
-
PENet: Towards Precise and Efficient Image Guided Depth Completion
Image guided depth completion is the task of generating a dense depth ma...
read it
-
Serial-parallel Multi-Scale Feature Fusion for Anatomy-Oriented Hand Joint Detection
Accurate hand joints detection from images is a fundamental topic which ...
read it
-
An Efficient Pessimistic-Optimistic Algorithm for Constrained Linear Bandits
This paper considers stochastic linear bandits with general constraints....
read it
-
A Generic Object Re-identification System for Short Videos
Short video applications like TikTok and Kwai have been a great hit rece...
read it
-
Infant Cry Classification with Graph Convolutional Networks
We propose an approach of graph convolutional networks for robust infant...
read it
-
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image
Nowadays a steganography has to face challenges of both feature based st...
read it
-
Understanding the Error in Evaluating Adversarial Robustness
Deep neural networks are easily misled by adversarial examples. Although...
read it
-
Self-supervised Visual-LiDAR Odometry with Flip Consistency
Most learning-based methods estimate ego-motion by utilizing visual sens...
read it
-
Efficient Learning-based Scheduling for Information Freshness in Wireless Networks
Motivated by the recent trend of integrating artificial intelligence int...
read it
-
Incentive Mechanism Design for ROI-constrained Auto-bidding
Auto-bidding plays an important role in online advertising and has becom...
read it
-
Model-free Neural Counterfactual Regret Minimization with Bootstrap Learning
Counterfactual Regret Minimization (CFR) has achieved many fascinating r...
read it
-
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture
The problem of estimation of the primary quantization matrix in double J...
read it
-
Data-driven Holistic Framework for Automated Laparoscope Optimal View Control with Learning-based Depth Perception
Laparoscopic Field of View (FOV) control is one of the most fundamental ...
read it
-
Dual-stream Multiple Instance Learning Network for Whole Slide Image Classification with Self-supervised Contrastive Learning
Whole slide images (WSIs) have large resolutions and usually lack locali...
read it
-
Joint Placement Optimization and RNC in UAV-based Wireless Multicast Networks
Random network coding (RNC) is an efficient coding scheme to improve the...
read it
-
Performance Analysis for the CMSA/CA Protocol in UAV-based IoT network
UAV-based base station (UBS) has played an important role in the air-gro...
read it
-
Performance Analysis and Optimization for the MAC Protocol in UAV-based IoT Network
Unmanned aerial vehicles (UAVs) have played an important role in air-gro...
read it
-
POND: Pessimistic-Optimistic oNline Dispatch
This paper considers constrained online dispatch with unknown arrival, r...
read it
-
Deformable DETR: Deformable Transformers for End-to-End Object Detection
DETR has been recently proposed to eliminate the need for many hand-desi...
read it
-
Improving Resistance to Adversarial Deformations by Regularizing Gradients
Improving the resistance of deep neural networks against adversarial att...
read it
-
Regularization And Normalization For Generative Adversarial Networks: A Review
Generative adversarial networks(GANs) is a popular generative model. Wit...
read it
-
Multitask Non-Autoregressive Model for Human Motion Prediction
Human motion prediction, which aims at predicting future human skeletons...
read it
-
Epoch-evolving Gaussian Process Guided Learning
In this paper, we propose a novel learning scheme called epoch-evolving ...
read it
-
W-net: Simultaneous segmentation of multi-anatomical retinal structures using a multi-task deep neural network
Segmentation of multiple anatomical structures is of great importance in...
read it
-
Dual-stream Maximum Self-attention Multi-instance Learning
Multi-instance learning (MIL) is a form of weakly supervised learning wh...
read it
-
Graph Layer Security: Encrypting Information via Common Networked Physics
The proliferation of low cost Internet of Things (IoT) devices demands n...
read it
-
Carbide: Highly Reliable Networks Through Real-Time Multiple Control Plane Composition
Achieving highly reliable networks is essential for network operators to...
read it
-
Event-based Robotic Grasping Detection with Neuromorphic Vision Sensor and Event-Stream Dataset
Robotic grasping plays an important role in the field of robotics. The c...
read it
-
Sampling and Inference of Networked Dynamics using Log-Koopman Nonlinear Graph Fourier Transform
Networked nonlinear dynamics underpin the complex functionality of many ...
read it
-
An Improved Square-root Algorithm for V-BLAST Based on Efficient Inverse Cholesky Factorization
A fast algorithm for inverse Cholesky factorization is proposed, to comp...
read it
-
Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study
The Age-of-Information (AoI) is a new performance metric recently propos...
read it
-
Cost-Sensitive Portfolio Selection via Deep Reinforcement Learning
Portfolio Selection is an important real-world financial task and has at...
read it
-
Online Binary Space Partitioning Forests
The Binary Space Partitioning-Tree (BSP-Tree) process was recently propo...
read it
-
Bayesian Nonparametric Space Partitions: A Survey
Bayesian nonparametric space partition (BNSP) models provide a variety o...
read it
-
Smoothing Graphons for Modelling Exchangeable Relational Data
Modelling exchangeable relational data can be described by graphon theor...
read it
-
Recurrent Dirichlet Belief Networks for Interpretable Dynamic Relational Data Modelling
The Dirichlet Belief Network (DirBN) has been recently proposed as a pro...
read it
-
Incentive-Compatible Diffusion Auctions
Diffusion auction is a new model in auction design. It can incentivize t...
read it
-
Outlier Detection Ensemble with Embedded Feature Selection
Feature selection places an important role in improving the performance ...
read it
-
Waiting but not Aging: Age-of-Information and Utility Optimization Under the Pull Model
The Age-of-Information (AoI) has recently been proposed as an important ...
read it
-
On Pre-transformed Polar Codes
In this paper, we prove that any pre-transformation with an upper-triang...
read it
-
Reinforcement learning for bandwidth estimation and congestion control in real-time communications
Bandwidth estimation and congestion control for real-time communications...
read it
-
Fast-MUSIC for Automotive Massive-MIMO Radar
Massive multiple-input multiple-output (MIMO) radar, assisted by millime...
read it
-
CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images
Over the past few years, detection performance improvements of deep-lear...
read it
-
Scalable Deep Generative Relational Models with High-Order Node Dependence
We propose a probabilistic framework for modelling and exploring the lat...
read it
-
VL-BERT: Pre-training of Generic Visual-Linguistic Representations
We introduce a new pre-trainable generic representation for visual-lingu...
read it
-
Task Allocation and Mobile Base Station Deployment in Wireless Powered Spatial Crowdsourcing
Wireless power transfer (WPT) is a promising technology to prolong the l...
read it
-
CA-RefineNet:A Dual Input WSI Image Segmentation Algorithm Based on Attention
Due to the high resolution of pathological images, the automated semanti...
read it
-
DA-RefineNet:A Dual Input Whole Slide Image Segmentation Algorithm Based on Attention
Due to the high resolution of pathological images, the automated semanti...
read it
-
CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework
CNN-based steganalysis has recently achieved very good performance in de...
read it
-
Diffusion and Auction on Graphs
Auction is the common paradigm for resource allocation which is a fundam...
read it