Prompt engineering is a technique that involves augmenting a large
pre-t...
Knowledge distillation aims to learn a lightweight student network from ...
Exploiting the computational heterogeneity of mobile devices and edge no...
This paper investigates the problem of scene graph generation in videos ...
Various adaptation methods, such as LoRA, prompts, and adapters, have be...
Coherence is a widely used measure to assess linear relationships betwee...
The high-resolution differential equation framework has been proven to b...
Smart contracts are crucial elements of decentralized technologies, but ...
A covariance matrix with a special pattern (e.g., sparsity or block
stru...
Event cameras provide high temporal precision, low data rates, and high
...
Although substance use is known to be associated with cognitive decline
...
Many observational studies and clinical trials collect various secondary...
A full parametric and linear specification may be insufficient to captur...
Estimating a covariance matrix is central to high-dimensional data analy...
Machine-to-Machine (M2M) communication is crucial in developing Internet...
Nesterov's accelerated gradient descent (NAG) is one of the milestones i...
Opponent modeling has benefited a controlled agent's decision-making by
...
Backdoor attacks on reinforcement learning implant a backdoor in a victi...
Recently, vision architectures based exclusively on multi-layer perceptr...
Cryptocurrencies, such as Bitcoin and Ethereum, are becoming increasingl...
We present intrinsic neural radiance fields, dubbed IntrinsicNeRF, that
...
In the history of first-order algorithms, Nesterov's accelerated gradien...
Optical Coherence Tomography(OCT) is a non-invasive technique capturing
...
In this letter, we consider transceivers with spatially-constrained ante...
The recent success of audio-visual representation learning can be largel...
We propose a novel style transfer method to quickly create a new visual
...
As computer vision is prevalently used for mail-in ballot processing and...
Video relation detection forms a new and challenging problem in computer...
Inspired by the great success achieved by CNN in image recognition,
view...
Deep-learning based Super-Resolution (SR) methods have exhibited promisi...
The deep learning approach to detecting malicious software (malware) is
...
This paper strives to classify and detect the relationship between objec...
Anti-piracy is fundamentally a procedure that relies on collecting data ...
Inspired by biological evolution, we explain the rationality of Vision
T...
Smart contract is one of the core features of Ethereum and has inspired ...
Generalized zero-shot learning (GZSL) aims to recognize objects from bot...
Street scene change detection continues to capture researchers' interest...
Recent works have demonstrated that deep learning (DL) based compressed
...
Efficient audio synthesis is an inherently difficult machine learning ta...
In this paper, we describe the formal verification of Smart Contracts of...
In the past decades, intensive efforts have been put to design various l...
This paper first answers the question "why do the two most powerful
tech...
The Internet of Thing (IoT) has been a hot topic in both research commun...
Understanding how species are distributed across landscapes over time is...