
-
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization
To investigate the status quo of SEAndroid policy customization, we prop...
read it
-
NAST: Non-Autoregressive Spatial-Temporal Transformer for Time Series Forecasting
Although Transformer has made breakthrough success in widespread domains...
read it
-
Reliable Probabilistic Face Embeddings in the Wild
Probabilistic Face Embeddings (PFE) can improve face recognition perform...
read it
-
UMLE: Unsupervised Multi-discriminator Network for Low Light Enhancement
Low-light image enhancement, such as recovering color and texture detail...
read it
-
A Hierarchical Reasoning Graph Neural Network for The Automatic Scoring of Answer Transcriptions in Video Job Interviews
We address the task of automatically scoring the competency of candidate...
read it
-
Positional Encoding as Spatial Inductive Bias in GANs
SinGAN shows impressive capability in learning internal patch distributi...
read it
-
CARAFE++: Unified Content-Aware ReAssembly of FEatures
Feature reassembly, i.e. feature downsampling and upsampling, is a key o...
read it
-
RRCN: A Reinforced Random Convolutional Network based Reciprocal Recommendation Approach for Online Dating
Recently, the reciprocal recommendation, especially for online dating ap...
read it
-
FedEval: A Benchmark System with a Comprehensive Evaluation Model for Federated Learning
As an innovative solution for privacy-preserving machine learning (ML), ...
read it
-
Skewed Laplace Spectral Mixture kernels for long-term forecasting in Gaussian process
Long-term forecasting involves predicting a horizon that is far ahead of...
read it
-
Exploring the Generalizability of Spatio-Temporal Crowd Flow Prediction: Meta-Modeling and an Analytic Framework
The Spatio-Temporal Crowd Flow Prediction (STCFP) problem is a classical...
read it
-
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps
Authorship identification is the process of identifying and classifying ...
read it
-
Seesaw Loss for Long-Tailed Instance Segmentation
This report presents the approach used in the submission of the LVIS Cha...
read it
-
Domain-specific Communication Optimization for Distributed DNN Training
Communication overhead poses an important obstacle to distributed DNN tr...
read it
-
FPGA-Based Hardware Accelerator of Homomorphic Encryption for Efficient Federated Learning
With the increasing awareness of privacy protection and data fragmentati...
read it
-
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
A trusted execution environment (TEE) such as Intel Software Guard Exten...
read it
-
Divide-and-Shuffle Synchronization for Distributed Machine Learning
Distributed Machine Learning suffers from the bottleneck of synchronizat...
read it
-
Nonlinear Residual Echo Suppression Based on Multi-stream Conv-TasNet
Acoustic echo cannot be entirely removed by linear adaptive filters due ...
read it
-
Neural Data-to-Text Generation with Dynamic Content Planning
Neural data-to-text generation models have achieved significant advancem...
read it
-
Feature Pyramid Grids
Feature pyramid networks have been widely adopted in the object detectio...
read it
-
Vanishing Point Guided Natural Image Stitching
Recently, works on improving the naturalness of stitching images gain mo...
read it
-
Cross Architectural Power Modelling
Existing power modelling research focuses on the model rather than the p...
read it
-
Quantifying the Performance of Federated Transfer Learning
The scarcity of data and isolated data islands encourage different organ...
read it
-
Side-Aware Boundary Localization for More Precise Object Detection
Current object detection frameworks mainly rely on bounding box regressi...
read it
-
Towards Privacy and Security of Deep Learning Systems: A Survey
Deep learning has gained tremendous success and great popularity in the ...
read it
-
Gliding vertex on the horizontal bounding box for multi-oriented object detection
Object detection has recently experienced substantial progress. Yet, the...
read it
-
An End-to-End Audio Classification System based on Raw Waveforms and Mix-Training Strategy
Audio classification can distinguish different kinds of sounds, which is...
read it
-
Real-time Scene Text Detection with Differentiable Binarization
Recently, segmentation-based methods are quite popular in scene text det...
read it
-
Interpretable Encrypted Searchable Neural Networks
In cloud security, traditional searchable encryption (SE) requires high ...
read it
-
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Searchable symmetric encryption (SSE) for multi-owner model draws much a...
read it
-
Multi-client Secure Encrypted Search Using Searching Adversarial Networks
With the rapid development of cloud computing, searchable encryption for...
read it
-
Complex-BP-Neural-Network-based Hybrid Precoding for Millimeter Wave Multiuser Massive MIMO Systems
The high energy consumption of massive multi-input multi-out (MIMO) syst...
read it
-
MMDetection: Open MMLab Detection Toolbox and Benchmark
We present MMDetection, an object detection toolbox that contains a rich...
read it
-
Secure Federated Matrix Factorization
To protect user privacy and meet law regulations, federated (machine) le...
read it
-
Extracting Symptoms and their Status from Clinical Conversations
This paper describes novel models tailored for a new application, that o...
read it
-
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance
It has been a long standing problem to securely outsource computation ta...
read it
-
Locality-Sensitive Sketching for Resilient Network Flow Monitoring
Network monitoring is vital in modern clouds and data center networks fo...
read it
-
CARAFE: Content-Aware ReAssembly of FEatures
Feature upsampling is a key operation in a number of modern convolutiona...
read it
-
Prime Sample Attention in Object Detection
It is a common paradigm in object detection frameworks to treat all samp...
read it
-
Libra R-CNN: Towards Balanced Learning for Object Detection
Compared with model architectures, the training process, which is also c...
read it
-
Neural Networks in Hybrid Precoding for Millimeter Wave Massive MIMO Systems
Neural networks have been applied to the physical layer of wireless comm...
read it
-
Robust Encoder-Decoder Learning Framework towards Offline Handwritten Mathematical Expression Recognition Based on Multi-Scale Deep Neural Network
Offline handwritten mathematical expression recognition is a challenging...
read it
-
Zipper Stack: Shadow Stacks Without Shadow
Return-Oriented Programming (ROP) is a typical attack technique that can...
read it
-
Hybrid Task Cascade for Instance Segmentation
Cascade is a classic yet powerful architecture that has boosted performa...
read it
-
Region Proposal by Guided Anchoring
Region anchors are the cornerstone of modern object detection techniques...
read it
-
Energy Efficiency Optimization of Generalized Spatial Modulation with Sub-Connected Hybrid Precoding
Energy efficiency (EE) optimization of millimeter wave (mm-Wave) massive...
read it
-
Practical Adversarial Attack Against Object Detector
In this paper, we proposed the first practical adversarial attacks again...
read it
-
Self-Localization of Parking Robots Using Square-Like Landmarks
In this paper, we present a framework for self-localization of parking r...
read it
-
Generalized Content-Preserving Warps for Image Stitching
Local misalignment caused by global homography is a common issue in imag...
read it
-
Multiple Combined Constraints for Image Stitching
Several approaches to image stitching use different constraints to estim...
read it