
CoFF: Cooperative Spatial Feature Fusion for 3D Object Detection on Autonomous Vehicles
To reduce the amount of transmitted data, feature map based fusion is re...
read it

CryptoDL: Deep Neural Networks over Encrypted Data
Machine learning algorithms based on deep neural networks have achieved ...
read it

Learning Feature Representations for Keyphrase Extraction
In supervised approaches for keyphrase extraction, a candidate phrase is...
read it

A Collaborative Filtering Recommender System for Test Case Prioritization in Web Applications
The use of relevant metrics of software systems could improve various so...
read it

Transferring Rich Deep Features for Facial Beauty Prediction
Feature extraction plays a significant part in computer vision tasks. In...
read it

The Capacity of Anonymous Communications
We consider the communication scenario where K transmitters are each con...
read it

Strong Pseudo Transitivity and Intersection Graphs
A directed graph G=(V,E) is strongly pseudo transitive if there is a pa...
read it

#SarcasmDetection is soooo general! Towards a DomainIndependent Approach for Detecting Sarcasm
Automatic sarcasm detection methods have traditionally been designed for...
read it

Anonymous Information Delivery
We introduce the problem of anonymous information delivery (AID), compri...
read it

DeepMove: Learning Place Representations through Large Scale Movement Data
Understanding and reasoning about places and their relationships are cri...
read it

Cross Subspace Alignment and the Asymptotic Capacity of XSecure TPrivate Information Retrieval
Xsecure and Tprivate information retrieval (XSTPIR) is a form of priva...
read it

Opportunistic Treating Interference as Noise
We consider a Kuser interference network with M states, where each tran...
read it

On the Capacity of Locally Decodable Codes
A locally decodable code (LDC) maps K source symbols, each of size L_w b...
read it

A simple upper bound for trace function of a hypergraph with applications
Let H=(V, E) be a hypergraph on the vertex set V and edge set E⊆ 2^V. We...
read it

On the Capacity of Computation Broadcast
The twouser computation broadcast problem is introduced as the setting ...
read it

AI Meets Austen: Towards HumanRobot Discussions of Literary Metaphor
Artificial intelligence is revolutionizing formal education, fueled by i...
read it

Cooper: Cooperative Perception for Connected Autonomous Vehicles based on 3D Point Clouds
Autonomous vehicles may make wrong decisions due to inaccurate detection...
read it

iVAMS 1.0: PolynomialMetamodelIntegrated Intelligent VerilogAMS for Fast, Accurate MixedSignal Design Optimization
Electronic circuit behavioral models built with hardware description/mod...
read it

MUSICNTWRK: data tools for music theory, analysis and composition
We present the API for MUSICNTWRK, a python library for pitch class set ...
read it

Lazy Stream Programming in Prolog
In recent years, stream processing has become a prominent approach for i...
read it

Modality Definition Synthesis for Epistemic Intuitionistic Logic via a Theorem Prover
We derive a Prolog theorem prover for an Intuitionistic Epistemic Logic ...
read it

Breaking the MDSPIR Capacity Barrier via Joint Storage Coding
The capacity of private information retrieval (PIR) from databases coded...
read it

Understanding Relative Network Delay inMicroEnergy Harvesting Wireless Networks
Microenergy harvesting wireless network (MEHWN) enables a perpetual net...
read it

Effectiveness of Adversarial Examples and Defenses for Malware Classification
Artificial neural networks have been successfully used for many differen...
read it

PUFchain: HardwareAssisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)
This article presents the firstever blockchain which can simultaneously...
read it

Dependencybased Text Graphs for Keyphrase and Summary Extraction with Applications to Interactive Content Retrieval
We build a bridge between neural networkbased machine learning and grap...
read it

DevicetoDevice Private Caching with Trusted Server
In order to preserve the privacy of the users demands from other users, ...
read it

Efficient Community Detection in Boolean Composed Multiplex Networks
Networks (or graphs) are used to model the dyadic relations between enti...
read it

Formula Transformers and Combinatorial Test Generators for Propositional Intuitionistic Theorem Provers
We develop combinatorial test generation algorithms for progressively mo...
read it

On BatchProcessing Based Coded Computing for Heterogeneous Distributed Computing Systems
In recent years, coded distributed computing (CDC) has attracted signifi...
read it

ExpandandRandomize: An Algebraic Approach to Secure Computation
We consider the secure computation problem in a minimal model, where Ali...
read it

PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Largescale IoT Frameworks
In today's connected world, resource constrained devices are deployed fo...
read it

Conditional Disclosure of Secrets: A Noise and Signal Alignment Approach
In the conditional disclosure of secrets (CDS) problem, Alice and Bob (e...
read it

Extremal Region Analysis based Deep Learning Framework for Detecting Defects
A maximally stable extreme region (MSER) analysis based convolutional ne...
read it

Obstacle Avoidance and Navigation Utilizing Reinforcement Learning with Reward Shaping
In this paper, we investigate the obstacle avoidance and navigation prob...
read it

Largescale Realtime Personalized Similar Product Recommendations
Similar product recommendation is one of the most common scenes in ecom...
read it

Compound Secure Groupcast: Key Assignment for Selected Broadcasting
The compound secure groupcast problem is considered, where the key varia...
read it

sCrop: A InternetofAgroThings (IoAT) Enabled Solar Powered Smart Device for Automatic Plant Disease Prediction
InternetofThings (IoT) is omnipresent, ranging from home solutions to ...
read it

The limits of quantum circuit simulation with low precision arithmetic
This is an investigation of the limits of quantum circuit simulation wit...
read it

Secure Groupcast: ExtraEntropic Structure and Linear Feasibility
In the secure groupcast problem, a transmitter wants to securely groupca...
read it

Bounding the trace function of a hypergraph with applications
An upper bound on the trace function of a hypergraph H is derived and it...
read it

Interactive Text Graph Mining with a Prologbased Dialog Engine
On top of a neural networkbased dependency parser and a graphbased nat...
read it

A performance study of some approximation algorithms for minimum dominating set in a graph
We implement and test the performances of several approximation algorith...
read it

Natlog: a Lightweight Logic Programming Language with a Neurosymbolic Touch
We introduce Natlog, a lightweight Logic Programming language, sharing P...
read it

Machines as Programs: P ≠ NP
The CurryHoward correspondence is often called the proofsasprograms r...
read it

Online SelfEvolving Anomaly Detection in Cloud Computing Environments
Modern cloud computing systems contain hundreds to thousands of computin...
read it
University of North Texas
UNT is a studentfocused, public, research university located in Denton, Texas. As one of Texas' largest universities, we offer 105 bachelor's, 88 master's and 37 doctoral degree programs within the university's 14 colleges and schools.