
-
Improving Sequence-to-Sequence Pre-training via Sequence Span Rewriting
In this paper, we generalize text infilling (e.g., masked language model...
read it
-
Improving BERT with Syntax-aware Local Attention
Pre-trained Transformer-based neural language models, such as BERT, have...
read it
-
Location-aware Single Image Reflection Removal
This paper proposes a novel location-aware deep learning-based single im...
read it
-
DA-HGT: Domain Adaptive Heterogeneous Graph Transformer
Domain adaptation using graph networks is to learn label-discriminative ...
read it
-
Robust Attacks on Deep Learning Face Recognition in the Physical World
Deep neural networks (DNNs) have been increasingly used in face recognit...
read it
-
Exact Phase Transitions of Model RB with Slower-Growing Domains
The second moment method has always been an effective tool to lower boun...
read it
-
Weakly-supervised Salient Instance Detection
Existing salient instance detection (SID) methods typically learn from p...
read it
-
Off-Path TCP Exploits of the Mixed IPID Assignment
In this paper, we uncover a new off-path TCP hijacking attack that can b...
read it
-
Towards Ground Truth Explainability on Tabular Data
In data science, there is a long history of using synthetic data for met...
read it
-
BERT Loses Patience: Fast and Robust Inference with Early Exit
In this paper, we propose Patience-based Early Exit, a straightforward y...
read it
-
Microstructure and Water Absorption of Ancient Concrete from Pompeii: An Integrated Synchrotron Microtomography and Neutron Radiography Characterization
There is renewed interest in using advanced techniques to characterize a...
read it
-
Harvesting and Refining Question-Answer Pairs for Unsupervised QA
Question Answering (QA) has shown great success thanks to the availabili...
read it
-
Weak ties strengthen anger contagion in social media
Increasing evidence suggests that, similar to face-to-face communication...
read it
-
Scheduled DropHead: A Regularization Method for Transformer Models
In this paper, we introduce DropHead, a structured dropout method specif...
read it
-
Self-Attention Attribution: Interpreting Information Interactions Inside Transformer
The great success of Transformer-based models benefits from the powerful...
read it
-
Behavior variations and their implications for popularity promotions: From elites to mass in Weibo
The boom in social media with regard to producing and consuming informat...
read it
-
Electronics-Free Pneumatic Logic Circuits for Localized Feedback Control of Multi-Actuator Soft Robots
The vision of creating entirely-soft robots capable of performing comple...
read it
-
Learning to Compare for Better Training and Evaluation of Open Domain Natural Language Generation Models
Automated evaluation of open domain natural language generation (NLG) mo...
read it
-
Pseudo-Bidirectional Decoding for Local Sequence Transduction
Local sequence transduction (LST) tasks are sequence transduction tasks ...
read it
-
Self-Adversarial Learning with Comparative Discrimination for Text Generation
Conventional Generative Adversarial Networks (GANs) for text generation ...
read it
-
DeepMask: an algorithm for cloud and cloud shadow detection in optical satellite remote sensing images using deep residual network
Detecting and masking cloud and cloud shadow from satellite remote sensi...
read it
-
Improving Grammatical Error Correction with Machine Translation Pairs
We propose a novel data synthesis method to generate diverse error-corre...
read it
-
Online monitoring for safe pedestrian-vehicle interactions
As autonomous systems begin to operate amongst humans, methods for safe ...
read it
-
Where Is My Mirror?
Mirrors are everywhere in our daily lives. Existing computer vision syst...
read it
-
DRFN: Deep Recurrent Fusion Network for Single-Image Super-Resolution with Large Factors
Recently, single-image super-resolution has made great progress owing to...
read it
-
Visualizing and Understanding the Effectiveness of BERT
Language model pre-training, such as BERT, has achieved remarkable resul...
read it
-
MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network
IP protocol is the core of TCP/IP network layer. However, since IP addre...
read it
-
CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems
Detecting and analyzing potential anomalous performances in cloud comput...
read it
-
The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks
The Internet has become the most important infrastructure of modern soci...
read it
-
Spatial Attentive Single-Image Deraining with a High Quality Real Rain Dataset
Removing rain streaks from a single image has been drawing considerable ...
read it
-
Open-vocabulary Phrase Detection
Most existing work that grounds natural language phrases in images start...
read it
-
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
Phrase search allows retrieval of documents containing an exact phrase, ...
read it
-
Budget-aware Online Task Assignment in Spatial Crowdsourcing
The prevalence of mobile internet techniques stimulates the emergence of...
read it
-
Robust Edge-Preserved Surface Mesh Polycube Deformation
The problem of polycube construction or deformation is an essential prob...
read it
-
Specialty-Aware Task Assignment in Spatial Crowdsourcing
With the rapid development of Mobile Internet, spatial crowdsourcing is ...
read it
-
Image Correction via Deep Reciprocating HDR Transformation
Image correction aims to adjust an input image into a visually pleasing ...
read it
-
Diversified Top-k Partial MaxSAT Solving
We introduce a diversified top-k partial MaxSAT problem, a combination o...
read it
-
PipeCNN: An OpenCL-Based FPGA Accelerator for Large-Scale Convolution Neuron Networks
Convolutional neural networks (CNNs) have been widely employed in many a...
read it
-
Learning Influence Functions from Incomplete Observations
We study the problem of learning influence functions under incomplete ob...
read it
-
Word Network Topic Model: A Simple but General Solution for Short and Imbalanced Texts
The short text has been the prevalent format for information of Internet...
read it
-
Phase Transitions in Knowledge Compilation: an Experimental Study
Phase transitions in many complex combinational problems have been widel...
read it
-
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently
Mining frequent sequential patterns from sequence databases has been a c...
read it
-
The Prioritized Inductive Logic Programs
The limit behavior of inductive logic programs has not been explored, bu...
read it
-
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things o...
read it
-
When to Update the sequential patterns of stream data?
In this paper, we first define a difference measure between the old and ...
read it
-
The Algorithms of Updating Sequential Patterns
Because the data being mined in the temporal database will evolve with t...
read it
-
On the Average Similarity Degree between Solutions of Random k-SAT and Random CSPs
To study the structure of solutions for random k-SAT and random CSPs, th...
read it
-
The SAT Phase Transition
Phase transition is an important feature of SAT problem. For random k-SA...
read it
-
An Average Analysis of Backtracking on Random Constraint Satisfaction Problems
In this paper we propose a random CSP model, called Model GB, which is a...
read it
-
Exact Phase Transitions in Random Constraint Satisfaction Problems
In this paper we propose a new type of random CSP model, called Model RB...
read it