
Selflearn to Explain Siamese Networks Robustly
Learning to compare two objects are essential in applications, such as d...
read it

Temporal Network Representation Learning
Networks evolve continuously over time with the addition, deletion, and ...
read it

MemoryEfficient Deep Learning Inference in Trusted Execution Environments
This study identifies and proposes techniques to alleviate two key bottl...
read it

Generative Adversarial Active Learning for Unsupervised Outlier Detection
Outlier detection is an important topic in machine learning and has been...
read it

GraphPreserving Grid Layout: A Simple Graph Drawing Method for Graph Classification using CNNs
Graph convolutional networks (GCNs) suffer from the irregularity of grap...
read it

Dimension Estimation Using Autoencoders
Dimension Estimation (DE) and Dimension Reduction (DR) are two closely r...
read it

Bounded Manifold Completion
Nonlinear dimensionality reduction or, equivalently, the approximation o...
read it

PotentialBased Advice for Stochastic Policy Learning
This paper augments the reward received by a reinforcement learning agen...
read it

FRESH: Interactive Reward Shaping in HighDimensional State Spaces using Human Feedback
Reinforcement learning has been successful in training autonomous agents...
read it

Blind Image Denoising and Inpainting Using Robust Hadamard Autoencoders
In this paper, we demonstrate how deep autoencoders can be generalized t...
read it

TreeRNN: TopologyPreserving Deep GraphEmbedding and Learning
In contrast to the literature where the graph local patterns are capture...
read it

Research Challenges and Progress in Robotic Grasping and Manipulation Competitions
This paper discusses recent research progress in robotic grasping and ma...
read it

Inductive Representation Learning in Large Attributed Graphs
Graphs (networks) are ubiquitous and allow us to model entities (nodes) ...
read it

Identifying Ontime Reward Delivery Projects with Estimating Delivery Duration on Kickstarter
In Crowdfunding platforms, people turn their prototype ideas into real p...
read it

A Nonlinear Dimensionality Reduction Framework Using Smooth Geodesics
Existing dimensionality reduction methods are adept at revealing hidden ...
read it

Delving Deeper into MOOC Student Dropout Prediction
In order to obtain reliable accuracy estimates for automatic MOOC dropou...
read it

Comparing Apples and Oranges: OffRoad Pedestrian Detection on the NREC Agricultural PersonDetection Dataset
Person detection from vehicles has made rapid progress recently with the...
read it

A Deterministic Global Optimization Method for Variational Inference
Variational inference methods for latent variable statistical models hav...
read it

On Randomized Distributed Coordinate Descent with Quantized Updates
In this paper, we study the randomized distributed coordinate descent al...
read it

Dynamic Sweep Filtering Algorithm for FlexC
We investigate cumulative scheduling in uncertain environments, using co...
read it

Precise Phase Transition of Total Variation Minimization
Characterizing the phase transitions of convex optimizations in recoveri...
read it

Mining Brain Networks using Multiple Side Views for Neurological Disorder Identification
Mining discriminative subgraph patterns from graph data has attracted gr...
read it

Are SlepianWolf Rates Necessary for Distributed Parameter Estimation?
We consider a distributed parameter estimation problem, in which multipl...
read it

Condensed Memory Networks for Clinical Diagnostic Inferencing
Diagnosis of a clinical condition is a challenging task, which often req...
read it

Towards Planning and Control of Hybrid Systems with Limit Cycle using LQR Trees
We present a multiquery recovery policy for a hybrid system with goal l...
read it

RealTime Road Segmentation Using LiDAR Data Processing on an FPGA
This paper presents the FPGA design of a convolutional neural network (C...
read it

MemJam: A False Dependency Attack against ConstantTime Crypto Implementations
Cache attacks exploit memory access patterns of cryptographic implementa...
read it

Towards Efficient Deep Inference for Mobile Applications
Mobile applications are benefiting significantly from the advancement in...
read it

Nonlinear Filtering for Periodic, TimeVarying Parameter Estimation
Many systems arising in biological applications are subject to periodic ...
read it

TFisher Tests: Optimal and Adaptive Thresholding for Combining pValues
For testing a group of hypotheses, tremendous pvalue combination method...
read it

Bayesian Predictive Inference For Finite Population Quantities Under Informative Sampling
We investigate Bayesian predictive inference for finite population quant...
read it

Road Segmentation Using CNN with GRU
This paper presents an accurate and fast algorithm for road segmentation...
read it

Cloudbased or Ondevice: An Empirical Study of Mobile Deep Inference
Modern mobile applications are benefiting significantly from the advance...
read it

Bayesian Logistic Regression for Small Areas with Numerous Households
We analyze binary data, available for a relatively large number (big dat...
read it

Generalized GoodnessOfFit Tests for Correlated Data
This paper concerns the problem of applying the generalized goodnessof...
read it

The Rise of Guardians: Factchecking URL Recommendation to Combat Fake News
A large body of research work and efforts have been focused on detecting...
read it

MRAttractor: Detecting Communities from LargeScale Graphs
Detecting groups of users, who have similar opinions, interests, or soci...
read it

Ballistocardiogrambased Authentication using Convolutional Neural Networks
The goal of this work is to demonstrate the use of the ballistocardiogra...
read it

Shape of the Cloak: Formal Analysis of Clock SkewBased Intrusion Detection System in Controller Area Networks
This paper presents a new masquerade attack called the cloaking attack a...
read it

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
Over the past decade, sidechannels have proven to be significant and pr...
read it

RoadNetv2: A 10 ms Road Segmentation Using Spatial Sequence Layer
In automated driving systems (ADS) and advanced driverassistance system...
read it

MicroWalk: A Framework for Finding Side Channels in Binaries
Microarchitectural side channels expose unprotected software to informat...
read it

TreeGAN: SyntaxAware Sequence Generation with Generative Adversarial Networks
Generative Adversarial Networks (GANs) have shown great capacity on imag...
read it

Regularizing Matrix Factorization with User and Item Embeddings for Recommendation
Following recent successes in exploiting both latent factor and word emb...
read it

Minimum Violation Control Synthesis on CyberPhysical Systems under Attacks
Cyberphysical systems are conducting increasingly complex tasks, which ...
read it

A CNN Accelerator on FPGA Using Depthwise Separable Convolution
Convolutional neural networks (CNNs) have been widely deployed in the fi...
read it

Higherorder Graph Convolutional Networks
Following the success of deep convolutional networks in various vision a...
read it

Explainable PCGML via Game Design Patterns
Procedural content generation via Machine Learning (PCGML) is the umbrel...
read it

Compositional planning in Markov decision processes: Temporal abstraction meets generalized logic composition
In hierarchical planning for Markov decision processes (MDPs), temporal ...
read it

Anomaly Detection via Graphical Lasso
Anomalies and outliers are common in realworld data, and they can arise...
read it
Worcester Polytechnic Institute
Founded in 1865 in Worcester, WPI was one of the United States' first engineering and technology universities and now has 14 academic departments with over 50 undergraduate and graduate degree programs in science, engineering, technology, management, t...