
-
Two-sample Test with Kernel Projected Wasserstein Distance
We develop a kernel projected Wasserstein distance for the two-sample te...
read it
-
On Explainability of Graph Neural Networks via Subgraph Explorations
We consider the problem of explaining the predictions of graph neural ne...
read it
-
Adversarially learning disentangled speech representations for robust multi-factor voice conversion
Factorizing speech as disentangled speech representations is vital to ac...
read it
-
UNIT: Unifying Tensorized Instruction Compilation
Because of the increasing demand for computation in DNN, researchers dev...
read it
-
PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack
The studies on black-box adversarial attacks have become increasingly pr...
read it
-
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization
Fooling deep neural networks (DNNs) with the black-box optimization has ...
read it
-
SONC Optimization and Exact Nonnegativity Certificates via Second-Order Cone Programming
The second-order cone (SOC) is a class of simple convex cones and optimi...
read it
-
Deep Deterministic Policy Gradient for Relay Selection and Power Allocation in Cooperative Communication Network
Cooperative communication is an effective approach to improve spectrum u...
read it
-
Duality-Induced Regularizer for Tensor Factorization Based Knowledge Graph Completion
Tensor factorization based models have shown great power in knowledge gr...
read it
-
Fast Hybrid Cascade for Voxel-based 3D Object Classification
Voxel-based 3D object classification has been frequently studied in rece...
read it
-
Reliable Off-policy Evaluation for Reinforcement Learning
In a sequential decision-making problem, off-policy evaluation (OPE) est...
read it
-
Generating Adequate Distractors for Multiple-Choice Questions
This paper presents a novel approach to automatic generation of adequate...
read it
-
Extracting Body Text from Academic PDF Documents for Text Mining
Accurate extraction of body text from PDF-formatted academic documents i...
read it
-
Two-sample Test using Projected Wasserstein Distance: Breaking the Curse of Dimensionality
We develop a projected Wasserstein distance for the two-sample test, a f...
read it
-
Line Graph Neural Networks for Link Prediction
We consider the graph link prediction task, which is a classic graph ana...
read it
-
When HLS Meets FPGA HBM: Benchmarking and Bandwidth Optimization
With the recent release of High Bandwidth Memory (HBM) based FPGA boards...
read it
-
Meta Sequence Learning and Its Applications
We present a meta-sequence representation of sentences and demonstrate h...
read it
-
Extending High-Level Synthesis for Task-Parallel Programs
C/C++/OpenCL-based high-level synthesis (HLS) becomes more and more popu...
read it
-
An Intuitive Tutorial to Gaussian Processes Regression
This introduction aims to provide readers an intuitive understanding of ...
read it
-
A Variational Formula for Rényi Divergences
We derive a new variational formula for the Rényi family of divergences,...
read it
-
DcardNet: Diabetic Retinopathy Classification at Multiple Depths Based on Structural and Angiographic Optical Coherence Tomography
Optical coherence tomography (OCT) and its angiography (OCTA) have sever...
read it
-
Automated segmentation of retinal fluid volumes from structural and angiographic optical coherence tomography using deep learning
Purpose: We proposed a deep convolutional neural network (CNN), named Re...
read it
-
Review of text style transfer based on deep learning
Text style transfer is a hot issue in recent natural language processing...
read it
-
CS-TSSOS: Correlative and term sparsity for large-scale polynomial optimization
This work proposes a new moment-SOS hierarchy, called CS-TSSOS, for solv...
read it
-
Baryon acoustic oscillations reconstruction using convolutional neural networks
Here we propose a new scheme to reconstruct the baryon acoustic oscillat...
read it
-
Upper Bound Scalability on Achievable Rates of Batched Codes for Line Networks
The capacity of line networks with buffer size constraints is an open, b...
read it
-
An Iterative Polishing Framework based on Quality Aware Masked Language Model for Chinese Poetry Generation
Owing to its unique literal and aesthetical characteristics, automatic g...
read it
-
D-SPIDER-SFO: A Decentralized Optimization Algorithm with Faster Convergence Rate for Nonconvex Problems
Decentralized optimization algorithms have attracted intensive interests...
read it
-
Deep Model-Based Reinforcement Learning via Estimated Uncertainty and Conservative Policy Optimization
Model-based reinforcement learning algorithms tend to achieve higher sam...
read it
-
Learning Hierarchy-Aware Knowledge Graph Embeddings for Link Prediction
Knowledge graph embedding, which aims to represent entities and relation...
read it
-
AIM 2019 Challenge on Image Demoireing: Methods and Results
This paper reviews the first-ever image demoireing challenge that was pa...
read it
-
Analyzing Linguistic Complexity and Scientific Impact
The number of publications and the number of citations received have bec...
read it
-
Cross-Platform Modeling of Users' Behavior on Social Media
With the booming development and popularity of mobile applications, diff...
read it
-
Automatic Conditional Generation of Personalized Social Media Short Texts
Automatic text generation has received much attention owing to rapid dev...
read it
-
Audio-Based Music Classification with DenseNet And Data Augmentation
In recent years, deep learning technique has received intense attention ...
read it
-
A Syllable-Structured, Contextually-Based Conditionally Generation of Chinese Lyrics
This paper presents a novel, syllable-structured Chinese lyrics generati...
read it
-
A Hierarchical Attention Based Seq2seq Model for Chinese Lyrics Generation
In this paper, we comprehensively study on context-aware generation of C...
read it
-
Automatic Acrostic Couplet Generation with Three-Stage Neural Network Pipelines
As one of the quintessence of Chinese traditional culture, couplet compr...
read it
-
On Radically Expanding the Landscape of Potential Applications for Automated Proof Methods
In this paper we examine the potential of computer-assisted proof method...
read it
-
SvTPM: A Secure and Efficient vTPM in the Cloud
Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...
read it
-
Image Encryption Algorithm Based on Facebook Social Network
Facebook is the online social networks (OSNs) platform with the largest ...
read it
-
War: Detecting adversarial examples by pre-processing input data
Deep neural networks (DNNs) have demonstrated their outstanding performa...
read it
-
Semi-Supervised Self-Taught Deep Learning for Finger Bones Segmentation
Segmentation stands at the forefront of many high-level vision tasks. In...
read it
-
Multi-Agent Deep Reinforcement Learning for Large-scale Traffic Signal Control
Reinforcement learning (RL) is a promising data-driven approach for adap...
read it
-
Mexican Hat Wavelet Kernel ELM for Multiclass Classification
Kernel extreme learning machine (KELM) is a novel feedforward neural net...
read it
-
Rapid Cycle-Accurate Simulator for High-Level Synthesis
A large semantic gap between the high-level synthesis (HLS) design and t...
read it
-
Effective Predictions of Gaokao Admission Scores for College Applications in Mainland China
Gaokao is the annual academic qualification examination for college admi...
read it
-
Semantic WordRank: Generating Finer Single-Document Summarizations
We present Semantic WordRank (SWR), an unsupervised method for generatin...
read it
-
Examining Scientific Writing Styles from the Perspective of Linguistic Complexity
Publishing articles in high-impact English journals is difficult for sch...
read it
-
DTATG: An Automatic Title Generator based on Dependency Trees
We study automatic title generation for a given block of text and presen...
read it