Machine learning (ML) is promising in accurately detecting malicious flo...
The joint design of the optical system and the downstream algorithm is a...
Recently unsupervised machine learning based systems have been developed...
The development of machine learning models requires a large amount of
tr...
In this paper, we present our solution to the MuSe-Personalisation
sub-c...
Three-dimensional (3D) freehand ultrasound (US) reconstruction without u...
Automatic speech recognition (ASR) provides diverse audio-to-text servic...
The application of unsupervised domain adaptation (UDA)-based fault diag...
The coronavirus disease 2019 (COVID-19) has led to a global pandemic of
...
Few-shot knowledge graph completion (FKGC) task aims to predict unseen f...
In this paper, we explore the feasibility of finding algorithm
implement...
Recent studies have demonstrated that natural-language prompts can help ...
Correcting the optical aberrations and the manufacturing deviations of
c...
As the popularity of mobile photography continues to grow, considerable
...
The explosive growth of cyber attacks nowadays, such as malware, spam, a...
We present an image dehazing algorithm with high quality, wide applicati...
Bit-flip attacks (BFAs) have attracted substantial attention recently, i...
In this paper, we propose HyperVision, a realtime unsupervised machine
l...
One-shot face re-enactment is a challenging task due to the identity mis...
HD map reconstruction is crucial for autonomous driving. LiDAR-based met...
Three-dimensional (3D) freehand ultrasound (US) reconstruction without a...
Deep learning methods have been widely applied to anomaly-based network
...
Temporal graph is an abstraction for modeling dynamic systems that consi...
Inspired by the success of contrastive learning (CL) in computer vision ...
Understanding the origin and influence of the publication's idea is crit...
User review data is helpful in alleviating the data sparsity problem in ...
To reduce human annotations for relation extraction (RE) tasks, distantl...
Industrial recommender systems usually hold data from multiple business
...
Existing text-to-image synthesis methods generally are only applicable t...
Recently, research communities highlight the necessity of formulating a
...
Although face swapping has attracted much attention in recent years, it
...
Android allows apps to communicate with its system services via system
s...
Detecting forgery videos is highly desirable due to the abuse of deepfak...
New COVID-19 epidemic strains like Delta and Omicron with increased
tran...
Deepfake detection automatically recognizes the manipulated medias throu...
Model-based methods for recommender systems have been studied extensivel...
Face sketch synthesis has been widely used in multi-media entertainment ...
Diverse Natural Language Processing tasks employ constituency parsing to...
In recent years, significant progress has been achieved in biphasic face...
Building embodied intelligent agents that can interact with 3D indoor
en...
Adversarial attacks against commercial black-box speech platforms, inclu...
Information flows are intrinsic properties of an multi-stage manufacturi...
Biphasic facial age translation aims at predicting the appearance of the...
Annotations quality and quantity positively affect the performance of
se...
Ultra-high resolution image segmentation has raised increasing interests...
Instance recognition is rapidly advanced along with the developments of
...
Graph Neural Networks (GNNs) have achieved state-of-the-art performance ...
The rapid development of modern science and technology has spawned rich
...
High-definition map (HD map) construction is a crucial problem for auton...
Recommending cold-start items is a long-standing and fundamental challen...