
FewShot Domain Adaptation with Polymorphic Transformers
Deep neural networks (DNNs) trained on one set of medical images often e...
read it

Medical Image Segmentation using SqueezeandExpansion Transformers
Medical image segmentation is important for computeraided diagnosis. Go...
read it

Hardness of Metric Dimension in Graphs of Constant Treewidth
The Metric Dimension problem asks for a minimumsized resolving set in a...
read it

The Complexity of Connectivity Problems in ForbiddenTransition Graphs and EdgeColored Graphs
The notion of forbiddentransition graphs allows for a robust generaliza...
read it

Enabling Crosschain Transactions: A Decentralized Cryptocurrency Exchange Protocol
Inspired by Bitcoin, many different kinds of cryptocurrencies based on b...
read it

Many visits TSP revisited
We study the Many Visits TSP problem, where given a number k(v) for each...
read it

Feature Lenses: Plugandplay Neural Modules for TransformationInvariant Visual Representations
Convolutional Neural Networks (CNNs) are known to be brittle under vario...
read it

Illumination Robust Loop Closure Detection with the Constraint of Pose
Background: Loop closure detection is a crucial part in robot navigation...
read it

Invariant Cubature Kalman Filter for Monocular Visual Inertial Odometry with Line Features
To achieve robust and accurate state estimation for robot navigation, we...
read it

Cluster Editing parameterized above the size of a modificationdisjoint P_3 packing is paraNPhard
Given a graph G=(V,E) and an integer k, the Cluster Editing problem asks...
read it

An Improved FPT Algorithm for the Flip Distance Problem
Given a set P of points in the Euclidean plane and two triangulations of...
read it

MultiInstance MultiScale CNN for Medical Image Classification
Deep learning for medical image classification faces three major challen...
read it

Finegrained Attentionbased Video Face Recognition
This paper aims to learn a compact representation of a video for video f...
read it

Deep Learningbased Face Pose Recovery
Facial pose estimation has gained a lot of attentions in many practical ...
read it

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions
Machine learning as a service has been widely deployed to utilize deep n...
read it

Multibudgeted directed cuts
We study multibudgeted variants of the classic minimum cut problem and ...
read it

SecGrid: A Secure and Efficient SGXenabled Smart Grid System with Rich Functionalities
Smart grid adopts twoway communication and rich functionalities to gain...
read it

An improved FPT algorithm for Independent Feedback Vertex Set
We study the Independent Feedback Vertex Set problem  a variant of the ...
read it

Enhanced Attacks on Defensively Distilled Deep Neural Networks
Deep neural networks (DNNs) have achieved tremendous success in many tas...
read it

LaplacianSteered Neural Style Transfer
Neural Style Transfer based on Convolutional Neural Networks (CNN) aims ...
read it

DirichletvMF Mixture Model
This document is about the multidocument VonMisesFisher mixture model...
read it

PSDVec: a Toolbox for Incremental and Scalable Word Embedding
PSDVec is a Python/Perl toolbox that learns word embeddings, i.e. the ma...
read it

Generative Topic Embedding: a Continuous Representation of Documents (Extended Version with Proofs)
Word embedding maps words into a lowdimensional continuous embedding sp...
read it

A Generative Word Embedding Model and its Low Rank Positive Semidefinite Solution
Most existing word embedding methods can be categorized into Neural Embe...
read it

On the Equivalence of Factorized Information Criterion Regularization and the Chinese Restaurant Process Prior
Factorized Information Criterion (FIC) is a recently developed informati...
read it

Factorized Asymptotic Bayesian Inference for Factorial Hidden Markov Models
Factorial hidden Markov models (FHMMs) are powerful tools of modeling se...
read it
Shaohua Li
verfied profile