
-
Keyphrase Extraction with Dynamic Graph Convolutional Networks and Diversified Inference
Keyphrase extraction (KE) aims to summarize a set of phrases that accura...
read it
-
AP-Loss for Accurate One-Stage Object Detection
One-stage object detectors are trained by optimizing classification-loss...
read it
-
Input Validation for Neural Networks via Runtime Local Robustness Verification
Local robustness verification can verify that a neural network is robust...
read it
-
Out-of-Distribution Detection with Distance Guarantee in Deep Generative Models
Recent research has shown that it is challenging to detect out-of-distri...
read it
-
Not Just Cloud Privacy: Protecting Client Privacy in Teacher-Student Learning
Ensuring the privacy of sensitive data used to train modern machine lear...
read it
-
SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning
For the dramatic increase of Android malware and low efficiency of manua...
read it
-
Private Deep Learning with Teacher Ensembles
Privacy-preserving deep learning is crucial for deploying deep neural ne...
read it
-
Towards Accurate One-Stage Object Detection with AP-Loss
One-stage object detectors are trained by optimizing classification-loss...
read it
-
Pretraining-Based Natural Language Generation for Text Summarization
In this paper, we propose a novel pretraining-based encoder-decoder fram...
read it
-
Adversarial Attack and Defense on Graph Data: A Survey
Deep neural networks (DNNs) have been widely applied in various applicat...
read it
-
Dynamic Sounding for Multi-User MIMO in Wireless LANs
Consumer electronic (CE) devices increasingly rely on wireless local are...
read it
-
Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel
Deep Neural Network (DNN) is a widely used deep learning technique. How ...
read it
-
Private Model Compression via Knowledge Distillation
The soaring demand for intelligent mobile applications calls for deployi...
read it
-
Layerwise Perturbation-Based Adversarial Training for Hard Drive Health Degree Prediction
With the development of cloud computing and big data, the reliability of...
read it
-
Deep Learning Towards Mobile Applications
Recent years have witnessed an explosive growth of mobile devices. Mobil...
read it
-
Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud
The increasing demand for on-device deep learning services calls for a h...
read it
-
Combining Symbolic Execution and Model Checking to Verify MPI Programs
Message Passing Interface (MPI) is the standard paradigm of programming ...
read it
-
Scheduling Constraint Based Abstraction Refinement for Multi-Threaded Program Verification
Bounded model checking is among the most efficient techniques for the au...
read it
-
Untangling Blockchain: A Data Processing View of Blockchain Systems
Blockchain technologies are gaining massive momentum in the last few yea...
read it