
-
CelebA-Spoof Challenge 2020 on Face Anti-Spoofing: Methods and Results
As facial interaction systems are prevalently deployed, security and rel...
read it
-
A hybrid deep-learning approach for complex biochemical named entity recognition
Named entity recognition (NER) of chemicals and drugs is a critical doma...
read it
-
Natural Language Inference in Context – Investigating Contextual Reasoning over Long Texts
Natural language inference (NLI) is a fundamental NLP task, investigatin...
read it
-
LogiQA: A Challenge Dataset for Machine Reading Comprehension with Logical Reasoning
Machine reading is a fundamental task for testing the capability of natu...
read it
-
Adversarial Training Based Multi-Source Unsupervised Domain Adaptation for Sentiment Analysis
Multi-source unsupervised domain adaptation (MS-UDA) for sentiment analy...
read it
-
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model
Recently, the vulnerability of DNN-based audio systems to adversarial at...
read it
-
Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems
As the popularity of voice user interface (VUI) exploded in recent years...
read it
-
Free-riders in Federated Learning: Attacks and Defenses
Federated learning is a recently proposed paradigm that enables multiple...
read it
-
Adversarial Attack on Skeleton-based Human Action Recognition
Deep learning models achieve impressive performance for skeleton-based h...
read it
-
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers
In this paper, we build a speech privacy attack that exploits speech rev...
read it
-
Temporally Coherent Full 3D Mesh Human Pose Recovery from Monocular Video
Advances in Deep Learning have recently made it possible to recover full...
read it
-
Deep Cross Networks with Aesthetic Preference for Cross-domain Recommendation
When purchasing appearance-first products, e.g., clothes, product appear...
read it
-
Making Speculative BFT Resilient with Trusted Monotonic Counters
Consensus mechanisms used by popular distributed ledgers are highly scal...
read it
-
Impossibility of Full Decentralization in Permissionless Blockchains
Bitcoin uses blockchain technology and proof-of-work (PoW) mechanism whe...
read it
-
Effects of empathy on the evolution of fairness in group-structured populations
The ultimatum game has been a prominent paradigm in studying the evoluti...
read it
-
Latent Dirichlet Allocation in Generative Adversarial Networks
Mode collapse is one of the key challenges in the training of Generative...
read it
-
iQIYI-VID: A Large Dataset for Multi-modal Person Identification
Person identification in the wild is very challenging due to great varia...
read it
-
Caging Loops in Shape Embedding Space: Theory and Computation
We propose to synthesize feasible caging grasps for a target object thro...
read it
-
Hierarchical Attention-Based Recurrent Highway Networks for Time Series Prediction
Time series prediction has been studied in a variety of domains. However...
read it
-
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
In this paper, we seek to better understand Android obfuscation and depi...
read it
-
Skepxels: Spatio-temporal Image Representation of Human Skeleton Joints for Action Recognition
Human skeleton joints are popular for action analysis since they can be ...
read it
-
Defense against Universal Adversarial Perturbations
Recent advances in Deep Learning show the existence of image-agnostic qu...
read it
-
Viewpoint Invariant Action Recognition using RGB-D Videos
In video-based action recognition, viewpoint variations often pose major...
read it
-
Learning Human Pose Models from Synthesized Data for Robust RGB-D Action Recognition
We propose Human Pose Models that represent RGB and depth images of huma...
read it