
-
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
With the continuous improvement of attack methods, there are more and mo...
read it
-
ULSD: Unified Line Segment Detection across Pinhole, Fisheye, and Spherical Cameras
Line segment detection is essential for high-level tasks in computer vis...
read it
-
Inferring symmetry in natural language
We present a methodological framework for inferring symmetry of verb pre...
read it
-
Mixed Noise Removal with Pareto Prior
Denoising images contaminated by the mixture of additive white Gaussian ...
read it
-
Structure-Aware Network for Lane Marker Extraction with Dynamic Vision Sensor
Lane marker extraction is a basic yet necessary task for autonomous driv...
read it
-
Event Enhanced High-Quality Image Recovery
With extremely high temporal resolution, event cameras have a large pote...
read it
-
Implicit Euler ODE Networks for Single-Image Dehazing
Deep convolutional neural networks (CNN) have been applied for image deh...
read it
-
Modelling High-Level Mathematical Reasoning in Mechanised Declarative Proofs
Mathematical proofs can be mechanised using proof assistants to eliminat...
read it
-
Capturing document context inside sentence-level neural machine translation models with self-training
Neural machine translation (NMT) has arguably achieved human level parit...
read it
-
Matching Neuromorphic Events and Color Images via Adversarial Learning
The event camera has appealing properties: high dynamic range, low laten...
read it
-
Edge-Isoperimetric Inequalities and Ball-Noise Stability: Linear Programming and Probabilistic Approaches
Let Q_n^r be the r-power of the hypercube {-1,1}^n. The discrete edge-is...
read it
-
Asymptotics for Strassen's Optimal Transport Problem
In this paper, we consider Strassen's version of optimal transport probl...
read it
-
Asymptotics of Strassen's Optimal Transport Problem
In this paper, we consider Strassen's version of optimal transport probl...
read it
-
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Membership inference attacks seek to infer the membership of individual ...
read it
-
Maximum Entropy Diverse Exploration: Disentangling Maximum Entropy Reinforcement Learning
Two hitherto disconnected threads of research, diverse exploration (DE) ...
read it
-
An Improved Linear Programming Bound on the Average Distance of a Binary Code
Ahlswede and Katona (1977) posed the following isodiametric problem in H...
read it
-
A Mutual Information Maximization Perspective of Language Representation Learning
We show state-of-the-art word representation learning methods maximize a...
read it
-
Learning Cluster Structured Sparsity by Reweighting
Recently, the paradigm of unfolding iterative algorithms into finite-len...
read it
-
Putting Machine Translation in Context with the Noisy Channel Model
We show that Bayes' rule provides a compelling mechanism for controlling...
read it
-
Demystifying Learning Rate Polices for High Accuracy Training of Deep Neural Networks
Learning Rate (LR) is an important hyper-parameter to tune for effective...
read it
-
CRNet: Image Super-Resolution Using A Convolutional Sparse Coding Inspired Network
Convolutional Sparse Coding (CSC) has been attracting more and more atte...
read it
-
Deep learning scheme for microwave photonic analog broadband signal recovery
In regular microwave photonic (MWP) processing paradigms, broadband sign...
read it
-
Facial Feature Embedded CycleGAN for VIS-NIR Translation
VIS-NIR face recognition remains a challenging task due to the distincti...
read it
-
Bounds on the Average Distance and Distance Enumerator with Applications to Non-Interactive Simulation
We leverage proof techniques in coding theory and Fourier analysis to de...
read it
-
Unsupervised Recurrent Neural Network Grammars
Recurrent neural network grammars (RNNG) are generative models of langua...
read it
-
Differentially Private Model Publishing for Deep Learning
Deep learning techniques based on neural networks have shown significant...
read it
-
Diverse Exploration via Conjugate Policies for Policy Gradient Methods
We address the challenge of effective exploration while maintaining good...
read it
-
Learning and Evaluating General Linguistic Intelligence
We define general linguistic intelligence as the ability to reuse previo...
read it
-
Variational Smoothing in Recurrent Neural Network Language Models
We present a new theoretical perspective of data noising in recurrent ne...
read it
-
Image Super-Resolution via RL-CSC: When Residual Learning Meets Convolutional Sparse Coding
We propose a simple yet effective model for Single Image Super-Resolutio...
read it
-
Sentence Encoding with Tree-constrained Relation Networks
The meaning of a sentence is a function of the relations that hold betwe...
read it
-
On Conditional Correlations
The Pearson correlation, correlation ratio, and maximal correlation have...
read it
-
Exact Channel Synthesis
We consider the exact channel synthesis problem, which is the problem of...
read it
-
Tackling Sequence to Sequence Mapping Problems with Neural Networks
In Natural Language Processing (NLP), it is important to detect the rela...
read it
-
Corrections to "Wyner's Common Information under Rényi Divergence Measures"
In this correspondence, we correct an erroneous argument in the proof of...
read it
-
On Exact and ∞-Rényi Common Informations
Recently, two extensions of Wyner's common information — exact and Rényi...
read it
-
Beyond the Central Limit Theorem: Universal and Non-universal Simulations of Random Variables by General Mappings
The Central Limit Theorem states that a standard Gaussian random variabl...
read it
-
Adversarial Examples in Deep Learning: Characterization and Divergence
The burgeoning success of deep learning has raised the security and priv...
read it
-
Towards Demystifying Membership Inference Attacks
Membership inference attacks seek to infer membership of individual trai...
read it
-
Simulation of Random Variables under Rényi Divergence Measures of All Orders
The random variable simulation problem consists in using a k-dimensional...
read it
-
Diverse Exploration for Fast and Safe Policy Improvement
We study an important yet under-addressed problem of quickly and safely ...
read it
-
Asymptotic Coupling and Its Applications in Information Theory
A coupling of two distributions P_X and P_Y is a joint distribution P_XY...
read it
-
Automatic Streaming Segmentation of Stereo Video Using Bilateral Space
In this paper, we take advantage of binocular camera and propose an unsu...
read it
-
The Neural Noisy Channel
We formulate sequence to sequence transduction as a noisy channel decodi...
read it
-
Online Segment to Segment Neural Transduction
We introduce an online neural sequence to sequence model that learns to ...
read it
-
GPU-FV: Realtime Fisher Vector and Its Applications in Video Monitoring
Fisher vector has been widely used in many multimedia retrieval and visu...
read it
-
Neural Variational Inference for Text Processing
Recent advances in neural variational inference have spawned a renaissan...
read it
-
The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
Many existing speaker verification systems are reported to be vulnerable...
read it
-
Deep Learning for Answer Sentence Selection
Answer sentence selection is the task of identifying sentences that cont...
read it