
-
Truncation-Free Matching System for Display Advertising at Alibaba
Matching module plays a critical role in display advertising systems. Wi...
read it
-
Data Poisoning Attacks and Defenses to Crowdsourcing Systems
A key challenge of big data analytics is how to collect a large volume o...
read it
-
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Deep neural networks (DNNs) have been applied in a wide range of applica...
read it
-
Data Poisoning Attacks to Deep Learning Based Recommender Systems
Recommender systems play a crucial role in helping users to find their i...
read it
-
Automatic Historical Feature Generation through Tree-based Method in Ads Prediction
Historical features are important in ads click-through rate (CTR) predic...
read it
-
Robust Attacks on Deep Learning Face Recognition in the Physical World
Deep neural networks (DNNs) have been increasingly used in face recognit...
read it
-
Style Intervention: How to Achieve Spatial Disentanglement with Style-based Generators?
Generative Adversarial Networks (GANs) with style-based generators (e.g....
read it
-
Cream of the Crop: Distilling Prioritized Paths For One-Shot Neural Architecture Search
One-shot weight sharing methods have recently drawn great attention in n...
read it
-
Manifold learning-based feature extraction for structural defect reconstruction
Data-driven quantitative defect reconstructions using ultrasonic guided ...
read it
-
A novel combination of theoretical analysis and data-driven method for reconstruction of structural defects
Ultrasonic guided wave technology has played a significant role in the f...
read it
-
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
Automatic speech recognition (ASR) systems have been widely deployed in ...
read it
-
Off-Path TCP Exploits of the Mixed IPID Assignment
In this paper, we uncover a new off-path TCP hijacking attack that can b...
read it
-
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data
Deep neural networks have been widely applied and achieved great success...
read it
-
Low-light Image Restoration with Short- and Long-exposure Raw Pairs
Low-light imaging with handheld mobile devices is a challenging issue. L...
read it
-
Quasi-Dense Instance Similarity Learning
Similarity metrics for instances have drawn much attention, due to their...
read it
-
Reference Guided Face Component Editing
Face portrait editing has achieved great progress in recent years. Howev...
read it
-
Improving supervised prediction of aging-related genes via dynamic network analysis
This study focuses on supervised prediction of aging-related genes from ...
read it
-
Partially-Typed NER Datasets Integration: Connecting Practice to Theory
While typical named entity recognition (NER) models require the training...
read it
-
Spatio-Temporal Dual Affine Differential Invariant for Skeleton-based Action Recognition
The dynamics of human skeletons have significant information for the tas...
read it
-
Negative Margin Matters: Understanding Margin in Few-shot Classification
This paper introduces a negative margin loss to metric learning based fe...
read it
-
Beyond Camera Motion Removing: How to Handle Outliers in Deblurring
Performing camera motion deblurring is an important low-level vision tas...
read it
-
Spatial-Adaptive Network for Single Image Denoising
Previous works have shown that convolutional neural networks can achieve...
read it
-
Dual affine moment invariants
Affine transformation is one of the most common transformations in natur...
read it
-
A3GAN: An Attribute-aware Attentive Generative Adversarial Network for Face Aging
Face aging, which aims at aesthetically rendering a given face to predic...
read it
-
Adversarial Example in Remote Sensing Image Recognition
With the wide application of remote sensing technology in various fields...
read it
-
HiGitClass: Keyword-Driven Hierarchical Classification of GitHub Repositories
GitHub has become an important platform for code sharing and scientific ...
read it
-
Improving sample diversity of a pre-trained, class-conditional GAN by changing its class embeddings
Mode collapse is a well-known issue with Generative Adversarial Networks...
read it
-
Improving Relation Extraction with Knowledge-attention
While attention mechanisms have been proven to be effective in many NLP ...
read it
-
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service
Machine Learning as a Service (MLaaS) allows clients with limited resour...
read it
-
Two Dimensional Router: Design and Implementation
Higher dimensional classification has attracted more attentions with inc...
read it
-
Causality Extraction based on Self-Attentive BiLSTM-CRF with Transferred Embeddings
Causality extraction from natural language texts is a challenging open p...
read it
-
Age Progression and Regression with Spatial Attention Modules
Age progression and regression refers to aesthetically rendering a given...
read it
-
Network Service Dependencies in Commodity Internet-of-Things Devices
We continue to see increasingly widespread deployment of IoT devices, wi...
read it
-
Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method
Convolutional neural networks (CNNs) are easily spoofed by adversarial e...
read it
-
Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects
Despite excellent performance on stationary test sets, deep neural netwo...
read it
-
Understanding the Importance of Single Directions via Representative Substitution
Understanding the internal representations of deep neural networks (DNNs...
read it
-
Electricity consumption forecasting method based on MPSO-BP neural network model
This paper deals with the problem of the electricity consumption forecas...
read it
-
A Regressive Convolution Neural network and Support Vector Regression Model for Electricity Consumption Forecasting
Electricity consumption forecasting has important implications for the m...
read it
-
Finding Similar Medical Questions from Question Answering Websites
The past few years have witnessed the flourishing of crowdsourced medica...
read it
-
Interface-Based Side Channel Attack Against Intel SGX
Intel has introduced a trusted computing technology, Intel Software Guar...
read it
-
Attribute Enhanced Face Aging with Wavelet-based Generative Adversarial Networks
Since it is difficult to collect face images of the same subject over a ...
read it
-
Differential and integral invariants under Mobius transformation
One of the most challenging problems in the domain of 2-D image or 3-D s...
read it
-
Joint Voxel and Coordinate Regression for Accurate 3D Facial Landmark Localization
3D face shape is more expressive and viewpoint-consistent than its 2D co...
read it
-
Global and Local Consistent Age Generative Adversarial Networks
Age progression/regression is a challenging task due to the complicated ...
read it
-
Learning Deep Similarity Models with Focus Ranking for Fabric Image Retrieval
Fabric image retrieval is beneficial to many applications including clot...
read it
-
Deep Supervised Discrete Hashing
With the rapid growth of image and video data on the web, hashing has be...
read it
-
Combining Data-driven and Model-driven Methods for Robust Facial Landmark Detection
Facial landmark detection is an important but challenging task for real-...
read it
-
Learning Word Sense Embeddings from Word Sense Definitions
Word embeddings play a significant role in many modern NLP systems. Sinc...
read it
-
Distributed Parameter Map-Reduce
This paper describes how to convert a machine learning problem into a se...
read it