
-
Characterizing and Mitigating Self-Admitted Build Debt
Technical Debt is a metaphor used to describe the situation in which lon...
read it
-
Reconfigurable-intelligent-surface-assisted Downlink Transmission Design via Bayesian Optimization
This paper investigates the transmission design in the reconfigurable-in...
read it
-
Privacy-preserving Travel Time Prediction with Uncertainty Using GPS Trace Data
The rapid growth of GPS technology and mobile devices has led to a massi...
read it
-
A Principle Solution for Enroll-Test Mismatch in Speaker Recognition
Mismatch between enrollment and test conditions causes serious performan...
read it
-
CN-Celeb: multi-genre speaker recognition
Research on speaker recognition is extending to address the vulnerabilit...
read it
-
eTREE: Learning Tree-structured Embeddings
Matrix factorization (MF) plays an important role in a wide range of mac...
read it
-
Wasserstein Contrastive Representation Distillation
The primary goal of knowledge distillation (KD) is to encapsulate the in...
read it
-
Temporal Relational Modeling with Self-Supervision for Action Segmentation
Temporal relational modeling in video is essential for human action unde...
read it
-
Multi-modal Visual Tracking: Review and Experimental Comparison
Visual object tracking, as a fundamental task in computer vision, has dr...
read it
-
Proactive Pseudo-Intervention: Causally Informed Contrastive Learning For Interpretable Vision Models
Deep neural networks have shown significant promise in comprehending com...
read it
-
Can We Trust Deep Speech Prior?
Recently, speech enhancement (SE) based on deep speech prior has attract...
read it
-
Deep Speaker Vector Normalization with Maximum Gaussianality Training
Deep speaker embedding represents the state-of-the-art technique for spe...
read it
-
Deep generative LDA
Linear discriminant analysis (LDA) is a popular tool for classification ...
read it
-
Squeezing value of cross-domain labels: a decoupled scoring approach for speaker verification
Domain mismatch often occurs in real applications and causes serious per...
read it
-
Deep generative factorization for speech signal
Various information factors are blended in speech signals, which forms t...
read it
-
Generating Large Convex Polytopes Directly on Point Clouds
In this paper, we present a method to efficiently generate large, free, ...
read it
-
Consistency of archetypal analysis
Archetypal analysis is an unsupervised learning method that uses a conve...
read it
-
Remarks on Optimal Scores for Speaker Recognition
In this article, we first establish the theory of optimal scores for spe...
read it
-
Eigenvector distribution in the critical regime of BBP transition
In this paper, we study the random matrix model of Gaussian Unitary Ense...
read it
-
Newcomer Candidate: Characterizing Contributions of a Novice Developer to GitHub
Context: To attract, onboard, and retain any new-comer in Open Source So...
read it
-
WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection
Many popular blockchain platforms are supporting smart contracts for bui...
read it
-
Multispectral Pan-sharpening via Dual-Channel Convolutional Network with Convolutional LSTM Based Hierarchical Spatial-Spectral Feature Fusion
Multispectral pan-sharpening aims at producing a high resolution (HR) mu...
read it
-
Jointly Modeling Motion and Appearance Cues for Robust RGB-T Tracking
In this study, we propose a novel RGB-T tracking framework by jointly mo...
read it
-
Alpha-Refine: Boosting Tracking Performance by Precise Bounding Box Estimation
In recent years, the multiple-stage strategy has become a popular trend ...
read it
-
A Fast Algorithm for Geodesic Active Contours with Applications to Medical Image Segmentation
The geodesic active contour model (GAC) is a commonly used segmentation ...
read it
-
Testing and Support Recovery of Correlation Structures for Matrix-Valued Observations with an Application to Stock Market Data
Estimation of the covariance matrix of asset returns is crucial to portf...
read it
-
Privacy Risk and Preservation For COVID-19 Contact Tracing Apps
Contact tracing in the COVID-19 pandemic is key to prevent the further s...
read it
-
Towards Privacy-aware Task Allocation in Social Sensing based Edge Computing Systems
With the advance in mobile computing, Internet of Things, and ubiquitous...
read it
-
AP20-OLR Challenge: Three Tasks and Their Baselines
This paper introduces the fifth oriental language recognition (OLR) chal...
read it
-
DASC: Towards A Road Damage-Aware Social-Media-Driven Car Sensing Framework for Disaster Response Applications
While vehicular sensor networks (VSNs) have earned the stature of a mobi...
read it
-
Improve bone age assessment by learning from anatomical local regions
Skeletal bone age assessment (BAA), as an essential imaging examination,...
read it
-
An efficient iterative method for reconstructing surface from point clouds
Surface reconstruction from point clouds is a fundamental step in many a...
read it
-
Conversational Word Embedding for Retrieval-Based Dialog System
Human conversations contain many types of information, e.g., knowledge, ...
read it
-
Stabilizing Training of Generative Adversarial Nets via Langevin Stein Variational Gradient Descent
Generative adversarial networks (GANs), famous for the capability of lea...
read it
-
CovidSens: A Vision on Reliable Social Sensing based Risk Alerting Systems for COVID-19 Spread
With the spiraling pandemic of the Coronavirus Disease 2019 (COVID-19), ...
read it
-
Deep Normalization for Speaker Vectors
Deep speaker embedding has demonstrated state-of-the-art performance in ...
read it
-
High-Performance Long-Term Tracking with Meta-Updater
Long-term visual tracking has drawn increasing attention because it is m...
read it
-
Cooling-Shrinking Attack: Blinding the Tracker with Imperceptible Noises
Adversarial attack of CNN aims at deceiving models to misbehave by addin...
read it
-
Graph Representation Learning for Merchant Incentive Optimization in Mobile Payment Marketing
Mobile payment such as Alipay has been widely used in our daily lives. T...
read it
-
Curriculum Audiovisual Learning
Associating sound and its producer in complex audiovisual scene is a cha...
read it
-
The Evolution of Code Review Research: A Systematic Mapping Study
Code Review (CR) is a cornerstone for Quality Assurance within software ...
read it
-
Syntax-Infused Transformer and BERT models for Machine Translation and Natural Language Understanding
Attention-based models have shown significant improvement over tradition...
read it
-
ROI Pooled Correlation Filters for Visual Tracking
The ROI (region-of-interest) based pooling method performs pooling opera...
read it
-
CN-CELEB: a challenging Chinese speaker recognition dataset
Recently, researchers set an ambitious goal of conducting speaker recogn...
read it
-
On Investigation of Unsupervised Speech Factorization Based on Normalization Flow
Speech signals are complex composites of various information, including ...
read it
-
GradNet: Gradient-Guided Network for Visual Object Tracking
The fully-convolutional siamese network based on template matching has s...
read it
-
An Online Reinforcement Learning Approach to Quality-Cost-Aware Task Allocation for Multi-Attribute Social Sensing
Social sensing has emerged as a new sensing paradigm where humans (or de...
read it
-
'Skimming-Perusal' Tracking: A Framework for Real-Time and Robust Long-term Tracking
Compared with traditional short-term tracking, long-term tracking poses ...
read it
-
VAE-based Domain Adaptation for Speaker Verification
Deep speaker embedding has achieved satisfactory performance in speaker ...
read it
-
signADAM: Learning Confidences for Deep Neural Networks
In this paper, we propose a new first-order gradient-based algorithm to ...
read it