
-
Randomization Inference for Composite Experiments with Spillovers and Peer Effects
Group-formation experiments, in which experimental units are randomly as...
read it
-
DROID: Minimizing the Reality Gap using Single-Shot Human Demonstration
Reinforcement learning (RL) has demonstrated great success in the past s...
read it
-
Deep Learning in the Era of Edge Computing: Challenges and Opportunities
The era of edge computing has arrived. Although the Internet is the back...
read it
-
High-Order Relation Construction and Mining for Graph Matching
Graph matching pairs corresponding nodes across two or more graphs. The ...
read it
-
Memory-Safety Challenge Considered Solved? An Empirical Study with All Rust CVEs
Rust is an emerging programing language that aims at preventing memory-s...
read it
-
GPRInvNet: Deep Learning-Based Ground Penetrating Radar Data Inversion for Tunnel Lining
A DNN architecture called GPRInvNet is proposed to tackle the challenge ...
read it
-
Dynamic Connected Neural Decision Classifier and Regressor with Dynamic Softing Pruning
In the regression problem, L1, L2 are the most commonly-used loss functi...
read it
-
Regression via Arbitrary Quantile Modeling
In the regression problem, L1 and L2 are the most commonly used loss fun...
read it
-
Detecting Deep Neural Network Defects with Data Flow Analysis
Deep neural networks (DNNs) are shown to be promising solutions in many ...
read it
-
HM-NAS: Efficient Neural Architecture Search via Hierarchical Masking
The use of automatic methods, often referred to as Neural Architecture S...
read it
-
Nektar++: enhancing the capability and application of high-fidelity spectral/hp element methods
Nektar++ is an open-source framework that provides a flexible, high-perf...
read it
-
DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation
This paper investigates the piracy problem of deep learning models. Desi...
read it
-
On Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs
Symbolic execution is an important software testing approach. It has bee...
read it
-
On Secure and Usable Program Obfuscation: A Survey
Program obfuscation is a widely employed approach for software intellect...
read it