The excellent text-to-image synthesis capability of diffusion models has...
Vehicle-to-everything (V2X) autonomous driving opens up a promising dire...
Large pre-trained vision-language models have shown great prominence in
...
The Wide-field Infrared Survey Explorer (WISE) has detected hundreds of
...
In recent years, large language models (LLMs) have made significant prog...
Recent self-supervised methods are mainly designed for representation
le...
Few-shot object detection (FSOD) aims to expand an object detector for n...
Federated learning (FL) has recently become a hot research topic, in whi...
Few-shot object detection (FSOD) aims to expand an object detector for n...
Oriented object detection is one of the most fundamental and challenging...
Deep learning models rely on highly optimized tensor libraries for effic...
Document-level natural language inference (DOCNLI) is a new challenging ...
Tensegrity robots, composed of rigid rods and flexible cables, exhibit h...
For the traditional denial-of-service attack detection methods have comp...
Tensegrity robots, which are composed of rigid compressive elements (rod...
To address the problem that traditional network traffic anomaly detectio...
Document-level Event Causality Identification (DECI) aims to identify ca...
Realistic visual media synthesis is becoming a critical societal issue w...
2D convolution (Conv2d), which is responsible for extracting features fr...
Large-scale datasets play a vital role in computer vision. Existing data...
Tensegrity robots, composed of rigid rods and flexible cables, are diffi...
In this paper, we propose an effective yet efficient model PAIE for both...
Programmable Logic Controllers (PLCs) are responsible for automating pro...
Suffering from limited singing voice corpus, existing singing voice synt...
Light-weight convolutional neural networks (CNNs) have small complexity ...
3D teeth reconstruction from X-ray is important for dental diagnosis and...
Recently, learning-based algorithms have shown impressive performance in...
High performance person Re-Identification (Re-ID) requires the model to ...
This paper presents a steady-state and transient heat conduction analysi...
This paper studies differential privacy (DP) and local
differential priv...
Conservative mechanism is a desirable property in decision-making proble...
In recent years, transformer-based models have shown state-of-the-art re...
Gait is a unique biometric feature that can be recognized at a distance;...
Convolutional networks (ConvNets) have achieved promising accuracy for
v...
Patient's understanding on forthcoming dental surgeries is required by
p...
The ability of deep learning to predict with uncertainty is recognized a...
Completely positive and trace-preserving maps characterize physically
im...
This work proposes an end-to-end differentiable physics engine for tense...
We propose a novel differentiable physics engine for system identificati...
Visual object tracking is an important application of computer vision.
R...
We propose a novel differentiable physics engine for system identificati...
The evaluation of constitutive models, especially for high-risk and
high...
With the popularity and development of the wearable devices such as
smar...
Panoramic X-ray and Cone Beam Computed Tomography (CBCT) are two of the ...
Real-world object detectors are often challenged by the domain gaps betw...
Existing deep learning methods depend on an encoder-decoder structure to...
Due to a lack of medical resources or oral health awareness, oral diseas...
Due to a lack of medical resources or oral health awareness, oral diseas...
As an emerging technology, blockchain has achieved great success in nume...
We give a capacity formula for the classical communication over a noisy
...