Dialogue-level dependency parsing has received insufficient attention,
e...
Theory of Mind (ToM) is the ability to attribute mental states to others...
A number of trusted execution environments (TEEs) have been proposed by ...
This paper proposes a privacy protection and evaluation method for locat...
For reaction-diffusion equations in irregular domain with moving boundar...
Cell polarity and movement are fundamental to many biological functions....
Adversarial deep learning is to train robust DNNs against adversarial
at...
Generalization in deep reinforcement learning over unseen environment
va...
We propose and analyze a kernelized version of Q-learning. Although a ke...
We develop a universally applicable embedded boundary finite difference
...
We formulate the task of detecting lines and paragraphs in a document in...
Visual exploration is a task that seeks to visit all the navigable areas...
Driven by the high profit, Portable Executable (PE) malware has been
con...
Zero-shot domain adaptation (ZDA) methods aim to transfer knowledge abou...
Query expansion with pseudo-relevance feedback (PRF) is a powerful appro...
The classification of electrocardiogram (ECG) signals, which takes much ...
Fencing is a sport that relies heavily on the use of tactics. However, m...
With the increasing popularity of mobile devices and the wide adoption o...
Service composition aims at achieving a business goal by composing exist...
Estimating 3D poses of multiple humans in real-time is a classic but sti...
Recently, it has been shown that carefully designed reinforcement learni...
A generalized unifying approach for L_p-norm joint inversion of gravity
...
Deep neural networks (DNN) are increasingly applied in safety-critical
s...
Pre-training is transformative in supervised learning: a large network
t...
The large-scale focusing inversion of gravity and magnetic potential fie...
Generative adversarial networks are a novel method for statistical infer...
With the rapid development of software and distributed computing,
Cyber-...
Autonomous underwater vehicles (AUVs) have been deployed for underwater
...
Generative adversarial networks (GAN) approximate a target data distribu...
The target of X-armed bandit problem is to find the global
maximum of an...