
-
Automatic Summarization of Open-Domain Podcast Episodes
We present implementation details of our abstractive summarizers that ac...
read it
-
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills
The home voice assistants such as Amazon Alexa have become increasingly ...
read it
-
Efficient Matrix Factorization on Heterogeneous CPU-GPU Systems
Matrix Factorization (MF) has been widely applied in machine learning an...
read it
-
Towards Faithful Neural Table-to-Text Generation with Content-Matching Constraints
Text generation from a knowledge base aims to translate knowledge triple...
read it
-
VulnDS: Top-k Vulnerable SME Detection System in Networked-Loans
Groups of small and medium enterprises (SMEs) can back each other to obt...
read it
-
Lipschitz Learning for Signal Recovery
We consider the recovery of signals from their observations, which are s...
read it
-
Location Anomalies Detection for Connected and Autonomous Vehicles
Future Connected and Automated Vehicles (CAV), and more generally ITS, w...
read it
-
Critical Edge Identification: A K-Truss Based Model
In a social network, the strength of relationships between users can sig...
read it
-
STA: Spatial-Temporal Attention for Large-Scale Video-based Person Re-Identification
In this work, we propose a novel Spatial-Temporal Attention (STA) approa...
read it
-
Request-and-Reverify: Hierarchical Hypothesis Testing for Concept Drift Detection with Expensive Labels
One important assumption underlying common classification models is the ...
read it
-
Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems
Android-based devices like smartphones have become ideal mobile cyber-ph...
read it
-
EdgeFlow: Open-Source Multi-layer Data Flow Processing in Edge Computing for 5G and Beyond
Edge computing has evolved to be a promising avenue to enhance the syste...
read it