
A survey of deep neural network watermarking techniques
Protecting the Intellectual Property Rights (IPR) associated to Deep Neu...
read it

Transparent Checkpointing for OpenGL Applications on GPUs
This work presents transparent checkpointing of OpenGL applications, ref...
read it

NTopo: Meshfree Topology Optimization using Implicit Neural Representations
Recent advances in implicit neural representations show great promise wh...
read it

IRO: Integrity and Reliability Enhanced Ring ORAM
Memory security and reliability are two of the major design concerns in ...
read it

SpreadTransform Dither Modulation Watermarking of Deep Neural Network
DNN watermarking is receiving an increasing attention as a suitable mean...
read it

Deep Physicsaware Inference of Cloth Deformation for Monocular Human Performance Capture
Recent monocular human performance capture approaches have shown compell...
read it

Restrained Generative Adversarial Network against Overfitting in Numeric Data Augmentation
In recent studies, Generative Adversarial Network (GAN) is one of the po...
read it

A lowdissipation shockcapturing framework with flexible nonlinear dissipation control
In this work, a framework to construct arbitrarily highorder lowdissip...
read it

Randomized tests for highdimensional regression: A more efficient and powerful solution
We investigate the problem of testing the global null in the highdimens...
read it

Kaya: A Testing Framework for Blockchainbased Decentralized Applications
In recent years, many decentralized applications based on blockchain (DA...
read it

A Hybrid LagrangianEulerian Method for Topology Optimization
We propose LETO, a new hybrid LagrangianEulerian method for topology op...
read it

Study of Constrained Network Structures for WGANs on Numeric Data Generation
Some recent studies have suggested using GANs for numeric data generatio...
read it

Applying MetaAnalytic Predictive Priors with the R Bayesian evidence synthesis tools
Use of historical data in clinical trial design and analysis has shown v...
read it

Deep LearningBased Video Coding: A Review and A Case Study
The past decade has witnessed great success of deep learning technology ...
read it

BoundaryPreserved Deep Denoising of the Stochastic Resonance Enhanced Multiphoton Images
As the rapid growth of highspeed and deeptissue imaging in biomedical ...
read it

Substation OneLine Diagram Automatic Generation and Visualization
In Energy Management System (EMS) applications and many other offline p...
read it

Coinductive Uniform Proofs
Coinduction occurs in two guises in Horn clause logic: in proofs of circ...
read it

Coinduction in Uniform: Foundations for Corecursive Proof Search with Horn Clauses
We establish prooftheoretic, constructive and coalgebraic foundations f...
read it

A latent topic model for mining heterogenous nonrandomly missing electronic health records data
Electronic health records (EHR) are rich heterogeneous collection of pat...
read it

Towards Coinductive Theory Exploration in Horn Clause Logic: Position Paper
Coinduction occurs in two guises in Horn clause logic: in proofs of self...
read it

Understanding and Analyzing Java Reflection
Java reflection has been increasingly used in a wide range of software. ...
read it

Convolutional Neural NetworkBased Block Upsampling for Intra Frame Coding
Inspired by the recent advances of image superresolution using convolut...
read it

Unsupervised Learning in Genome Informatics
With different genomes available, unsupervised learning algorithms are e...
read it
Yue Li
is this you? claim profile