
MAAC: Novel Alert Correlation Method To Detect Multistep Attack
With the continuous improvement of attack methods, there are more and mo...
read it

ULSD: Unified Line Segment Detection across Pinhole, Fisheye, and Spherical Cameras
Line segment detection is essential for highlevel tasks in computer vis...
read it

Inferring symmetry in natural language
We present a methodological framework for inferring symmetry of verb pre...
read it

Mixed Noise Removal with Pareto Prior
Denoising images contaminated by the mixture of additive white Gaussian ...
read it

StructureAware Network for Lane Marker Extraction with Dynamic Vision Sensor
Lane marker extraction is a basic yet necessary task for autonomous driv...
read it

Event Enhanced HighQuality Image Recovery
With extremely high temporal resolution, event cameras have a large pote...
read it

Implicit Euler ODE Networks for SingleImage Dehazing
Deep convolutional neural networks (CNN) have been applied for image deh...
read it

Modelling HighLevel Mathematical Reasoning in Mechanised Declarative Proofs
Mathematical proofs can be mechanised using proof assistants to eliminat...
read it

Capturing document context inside sentencelevel neural machine translation models with selftraining
Neural machine translation (NMT) has arguably achieved human level parit...
read it

Matching Neuromorphic Events and Color Images via Adversarial Learning
The event camera has appealing properties: high dynamic range, low laten...
read it

EdgeIsoperimetric Inequalities and BallNoise Stability: Linear Programming and Probabilistic Approaches
Let Q_n^r be the rpower of the hypercube {1,1}^n. The discrete edgeis...
read it

Asymptotics for Strassen's Optimal Transport Problem
In this paper, we consider Strassen's version of optimal transport probl...
read it

Asymptotics of Strassen's Optimal Transport Problem
In this paper, we consider Strassen's version of optimal transport probl...
read it

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Membership inference attacks seek to infer the membership of individual ...
read it

Maximum Entropy Diverse Exploration: Disentangling Maximum Entropy Reinforcement Learning
Two hitherto disconnected threads of research, diverse exploration (DE) ...
read it

An Improved Linear Programming Bound on the Average Distance of a Binary Code
Ahlswede and Katona (1977) posed the following isodiametric problem in H...
read it

A Mutual Information Maximization Perspective of Language Representation Learning
We show stateoftheart word representation learning methods maximize a...
read it

Learning Cluster Structured Sparsity by Reweighting
Recently, the paradigm of unfolding iterative algorithms into finitelen...
read it

Putting Machine Translation in Context with the Noisy Channel Model
We show that Bayes' rule provides a compelling mechanism for controlling...
read it

Demystifying Learning Rate Polices for High Accuracy Training of Deep Neural Networks
Learning Rate (LR) is an important hyperparameter to tune for effective...
read it

CRNet: Image SuperResolution Using A Convolutional Sparse Coding Inspired Network
Convolutional Sparse Coding (CSC) has been attracting more and more atte...
read it

Deep learning scheme for microwave photonic analog broadband signal recovery
In regular microwave photonic (MWP) processing paradigms, broadband sign...
read it

Facial Feature Embedded CycleGAN for VISNIR Translation
VISNIR face recognition remains a challenging task due to the distincti...
read it

Bounds on the Average Distance and Distance Enumerator with Applications to NonInteractive Simulation
We leverage proof techniques in coding theory and Fourier analysis to de...
read it

Unsupervised Recurrent Neural Network Grammars
Recurrent neural network grammars (RNNG) are generative models of langua...
read it

Differentially Private Model Publishing for Deep Learning
Deep learning techniques based on neural networks have shown significant...
read it

Diverse Exploration via Conjugate Policies for Policy Gradient Methods
We address the challenge of effective exploration while maintaining good...
read it

Learning and Evaluating General Linguistic Intelligence
We define general linguistic intelligence as the ability to reuse previo...
read it

Variational Smoothing in Recurrent Neural Network Language Models
We present a new theoretical perspective of data noising in recurrent ne...
read it

Image SuperResolution via RLCSC: When Residual Learning Meets Convolutional Sparse Coding
We propose a simple yet effective model for Single Image SuperResolutio...
read it

Sentence Encoding with Treeconstrained Relation Networks
The meaning of a sentence is a function of the relations that hold betwe...
read it

On Conditional Correlations
The Pearson correlation, correlation ratio, and maximal correlation have...
read it

Exact Channel Synthesis
We consider the exact channel synthesis problem, which is the problem of...
read it

Tackling Sequence to Sequence Mapping Problems with Neural Networks
In Natural Language Processing (NLP), it is important to detect the rela...
read it

Corrections to "Wyner's Common Information under Rényi Divergence Measures"
In this correspondence, we correct an erroneous argument in the proof of...
read it

On Exact and ∞Rényi Common Informations
Recently, two extensions of Wyner's common information — exact and Rényi...
read it

Beyond the Central Limit Theorem: Universal and Nonuniversal Simulations of Random Variables by General Mappings
The Central Limit Theorem states that a standard Gaussian random variabl...
read it

Adversarial Examples in Deep Learning: Characterization and Divergence
The burgeoning success of deep learning has raised the security and priv...
read it

Towards Demystifying Membership Inference Attacks
Membership inference attacks seek to infer membership of individual trai...
read it

Simulation of Random Variables under Rényi Divergence Measures of All Orders
The random variable simulation problem consists in using a kdimensional...
read it

Diverse Exploration for Fast and Safe Policy Improvement
We study an important yet underaddressed problem of quickly and safely ...
read it

Asymptotic Coupling and Its Applications in Information Theory
A coupling of two distributions P_X and P_Y is a joint distribution P_XY...
read it

Automatic Streaming Segmentation of Stereo Video Using Bilateral Space
In this paper, we take advantage of binocular camera and propose an unsu...
read it

The Neural Noisy Channel
We formulate sequence to sequence transduction as a noisy channel decodi...
read it

Online Segment to Segment Neural Transduction
We introduce an online neural sequence to sequence model that learns to ...
read it

GPUFV: Realtime Fisher Vector and Its Applications in Video Monitoring
Fisher vector has been widely used in many multimedia retrieval and visu...
read it

Neural Variational Inference for Text Processing
Recent advances in neural variational inference have spawned a renaissan...
read it

The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
Many existing speaker verification systems are reported to be vulnerable...
read it

Deep Learning for Answer Sentence Selection
Answer sentence selection is the task of identifying sentences that cont...
read it
Lei Yu
is this you? claim profile