
-
Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Anti-malware engines are the first line of defense against malicious sof...
read it
-
Energy-Efficient Task Offloading and Resource Allocation in Mobile Edge Computing with Sequential Task Dependency
In this paper, we investigate the computation task with its sub-tasks su...
read it
-
DeepSlicing: Deep Reinforcement Learning Assisted Resource Allocation for Network Slicing
Network slicing enables multiple virtual networks run on the same physic...
read it
-
Robust Visual Object Tracking with Two-Stream Residual Convolutional Networks
The current deep learning based visual tracking approaches have been ver...
read it
-
Sparse Oblique Decision Tree for Power System Security Rules Extraction and Embedding
Increasing the penetration of variable generation has a substantial effe...
read it
-
A Spatially Constrained Deep Convolutional Neural Network for Nerve Fiber Segmentation in Corneal Confocal Microscopic Images using Inaccurate Annotations
Semantic image segmentation is one of the most important tasks in medica...
read it
-
DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things
Internet of Medical Things (IoMT) can connect many medical imaging equip...
read it
-
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Blockchain, the technology behind the popular Bitcoin, is considered a "...
read it
-
Multiuser Scheduling for Minimizing Age of Information in Uplink MIMO Systems
This paper concerns the user scheduling problem in a multiuser multiple-...
read it
-
3D Aggregated Faster R-CNN for General Lesion Detection
Lesions are damages and abnormalities in tissues of the human body. Many...
read it
-
Multidimensional Variational Line Spectra Estimation
The fundamental multidimensional line spectral estimation problem is add...
read it
-
RF Backscatter-based State Estimation for Micro Aerial Vehicles
The advances in compact and agile micro aerial vehicles (MAVs) have show...
read it
-
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data
While the security of the cloud remains a concern, a common practice is ...
read it
-
Mini Lesions Detection on Diabetic Retinopathy Images via Large Scale CNN Features
Diabetic retinopathy (DR) is a diabetes complication that affects eyes. ...
read it
-
Bounding Data-driven Model Errors in Power Grid Analysis
Data-driven models analyze power grids under incomplete physical informa...
read it
-
Conditional variable screening via ordinary least squares projection
To deal with the growing challenge from high dimensional data, we propos...
read it
-
Probabilistic duck curve in high PV penetration power system: Concept, modeling, and empirical analysis in China
The high penetration of photovoltaic (PV) is reshaping the electricity n...
read it
-
Fast mmwave Beam Alignment via Correlated Bandit Learning
Beam alignment (BA) is to ensure the transmitter and receiver beams are ...
read it
-
AFP-Net: Realtime Anchor-Free Polyp Detection in Colonoscopy
Colorectal cancer (CRC) is a common and lethal disease. Globally, CRC is...
read it
-
3D Anchor-Free Lesion Detector on Computed Tomography Scans
Lesions are injuries and abnormal tissues in the human body. Detecting l...
read it
-
An Eigenwise Parallel Augmented Subspace Method for Eigenvalue Problems
A type of parallel augmented subspace scheme for eigenvalue problems is ...
read it
-
Dynamic Kernel Distillation for Efficient Pose Estimation in Videos
Existing video-based human pose estimation methods extensively apply lar...
read it
-
Weakly Supervised Body Part Parsing with Pose based Part Priors
Human body part parsing refers to the task of predicting the semantic se...
read it
-
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
Detection of malicious behavior is a fundamental problem in security. On...
read it
-
Throughput Maximization in Two-hop DF Multiple-Relay Network with Simultaneous Wireless Information and Power Transfer
This paper investigates the end-to-end throughput maximization problem f...
read it
-
Context-Aware Zero-Shot Recognition
We present a novel problem setting in zero-shot learning, zero-shot obje...
read it
-
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution
The abundance of rich varieties of data is enabling many transformative ...
read it
-
A Survey of Distributed Consensus Protocols for Blockchain Networks
Since the inception of Bitcoin, cryptocurrencies and the underlying bloc...
read it
-
Laplace Landmark Localization
Landmark localization in images and videos is a classic problem solved i...
read it
-
On the sure screening property of the iterative sure independence screening algorithm
The iterative version of the sure independence screening algorithm (ISIS...
read it
-
Content Popularity Prediction Towards Location-Aware Mobile Edge Caching
Mobile edge caching enables content delivery within the radio access net...
read it
-
Overlapping Sliced Inverse Regression for Dimension Reduction
Sliced inverse regression (SIR) is a pioneer tool for supervised dimensi...
read it
-
An Aggressive Genetic Programming Approach for Searching Neural Network Structure Under Computational Constraints
Recently, there emerged revived interests of designing automatic program...
read it
-
ECD: An Edge Content Delivery and Update Framework in Mobile Edge Computing
This article proposes an edge content delivery framework (ECD) based on ...
read it
-
Combining Probabilistic Load Forecasts
Probabilistic load forecasts provide comprehensive information about fut...
read it
-
Unsupervised Audio Source Separation via Spectrum Energy Preserved Wasserstein Learning
Separating audio mixtures into individual tracks has been a long standin...
read it
-
Deep Reinforcement Learning-based Image Captioning with Embedding Reward
Image captioning is a challenging problem owing to the complexity in und...
read it
-
AutoScaler: Scale-Attention Networks for Visual Correspondence
Finding visual correspondence between local features is key to many comp...
read it
-
A Hierarchical Distributed Processing Framework for Big Image Data
This paper introduces an effective processing framework nominated ICP (I...
read it
-
Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
We explore the task of recognizing peoples' identities in photo albums i...
read it
-
Deep Domain Confusion: Maximizing for Domain Invariance
Recent reports suggest that a generic supervised deep CNN model trained ...
read it
-
Do Convnets Learn Correspondence?
Convolutional neural nets (convnets) trained from massive labeled datase...
read it
-
Part-based R-CNNs for Fine-grained Category Detection
Semantic part localization can facilitate fine-grained categorization by...
read it
-
PANDA: Pose Aligned Networks for Deep Attribute Modeling
We propose a method for inferring human attributes (such as gender, hair...
read it
-
DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition
We evaluate whether features extracted from the activation of a deep con...
read it