
-
ZJUKLAB at SemEval-2021 Task 4: Negative Augmentation with Language Model for Reading Comprehension of Abstract Meaning
This paper presents our systems for the three Subtasks of SemEval Task4:...
read it
-
DeepPseudo: Deep Pseudo-code Generation via Transformer and Code Feature Extraction
Pseudo-code written by natural language is helpful for novice developers...
read it
-
Automated Query Reformulation for Efficient Search based on Query Logs From Stack Overflow
As a popular Q A site for programming, Stack Overflow is a treasure fo...
read it
-
Design and Analysis of Uplink and Downlink Communications for Federated Learning
Communication has been known to be one of the primary bottlenecks of fed...
read it
-
Cross-Domain Sentiment Classification with In-Domain Contrastive Learning
Contrastive learning (CL) has been successful as a powerful representati...
read it
-
Directed Graph Attention Neural Network Utilizing 3D Coordinates for Molecular Property Prediction
The prosperity of computer vision (CV) and natural language procession (...
read it
-
Third ArchEdge Workshop: Exploring the Design Space of Efficient Deep Neural Networks
This paper gives an overview of our ongoing work on the design space exp...
read it
-
Efficient Neural Network Implementation with Quadratic Neuron
Previous works proved that the combination of the linear neuron network ...
read it
-
Towards Latency-aware DNN Optimization with GPU Runtime Analysis and Tail Effect Elimination
Despite the superb performance of State-Of-The-Art (SOTA) DNNs, the incr...
read it
-
Cross-Domain Sentiment Classification With Contrastive Learning and Mutual Information Maximization
Contrastive learning (CL) has been successful as a powerful representati...
read it
-
Fourth-Order Nonlocal Tensor Decomposition Model for Spectral Computed Tomography
Spectral computed tomography (CT) can reconstruct spectral images from d...
read it
-
MLBF-Net: A Multi-Lead-Branch Fusion Network for Multi-Class Arrhythmia Classification Using 12-Lead ECG
Automatic arrhythmia detection using 12-lead electrocardiogram (ECG) sig...
read it
-
AntiDote: Attention-based Dynamic Optimization for Neural Network Runtime Efficiency
Convolutional Neural Networks (CNNs) achieved great cognitive performanc...
read it
-
LR-CNN: Local-aware Region CNN for Vehicle Detection in Aerial Imagery
State-of-the-art object detection approaches such as Fast/Faster R-CNN, ...
read it
-
Generative Feature Replay with Orthogonal Weight Modification for Continual Learning
The ability of intelligent agents to learn and remember multiple tasks s...
read it
-
Average Age of Changed Information in the Internet of Things
The freshness of status updates is imperative in mission-critical Intern...
read it
-
Joint Transmission and Computing Scheduling for Status Update with Mobile Edge Computing
Age of Information (AoI), defined as the time elapsed since the generati...
read it
-
RapidLayout: Fast Hard Block Placement of FPGA-optimized Systolic Arrays using Evolutionary Algorithms
Evolutionary algorithms can outperform conventional placement algorithms...
read it
-
Analysis on Computation-Intensive Status Update in Mobile Edge Computing
In status update scenarios, the freshness of information is measured in ...
read it
-
COKE: Communication-Censored Kernel Learning for Decentralized Non-parametric Learning
This paper studies the decentralized optimization and learning problem w...
read it
-
An Image Enhancing Pattern-based Sparsity for Real-time Inference on Mobile Devices
Weight pruning has been widely acknowledged as a straightforward and eff...
read it
-
SQLFlow: A Bridge between SQL and Machine Learning
Industrial AI systems are mostly end-to-end machine learning (ML) workfl...
read it
-
ELFISH: Resource-Aware Federated Learning on Heterogeneous Edge Devices
In this work, we propose ELFISH - a resource-aware federated learning fr...
read it
-
Unsupervised Domain Adaptation for Object Detection via Cross-Domain Semi-Supervised Learning
Current state-of-the-art object detectors can have significant performan...
read it
-
LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications
Recently, adversarial attacks can be applied to the physical world, caus...
read it
-
Task-Adaptive Incremental Learning for Intelligent Edge Devices
Convolutional Neural Networks (CNNs) are used for a wide range of image-...
read it
-
Tiny but Accurate: A Pruned, Quantized and Optimized Memristor Crossbar Framework for Ultra Efficient DNN Implementation
The state-of-art DNN structures involve intensive computation and high m...
read it
-
Multi-stage Deep Classifier Cascades for Open World Recognition
At present, object recognition studies are mostly conducted in a closed ...
read it
-
Revisiting Heterogeneous Defect Prediction: How Far Are We?
Until now, researchers have proposed several novel heterogeneous defect ...
read it
-
ADMM for Efficient Deep Learning with Global Convergence
Alternating Direction Method of Multipliers (ADMM) has been used success...
read it
-
DoPa: A Fast and Comprehensive CNN Defense Methodology against Physical Adversarial Attacks
Recently, Convolutional Neural Networks (CNNs) demonstrate a considerabl...
read it
-
Interpreting and Evaluating Neural Network Robustness
Recently, adversarial deception becomes one of the most considerable thr...
read it
-
FTGAN: A Fully-trained Generative Adversarial Networks for Text to Face Generation
As a sub-domain of text-to-image synthesis, text-to-face generation has ...
read it
-
DeepCount: Crowd Counting with WiFi via Deep Learning
Recently, the research of wireless sensing has achieved more intelligent...
read it
-
Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement
Freshness of data is an important performance metric for real-time appli...
read it
-
Age-of-Information for Computation-Intensive Messages in Mobile Edge Computing
Age-of-information (AoI) is a novel metric that measures the freshness o...
read it
-
Background Subtraction with Real-time Semantic Segmentation
Accurate and fast foreground object extraction is very important for obj...
read it
-
Demystifying Neural Network Filter Pruning
Based on filter magnitude ranking (e.g. L1 norm), conventional filter pr...
read it
-
Distilling Critical Paths in Convolutional Neural Networks
Neural network compression and acceleration are widely demanded currentl...
read it
-
Learning color space adaptation from synthetic to real images of cirrus clouds
Training on synthetic data is becoming popular in vision due to the conv...
read it
-
Progressive Weight Pruning of Deep Neural Networks using ADMM
Deep neural networks (DNNs) although achieving human-level performance i...
read it
-
Interpretable Convolutional Filter Pruning
The sophisticated structure of Convolutional Neural Network (CNN) allows...
read it
-
Interpreting Adversarial Robustness: A View from Decision Surface in Input Space
One popular hypothesis of neural network generalization is that the flat...
read it
-
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition
Nowadays, machine learning based Automatic Speech Recognition (ASR) tech...
read it
-
Energy-Age Tradeoff in Status Update Communication Systems with Retransmission
Age-of-information is a novel performance metric in communication system...
read it
-
Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients
In recent years, neural networks have demonstrated outstanding effective...
read it
-
Towards Global Optimization in Display Advertising by Integrating Multimedia Metrics with Real-Time Bidding
Real-time bidding (RTB) has become a new norm in display advertising whe...
read it
-
How convolutional neural network see the world - A survey of convolutional neural network visualization methods
Nowadays, the Convolutional Neural Networks (CNNs) have achieved impress...
read it
-
ASP:A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction
With the excellent accuracy and feasibility, the Neural Networks have be...
read it
-
Security in Mobile Edge Caching with Reinforcement Learning
Mobile edge computing usually uses cache to support multimedia contents ...
read it