As a trusted middleware connecting the blockchain and the real world, th...
Many of our critical infrastructure systems and personal computing syste...
Humans have the ability to reuse previously learned policies to solve ne...
Reconstructing 3D poses from 2D poses lacking depth information is
parti...
ChatGPT, as a versatile large language model, has demonstrated remarkabl...
In this paper, we investigate the realization of covert communication in...
Membership inference (MI) attacks threaten user privacy through determin...
With the rapid proliferation of Internet of Things (IoT) devices and the...
Semi-supervised learning (SSL) methods, which can leverage a large amoun...
In reinforcement learning, unsupervised skill discovery aims to learn di...
Purpose: Middle ear infection is the most prevalent inflammatory disease...
Smart contracts are crucial elements of decentralized technologies, but ...
We propose a new general model called IPNN - Indeterminate Probability N...
The rapid development of advanced computing technologies such as quantum...
The emergency of Pre-trained Language Models (PLMs) has achieved tremend...
The Bidirectional Encoder Representations from Transformers (BERT) were
...
Recent advances in graph-based learning approaches have demonstrated the...
Engineers and scientists have been collecting and analyzing fatigue data...
In this paper, we investigate the design of a burst jamming detection me...
As cache-based side-channel attacks become serious security problems, va...
Multi-agent reinforcement learning(MARL) is a prevalent learning paradig...
Advancing object detection to open-vocabulary and few-shot transfer has ...
Emulating firmware of microcontrollers is challenging due to the lack of...
Three-dimensional (3D) integrated renal structures (IRS) segmentation is...
In this paper, we propose a robust secrecy transmission scheme for
intel...
We consider the problem of autonomous channel access (AutoCA), where a g...
Encryption ransomware has become a notorious malware. It encrypts user d...
Deep neural networks generally perform poorly with datasets that suffer ...
The ever-growing model size and scale of compute have attracted increasi...
Open-domain conversational systems are assumed to generate equally good
...
This work systematically conducts a data analysis based on the numbers o...
Offline Reinforcement Learning (RL) aims to learn policies from previous...
Ensembles of networks arise in various fields where multiple independent...
Deep neural networks (DNNs) are threatened by adversarial examples.
Adve...
In the context of multi-modality knowledge distillation research, the
ex...
Studying phenotype-gene association can uncover mechanism of diseases an...
Memory safety remains a critical and widely violated property in reality...
Exploration methods based on pseudo-count of transitions or curiosity of...
Head detection in real-world videos is an important research topic in
co...
The diversity of retinal imaging devices poses a significant challenge:
...
VAE, or variational auto-encoder, compresses data into latent attributes...
Information flows are intrinsic properties of an multi-stage manufacturi...
Although the importance of using static analysis to detect taint-style
v...
Deep Reinforcement Learning (DRL) and Deep Multi-agent Reinforcement Lea...
As control-flow protection methods get widely deployed it is difficult f...
This study presents a Bayesian spectral density approach for identificat...
Early and accurate diagnosis of Alzheimer's disease (AD) and its prodrom...
Deep neural networks (DNNs) are under threat from adversarial example
at...
Emulating firmware for microcontrollers is challenging due to the tight
...
The existing medium access control (MAC) protocol of Wi-Fi networks (i.e...