In secure summation, K users, each holds an input, wish to compute the s...
Understanding the continuous states of objects is essential for task lea...
We introduce OPEND, a benchmark for learning how to use a hand to open
c...
A collection of K random variables are called (K,n)-MDS if any n of the
...
Temporal modeling is crucial for various video learning tasks. Most rece...
With the recent progress of simulations by 3D modeling software and game...
The secure summation problem is considered, where K users, each holds an...
One-shot object detection aims at detecting novel objects according to m...
Dramatic progress has been made in animating individual characters. Howe...
Recent years have witnessed an emerging paradigm shift toward embodied
a...
Building a socially intelligent agent involves many challenges, one of w...
Learning-based methods for training embodied agents typically require a ...
Current visual question answering (VQA) tasks mainly consider answering
...
Building a socially intelligent agent involves many challenges, one of w...
In the robust secure aggregation problem, a server wishes to learn and o...
We generalize the existing principle of the maximum Shannon entropy in
r...
In this paper, we propose a lightweight music-generating model based on
...
Inducing a meaningful structural representation from one or a set of
dia...
Human collaborators can effectively communicate with their partners to f...
We consider the secure computation problem in a minimal model, where Ali...