
-
Uncertainty Estimation in Medical Image Localization: Towards Robust Anterior Thalamus Targeting for Deep Brain Stimulation
Atlas-based methods are the standard approaches for automatic targeting ...
read it
-
Workflow Automation for Cyber Physical System Development Processes
Development of Cyber Physical Systems (CPSs) requires close interaction ...
read it
-
Methods and open-source toolkit for analyzing and visualizing challenge results
Biomedical challenges have become the de facto standard for benchmarking...
read it
-
Reachability Analysis for Feed-Forward Neural Networks using Face Lattices
Deep neural networks have been widely applied as an effective approach t...
read it
-
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
Detection of malicious behavior is a fundamental problem in security. On...
read it
-
Radon cumulative distribution transform subspace modeling for image classification
We present a new supervised image classification method for problems whe...
read it
-
Generating Multi-label Discrete Patient Records using Generative Adversarial Networks
Access to electronic health record (EHR) data has motivated computationa...
read it
-
Optimal Detection of Faulty Traffic Sensors Used in Route Planning
In a smart city, real-time traffic sensors may be deployed for various a...
read it
-
3D Deep Learning for Biological Function Prediction from Physical Fields
Predicting the biological function of molecules, be it proteins or drug-...
read it
-
A novel transfer learning method based on common space mapping and weighted domain matching
In this paper, we propose a novel learning framework for the problem of ...
read it
-
Robust High-Dimensional Linear Regression
The effectiveness of supervised learning techniques has made them ubiqui...
read it
-
Multidefender Security Games
Stackelberg security game models and associated computational tools have...
read it
-
A General Retraining Framework for Scalable Adversarial Classification
Traditional classification algorithms assume that training and test data...
read it
-
CIFT: Crowd-Informed Fine-Tuning to Improve Machine Learning Ability
Item Response Theory (IRT) allows for measuring ability of Machine Learn...
read it
-
Controlling Elections through Social Influence
Election control considers the problem of an adversary who attempts to t...
read it
-
A Comparative Analysis of Materialized Views Selection and Concurrency Control Mechanisms in NoSQL Databases
Increasing resource demands require relational databases to scale. While...
read it
-
Adversarial Task Allocation
The problem of allocating tasks to workers is of long standing fundament...
read it
-
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
For enhancing the privacy protections of databases, where the increasing...
read it
-
Adversarial Classification on Social Networks
The spread of unwanted or malicious content through social media has bec...
read it
-
DxNAT - Deep Neural Networks for Explaining Non-Recurring Traffic Congestion
Non-recurring traffic congestion is caused by temporary disruptions, suc...
read it
-
Embedding Complexity In the Data Representation Instead of In the Model: A Case Study Using Heterogeneous Medical Data
Electronic Health Records have become popular sources of data for second...
read it
-
The Hiperwall Visualization Platform for Big Data Research
In the era of Big Data, with the increasing use of large-scale data-driv...
read it
-
Towards a Socially Optimal Multi-Modal Routing Platform
The increasing rate of urbanization has added pressure on the already co...
read it
-
Probability-Scale Residuals in HIV/AIDS Research: Diagnostics and Inference
The probability-scale residual (PSR) is well defined across a wide varie...
read it
-
A comparative analysis of state-of-the-art SQL-on-Hadoop systems for interactive analytics
Hadoop is emerging as the primary data hub in enterprises, and SQL repre...
read it
-
Simulation-Based Reachability Analysis for High-Index Large Linear Differential Algebraic Equations
Reachability analysis is a fundamental problem for safety verification a...
read it
-
Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Attacks in cyber-physical systems (CPS) which manipulate sensor readings...
read it
-
Automated Diagnosis of Clinic Workflows
Outpatient clinics often run behind schedule due to patients who arrive ...
read it
-
Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+
Usage control models provide an integration of access control, digital r...
read it
-
FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data
Secure and scalable data sharing is essential for collaborative clinical...
read it
-
Robust Spatial Extent Inference with a Semiparametric Bootstrap Joint Testing Procedure
Spatial extent inference (SEI) is widely used across neuroimaging modali...
read it
-
NNCubes: Learned Structures for Visual Data Exploration
Visual exploration of large multidimensional datasets has seen tremendou...
read it
-
Uncertainty Propagation in Deep Neural Networks Using Extended Kalman Filtering
Extended Kalman Filtering (EKF) can be used to propagate and quantify in...
read it
-
Covariate Distribution Balance via Propensity Scores
The propensity score plays an important role in causal inference with ob...
read it
-
A Data-driven Prognostic Architecture for Online Monitoring of Hard Disks Using Deep LSTM Networks
With the advent of pervasive cloud computing technologies, service relia...
read it
-
Plan Interdiction Games
We propose a framework for cyber risk assessment and mitigation which mo...
read it
-
Quantifying Human Behavior on the Block Design Test Through Automated Multi-Level Analysis of Overhead Video
The block design test is a standardized, widely used neuropsychological ...
read it
-
Regression calibration to correct correlated errors in outcome and exposure
Measurement error arises through a variety of mechanisms. A rich literat...
read it
-
Regularized Ensembles and Transferability in Adversarial Learning
Despite the considerable success of convolutional neural networks in a b...
read it
-
A Semiparametric Effect Size Index
Effect size indices are useful tools in study design and reporting becau...
read it
-
CUR Decompositions, Approximations, and Perturbations
This article discusses a useful tool in dimensionality reduction and low...
read it
-
Health and Kinship Matter: Learning About Direct-To-Consumer Genetic Testing User Experiences via Online Discussions
Direct-to-consumer (DTC) genetic testing has gained in popularity over t...
read it
-
To Warn or Not to Warn: Online Signaling in Audit Games
Routine operational use of sensitive data is commonly governed by laws a...
read it
-
A Review of Deep Learning with Special Emphasis on Architectures, Applications and Recent Trends
Deep learning (DL) has solved a problem that as little as five years ago...
read it
-
Simplified Kinematics of Continuum Robot Equilibrium Modulation via Moment Coupling Effects and Model Calibration
Recently, a new concept for continuum robots capable of producing macro-...
read it
-
Modal-based Kinematics and Contact Detection of Soft Robots
Soft robots offer an alternative approach to manipulate inside the const...
read it
-
Computational Phenotype Discovery via Probabilistic Independence
Computational Phenotype Discovery research has taken various pragmatic a...
read it
-
Perspectives on CUR Decompositions
This note discusses an interesting matrix factorization called the CUR D...
read it
-
Robust Tensor Recovery with Fiber Outliers for Traffic Events
Event detection is gaining increasing attention in smart cities research...
read it
-
Interval-Permutation Segment Graphs
In this work, we introduce the interval permutation segment (IP-SEG) mod...
read it