Clinically, automated polyp segmentation techniques have the potential t...
This paper presents the design, modeling, and experimental validation of...
Software vulnerabilities pose significant risks to computer systems,
imp...
Computer vision (CV), a non-intrusive and cost-effective technology, has...
Monitoring cow body weight is crucial to support farm management decisio...
The multiple-choice knapsack problem (MCKP) is a classic NP-hard
combina...
Accurate, real-time measurements of price index changes using electronic...
Roller-Quadrotor is a novel hybrid terrestrial and aerial quadrotor that...
Histopathological tissue classification is a fundamental task in
computa...
Catching high-speed targets in the flight is a complex and typical highl...
Maintaining engagement and consistency is particularly important in dial...
In the realm of multi-modality, text-guided image retouching techniques
...
The discovery of drug-target interactions (DTIs) is a pivotal process in...
Multimodal named entity recognition (MNER) and multimodal relation extra...
Software vulnerabilities can pose severe harms to a computing system. Th...
Recurrent Neural Networks (RNNs) have been widely applied to deal with
t...
Existing deepfake detection methods perform poorly on face forgeries
gen...
This paper describes LeVoice automatic speech recognition systems to tra...
Dataset discovery from data lakes is essential in many real application
...
Deep learning has seen increasing applications in time series in recent
...
This paper aims to interpret how deepfake detection models learn artifac...
Machine learning (ML) is playing an increasingly important role in data
...
Real-world applications frequently seek to solve a general form of the E...
With the ever-increasing volume of data, there is an urgent need to prov...
With the growing popularity of deep-learning models, model understanding...
Natural language spatial video grounding aims to detect the relevant obj...
Skeleton creation is an important phase in the character animation pipel...
Federated learning (FL) is a privacy-preserving machine learning paradig...
Temporal relational data, perhaps the most commonly used data type in
in...
This report describes the submission of the DKU-DukeECE-Lenovo team to t...
This paper introduces a novel motion planning algorithm, incrementally
s...
Federated Learning (FL) is a recent development in the field of machine
...
Entity Matching (EM) refers to the problem of determining whether two
di...
Index plays an essential role in modern database engines to accelerate t...
Multi-access Edge Computing (MEC) is a key technology in the fifth-gener...
In recent years, edge computing (EC) has attracted great attention for i...
It is fairly common to use code-mixing on a social media platform to exp...
This paper summarizes our studies on propaganda detection techniques for...
Multi-access edge computing (MEC) aims to extend cloud service to the ne...
In recent years, the growing ubiquity of Internet memes on social media
...
The Industrial Internet of Things (IIoT) is an emerging paradigm to make...
We investigate the problem of identifying adversarial attacks on image-b...
Accurate real-time forecasting of key performance indicators (KPIs) is a...
Recent breakthroughs made by deep learning rely heavily on large number ...
The use of aggregates in recursion enables efficient and scalable suppor...
In the past, the semantic issues raised by the non-monotonic nature of
a...
Given two sets of objects, metric similarity join finds all similar pair...
The last decades have seen a surge of interests in distributed computing...
This paper make an investigation of a secure unmanned aerial vehicle
(UA...
K-nearest neighbor (kNN) search has wide applications in many areas,
inc...