheme f...
read it
-
Patterns of Effort Contribution and Demand and User Classification based on Participation Patterns in NPM Ecosystem
Background: Open source requires participation of volunteer and commerci...
read it
-
A Narrow-stencil finite difference method for approximating viscosity solutions of fully nonlinear elliptic partial differential equations with applications to Hamilton-Jacobi-
This paper presents a new narrow-stencil finite difference method for ap...
read it
-
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers
Password managers have the potential to help users more effectively mana...
read it