Multitask learning (MTL) leverages task-relatedness to enhance performan...
Multi-frame methods improve monocular depth estimation over single-frame...
In this paper, we introduce PCR-CG: a novel 3D point cloud registration
...
Although fast adversarial training provides an efficient approach for
bu...
This paper studies kernel PCA in a decentralized setting, where data are...
The vast coastline provides Canada with a flourishing seafood industry
i...
As data become increasingly vital for deep learning, a company would be ...
To fully uncover the great potential of deep neural networks (DNNs), var...
Deep Neural Networks (DNNs) are susceptible to elaborately designed
pert...
The random Fourier features (RFFs) method is a powerful and popular tech...
The wide application of deep neural networks (DNNs) demands an increasin...
Our facial skin presents subtle color change known as remote
Photoplethy...
As a powerful modelling method, PieceWise Linear Neural Networks (PWLNNs...
Stochastic gradient descent (SGD) and its variants are commonly consider...
Unlearnable examples (ULEs) aim to protect data from unauthorized usage ...
The score-based query attacks (SQAs) pose practical threats to deep neur...
Asymmetric kernels naturally exist in real life, e.g., for conditional
p...
Single-step adversarial training (AT) has received wide attention as it
...
The existing tensor networks adopt conventional matrix product for
conne...
Recent studies reveal that Convolutional Neural Networks (CNNs) are typi...
In this paper, we find the existence of critical features hidden in Deep...
Deep Neural Networks (DNNs) are acknowledged as vulnerable to adversaria...
Hypergraphs are a generalized data structure of graphs to model higher-o...
Random Fourier Features (RFF) demonstrate wellappreciated performance in...
The Neural Tangent Kernel (NTK) has recently attracted intense study, as...
Although there are massive parameters in deep neural networks, the train...
Deep Neural Networks (DNNs) could be easily fooled by Adversarial Exampl...
Training convolutional neural networks (CNNs) for segmentation of pulmon...
In this paper, we develop a quadrature framework for large-scale kernel
...
It is now widely known that by adversarial attacks, clean images with
in...
Nowadays, more and more datasets are stored in a distributed way for the...
Random Fourier features enable researchers to build feature map to learn...
This paper focuses on high-transferable adversarial attacks on detection...
In this paper, we study the asymptotical properties of least squares
reg...
We generalize random Fourier features, that usually require kernel funct...
Principal Component Analysis (PCA) is a fundamental technology in machin...
Random features is one of the most sought-after research topics in
stati...
Sparse canonical correlation analysis (CCA) is a useful statistical tool...
With the popularity of stereo cameras in computer assisted surgery
techn...
Edge-preserving image smoothing is a fundamental procedure for many comp...
Deep learning, as widely known, is vulnerable to adversarial samples. Th...
Generative models are popular tools with a wide range of applications.
N...
As the prevalence of deep learning in computer vision, adversarial sampl...
Adversarial attacks on deep neural networks (DNNs) have been found for
s...
Efficient model inference is an important and practical issue in the
dep...
It is now well known that deep neural networks (DNNs) are vulnerable to
...
In this paper, we propose a fast surrogate leverage weighted sampling
st...
Kernel learning methods are among the most effective learning methods an...
Robustness of deep learning methods for limited angle tomography is
chal...
Image smoothing is a fundamental procedure in applications of both compu...