
Deep Transfer Learning for Static Malware Classification
We propose to apply deep transfer learning from computer vision to stati...
read it

FFusionCGAN: An endtoend fusion method for fewfocus images using conditional GAN in cytopathological digital slides
Multifocus image fusion technologies compress different focus depth ima...
read it

Robust Federated Learning with Noisy Communication
Federated learning is a communicationefficient training process that al...
read it

Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Convolutional neural networks (CNNs) are easily spoofed by adversarial e...
read it

Multistage domain adversarial style reconstruction for cytopathological image stain normalization
The different stain styles of cytopathological images have a negative ef...
read it

AU RCNN: Encoding Expert Prior Knowledge into RCNN for Action Unit Detection
Modeling action units (AUs) on human faces is challenging because variou...
read it

Uniform Interpolation Constrained Geodesic Learning on Data Manifold
In this paper, we propose a method to learn a minimizing geodesic within...
read it

Understanding the Importance of Single Directions via Representative Substitution
Understanding the internal representations of deep neural networks (DNNs...
read it

Convolution Neural Network Architecture Learning for Remote Sensing Scene Classification
Remote sensing image scene classification is a fundamental but challengi...
read it

Dense Dilated Network with Probability Regularized Walk for Vessel Detection
The detection of retinal vessel is of great importance in the diagnosis ...
read it

Adversarial Example in Remote Sensing Image Recognition
With the wide application of remote sensing technology in various fields...
read it

Semisupervised classification for dynamic Android malware detection
A growing number of threats to Android phones creates challenges for mal...
read it

Sparse Algorithm for Robust LSSVM in Primal Space
As enjoying the closed form solution, least squares support vector machi...
read it

Keeping the Bad Guys Out: Protecting and Vaccinating Deep Learning with JPEG Compression
Deep neural networks (DNNs) have achieved great success in solving a var...
read it

Sparse Representation Classification Beyond L1 Minimization and the Subspace Assumption
The sparse representation classifier (SRC) proposed in Wright et al. (20...
read it

Stochastic Blockmodeling for Online Advertising
Online advertising is an important and huge industry. Having knowledge o...
read it

On Study of the Binarized Deep Neural Network for Image Classification
Recently, the deep neural network (derived from the artificial neural ne...
read it

Robust Vertex Classification
For random graphs distributed according to stochastic blockmodels, a spe...
read it

Spectral Clustering for DivideandConquer Graph Matching
We present a parallelized bijective graph matching algorithm that levera...
read it

Unsupervised deconvolution of dynamic imaging reveals intratumor vascular heterogeneity
Intratumor heterogeneity is often manifested by vascular compartments wi...
read it

Genus Computing for 3D digital objects: algorithm and implementation
This paper deals with computing topological invariants such as connected...
read it

Linear Time Recognition Algorithms for Topological Invariants in 3D
In this paper, we design linear time algorithms to recognize and determi...
read it

lambdaConnectedness Determination for Image Segmentation
Image segmentation is to separate an image into distinct homogeneous reg...
read it

Harmonic Functions for Data Reconstruction on 3D Manifolds
In computer graphics, smooth data reconstruction on 2D or 3D manifolds u...
read it

Algebraic Soft Decoding Algorithms for ReedSolomon Codes Using Module
The interpolation based algebraic decoding for ReedSolomon (RS) codes c...
read it

Ynet: 3D intracranial artery segmentation using a convolutional autoencoder
Automated segmentation of intracranial arteries on magnetic resonance an...
read it

Vertex nomination: The canonical sampling and the extended spectral nomination schemes
Suppose that one particular block in a stochastic block model is deemed ...
read it

HeNet: A Deep Learning Approach on Intel^ Processor Trace for Effective Exploit Detection
This paper presents HeNet, a hierarchical ensemble neural network, appli...
read it

Cultivating Software Performance in Cloud Computing
There exist multitudes of cloud performance metrics, including workload ...
read it

Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
The rapidly growing body of research in adversarial machine learning has...
read it

OvertheAir Computation in MIMO MultiAccess Channels: Beamforming and Channel Feedback
To support future IoT networks with dense sensor connectivity, a techniq...
read it

Programmable Switch as a Parallel Computing Device
Modern switches have packet processing capacity of up to multitera bits...
read it

TCP Decoupling for Next Generation Communication System
In traditional networks, interfaces of network nodes are duplex. But, em...
read it

Computation over WideBand MAC: Improved Achievable Rate through SubFunction Allocation
Future networks are expected to connect an enormous number of nodes wire...
read it

ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio
Adversarial machine learning research has recently demonstrated the feas...
read it

Computation Over NOMA: Improved Achievable Rate Through SubFunction Superposition
Massive numbers of nodes will be connected in future wireless networks. ...
read it

Towards resilient machine learning for ransomware detection
There has been a surge of interest in using machine learning (ML) to aut...
read it

Digital Geometry, a Survey
This paper provides an overview of modern digital geometry and topology ...
read it

RankingBased Autoencoder for Extreme Multilabel Classification
Extreme Multilabel classification (XML) is an important yet challenging...
read it

Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions
My research lies in the intersection of security and machine learning. T...
read it

BiRANet: Bilinear Attention Net for Diabetic Retinopathy Grading
Diabetic retinopathy (DR) is a common retinal disease that leads to blin...
read it

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis
Converting malware into images followed by visionbased deep learning al...
read it

Sparse Representation Classification via Screening for Graphs
The sparse representation classifier (SRC) is shown to work well for ima...
read it

Privacy Preserving Adjacency Spectral Embedding on Stochastic Blockmodels
For graphs generated from stochastic blockmodels, adjacency spectral emb...
read it

An EndtoEnd Block Autoencoder For Physical Layer Based On Neural Networks
Deep Learning has been widely applied in the area of image processing an...
read it

MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks
Deep neural networks (DNNs) are vulnerable to adversarial attack which i...
read it

User Validation of Recommendation Serendipity Metrics
Though it has been recognized that recommending serendipitous (i.e., sur...
read it

Computing and Communicating Functions in Disorganized Wireless Networks
For future wireless networks, enormous numbers of interconnections are r...
read it

Adaptive Wasserstein Hourglass for Weakly Supervised Hand Pose Estimation from Monocular RGB
Insufficient labeled training datasets is one of the bottlenecks of 3D h...
read it

Accelerating Federated Learning via Momentum Gradient Descent
Federated learning (FL) provides a communicationefficient approach to s...
read it