
-
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols
Many proximity-based tracing (PCT) protocols have been proposed and depl...
read it
-
Learning to Check Contract Inconsistencies
Contract consistency is important in ensuring the legal validity of the ...
read it
-
Query-free Black-box Adversarial Attacks on Graphs
Many graph-based machine learning models are known to be vulnerable to a...
read it
-
Denoising-based Turbo Message Passing for Compressed Video Background Subtraction
In this paper, we consider the compressed video background subtraction p...
read it
-
Improving Knowledge Tracing via Pre-training Question Embeddings
Knowledge tracing (KT) defines the task of predicting whether students c...
read it
-
Unsupervised Adversarially-Robust Representation Learning on Graphs
Recent works have demonstrated that deep learning on graphs is vulnerabl...
read it
-
Interpretable Signed Link Prediction with Signed Infomax Hyperbolic Graph
Signed link prediction in social networks aims to reveal the underlying ...
read it
-
Symmetrical Z-Complementary Code Sets (SZCCSs) for Optimal Training in Generalized Spatial Modulation
This paper introduces a novel class of code sets, called "symmetrical Z-...
read it
-
Universal Weighting Metric Learning for Cross-Modal Matching
Cross-modal matching has been a highlighted research topic in both visio...
read it
-
AAG: Self-Supervised Representation Learning by Auxiliary Augmentation with GNT-Xent Loss
Self-supervised representation learning is an emerging research topic fo...
read it
-
GIKT: A Graph-based Interaction Model for Knowledge Tracing
With the rapid development in online education, knowledge tracing (KT) h...
read it
-
Learning Adaptive Embedding Considering Incremental Class
Class-Incremental Learning (CIL) aims to train a reliable model with the...
read it
-
S2OSC: A Holistic Semi-Supervised Approach for Open Set Classification
Open set classification (OSC) tackles the problem of determining whether...
read it
-
Hierarchical Bi-Directional Feature Perception Network for Person Re-Identification
Previous Person Re-Identification (Re-ID) models aim to focus on the mos...
read it
-
Boundary Content Graph Neural Network for Temporal Action Proposal Generation
Temporal action proposal generation plays an important role in video act...
read it
-
Service Chain Composition with Failures in NFV Systems: A Game-Theoretic Perspective
For state-of-the-art network function virtualization (NFV) systems, it r...
read it
-
PORA: Predictive Offloading and Resource Allocation in Dynamic Fog Computing Systems
In multi-tiered fog computing systems, to accelerate the processing of c...
read it
-
Green Offloading in Fog-Assisted IoT Systems: An Online Perspective Integrating Learning and Control
In fog-assisted IoT systems, it is a common practice to offload tasks fr...
read it
-
Data-Driven Bandit Learning for Proactive Cache Placement in Fog-Assisted IoT Systems
In Fog-assisted IoT systems, it is a common practice to cache popular co...
read it
-
Online VNF Chaining and Predictive Scheduling: Optimality and Trade-offs
For NFV systems, the key design space includes the function chaining for...
read it
-
Joint Switch-Controller Association and Control Devolution for SDN Systems: An Integration of Online Control and Online Learning
In software-defined networking (SDN) systems, it is a common practice to...
read it
-
Online User-AP Association with Predictive Scheduling in Wireless Caching Networks
For wireless caching networks, the scheme design for content delivery is...
read it
-
POTUS: Predictive Online Tuple Scheduling for Data Stream Processing Systems
Most online service providers deploy their own data stream processing sy...
read it
-
MIPS: Instance Placement for Stream Processing Systems based on Monte Carlo Tree Search
Stream processing engines enable modern systems to conduct large-scale a...
read it
-
Multi-level Training and Bayesian Optimization for Economical Hyperparameter Optimization
Hyperparameters play a critical role in the performances of many machine...
read it
-
Forecasting Australian subnational age-specific mortality rates
When modeling sub-national mortality rates, it is important to incorpora...
read it
-
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata
In this paper, we propose a privacy-preserving medical treatment system ...
read it
-
A Generalized Dimming Control Scheme for Visible Light Communications
A novel dimming control scheme, termed as generalized dimming control (G...
read it
-
Quasi-Orthogonal Z-Complementary Pairs and Their Applications in Fully Polarimetric Radar Systems
One objective of this paper is to propose a novel class of sequence pair...
read it
-
Quasi-Orthogonal Z-Complementary Pairs and Its Applications in Fully Polarimetric Radar Systems
In this paper, sequences with low local ambiguity functions are presente...
read it
-
A Flexible Connector for Soft Modular Robots Based on Micropatterned Intersurface Jamming
Soft modular robots enable more flexibility and safer interaction with t...
read it
-
Feedback Recurrent Autoencoder for Video Compression
Recent advances in deep generative modeling have enabled efficient model...
read it
-
An Eigenspace Divide-and-Conquer Approach for Large-Scale Optimization
Divide-and-conquer-based (DC-based) evolutionary algorithms (EAs) have a...
read it
-
Guided Variational Autoencoder for Disentanglement Learning
We propose an algorithm, guided variational autoencoder (Guided-VAE), th...
read it
-
High-Order Information Matters: Learning Relation and Topology for Occluded Person Re-Identification
Occluded person re-identification (ReID) aims to match occluded person i...
read it
-
New Complementary Sets with Low PAPR Property under Spectral Null Constraints
Complementary set sequences (CSSs) are useful for dealing with the high ...
read it
-
Probability Weighted Compact Feature for Domain Adaptive Retrieval
Domain adaptive image retrieval includes single-domain retrieval and cro...
read it
-
A Big Data Enabled Channel Model for 5G Wireless Communication Systems
The standardization process of the fifth generation (5G) wireless commun...
read it
-
Energy-Efficient Buffer-Aided Relaying Systems with Opportunistic Spectrum Access
In this paper, an energy-efficient cross-layer design framework is propo...
read it
-
New Constructions of Cross Z-Complementary Pairs
Spatial modulation (SM) is a new paradigm of multiple-input multiple-out...
read it
-
Distributed Bayesian Matrix Decomposition for Big Data Mining and Clustering
Matrix decomposition is one of the fundamental tools to discover knowled...
read it
-
An Eulerian-Lagrangian discontinuous Galerkin method for transport problems and its application to nonlinear dynamics
We propose a new Eulerian-Lagrangian (EL) discontinuous Galerkin (DG) me...
read it
-
Understanding Electricity-Theft Behavior via Multi-Source Data
Electricity theft, the behavior that involves users conducting illegal o...
read it
-
SQLFlow: A Bridge between SQL and Machine Learning
Industrial AI systems are mostly end-to-end machine learning (ML) workfl...
read it
-
In Defense of the Triplet Loss Again: Learning Robust Person Re-Identification with Fast Approximated Triplet Loss and Label Distillation
The comparative losses (typically, triplet loss) are appealing choices f...
read it
-
Generalized Constructions of Complementary Sets of Sequences of Lengths Non-Power-of-Two
The construction of complementary sets (CSs) of sequences with different...
read it
-
LaFIn: Generative Landmark Guided Face Inpainting
It is challenging to inpaint face images in the wild, due to the large v...
read it
-
Calibrated Domain-Invariant Learning for Highly Generalizable Large Scale Re-Identification
Many real-world applications, such as city-scale traffic monitoring and ...
read it
-
Cross-modal supervised learning for better acoustic representations
Obtaining large-scale human-labeled datasets to train acoustic represent...
read it
-
Learning from the Past: Continual Meta-Learning via Bayesian Graph Modeling
Meta-learning for few-shot learning allows a machine to leverage previou...
read it