node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
33,578
3
Title: One Protocol to Rule Them All? On Securing Interoperable Messaging Abstract: European lawmakers have ruled that users on different platforms should be able to exchange messages with each other. Yet messaging interoperability opens up a Pandora's box of security and privacy challenges. While championed not just a...
[ 20293 ]
Train
33,579
36
Title: A game-theoretic approach to indistinguishability of winning objectives as user privacy Abstract: Game theory on graphs is a basic tool in computer science. In this paper, we propose a new game-theoretic framework for studying the privacy protection of a user who interactively uses a software service. Our framew...
[]
Train
33,580
16
Title: Multistage Spatial Context Models for Learned Image Compression Abstract: Recent state-of-the-art Learned Image Compression methods feature spatial context models, achieving great rate-distortion improvements over hyperprior methods. However, the autoregressive context model requires serial decoding, limiting ru...
[ 6802 ]
Train
33,581
6
Title: A VR-based Priming Framework and Technology Implementation to Improve Learning Mindsets and Academic Performance in Post-Secondary Students Abstract: Recent research indicates that most post-secondary students in North America"felt overwhelming anxiety"in the past few years, negatively affecting well-being and a...
[]
Train
33,582
16
Title: Semantic segmentation of sparse irregular point clouds for leaf/wood discrimination Abstract: LiDAR (Light Detection and Ranging) has become an essential part of the remote sensing toolbox used for biosphere monitoring. In particular, LiDAR provides the opportunity to map forest leaf area with unprecedented accu...
[]
Test
33,583
27
Title: Sensing and Navigation of Aerial Robot for Measuring Tree Location and Size in Forest Environment Abstract: This paper shows the achievement of a sensing and navigation system of aerial robot for measuring location and size of trees in a forest environment autonomously. Although forestry is an important industry...
[]
Validation
33,584
23
Title: On Codex Prompt Engineering for OCL Generation: An Empirical Study Abstract: The Object Constraint Language (OCL) is a declarative language that adds constraints and object query expressions to Meta-Object Facility (MOF) models. OCL can provide precision and conciseness to UML models. Nevertheless, the unfamilia...
[ 42523 ]
Train
33,585
28
Title: Two types of narrow-sense negacyclic BCH codes Abstract: Negacyclic BCH codes are an important subclass of negacyclic codes and are the best linear codes in most cases, but their parameters are hard to determine. In this paper, we mainly study two types of negacyclic BCH codes of length $n=\frac{q^{m}-1}{4},\fra...
[ 33846 ]
Train
33,586
23
Title: WUDI: A Human Involved Self-Adaptive Framework to Prevent Childhood Obesity in Internet of Things Environment Abstract: The Internet of Things (IoT) connects people, devices, and information resources, in various domains to improve efficiency. The healthcare domain has been transformed by the integration of the ...
[]
Train
33,587
24
Title: Graph Structure from Point Clouds: Geometric Attention is All You Need Abstract: The use of graph neural networks has produced significant advances in point cloud problems, such as those found in high energy physics. The question of how to produce a graph structure in these problems is usually treated as a matte...
[]
Train
33,588
4
Title: Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Abstract: Network Intrusion Detection Systems (NIDS) have been extensively investigated by monitoring real network traffic and analyzing suspicious activities. However, there are limitations in detecting specific...
[]
Train
33,589
16
Title: Color Mismatches in Stereoscopic Video: Real-World Dataset and Deep Correction Method Abstract: We propose a real-world dataset of stereoscopic videos for color-mismatch correction. It includes real-world distortions achieved using a beam splitter. Our dataset is larger than any other for this task. We compared ...
[]
Train
33,590
16
Title: Synthesis of Batik Motifs using a Diffusion - Generative Adversarial Network Abstract: Batik, a unique blend of art and craftsmanship, is a distinct artistic and technological creation for Indonesian society. Research on batik motifs is primarily focused on classification. However, further studies may extend to ...
[ 13746 ]
Train
33,591
34
Title: Communication-Efficient Distributed Graph Clustering and Sparsification under Duplication Models Abstract: In this paper, we consider the problem of clustering graph nodes and sparsifying graph edges over distributed graphs, when graph edges with possibly edge duplicates are observed at physically remote sites. ...
[]
Train
33,592
16
Title: Privacy-preserving Adversarial Facial Features Abstract: Face recognition service providers protect face privacy by extracting compact and discriminative facial features (representations) from images, and storing the facial features for real-time recognition. However, such features can still be exploited to reco...
[]
Test
33,593
24
Title: Competing for Shareable Arms in Multi-Player Multi-Armed Bandits Abstract: Competitions for shareable and limited resources have long been studied with strategic agents. In reality, agents often have to learn and maximize the rewards of the resources at the same time. To design an individualized competing policy...
[ 5600, 37512 ]
Test
33,594
24
Title: SpeckleNN: a unified embedding for real-time speckle pattern classification in X-ray single-particle imaging with limited labeled examples Abstract: This paper presents a neural network model called SpeckleNN for real-time classification of X-ray single-particle imaging (SPI) speckle patterns, ideal for use in h...
[]
Train
33,595
4
Title: CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense Abstract: Critical servers can be secured against distributed denial of service (DDoS) attacks using proof of work (PoW) systems assisted by an Artificial Intelligence (AI) that learns contextual network request patterns. In this work, we introduc...
[]
Test
33,596
2
Title: Languages with Decidable Learning: A Meta-theorem Abstract: We study expression learning problems with syntactic restrictions and introduce the class of finite-aspect checkable languages to characterize symbolic languages that admit decidable learning. The semantics of such languages can be defined using a bound...
[]
Train
33,597
8
Title: Joint Service Caching and Computing Resource Allocation for Edge Computing-Enabled Networks Abstract: In this paper, we consider the service caching and the computing resource allocation in edge computing (EC) enabled networks. We introduce a random service caching design considering multiple types of latency se...
[]
Train
33,598
24
Title: The geometry of hidden representations of large transformer models Abstract: Large transformers are powerful architectures for self-supervised analysis of data of various nature, ranging from protein sequences to text to images. In these models, the data representation in the hidden layers live in the same space...
[ 7587, 43974 ]
Validation
33,599
16
Title: Rethinking PRL: A Multiscale Progressively Residual Learning Network for Inverse Halftoning Abstract: Image inverse halftoning is a classic image restoration task, aiming to recover continuous-tone images from halftone images with only bilevel pixels. Because the halftone images lose much of the original image c...
[]
Train
33,600
27
Title: Multimodal Robot Programming by Demonstration: A Preliminary Exploration Abstract: Recent years have seen a growth in the number of industrial robots working closely with end-users such as factory workers. This growing use of collaborative robots has been enabled in part due to the availability of end-user robot...
[]
Train
33,601
8
Title: Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset Abstract: In the era of rapid IoT device proliferation, recognizing, diagnosing, and securing these devices are crucial tasks. The IoTDevID method (IEEE Internet of Things 2022) proposes a machine learning approac...
[]
Train
33,602
30
Title: Enhancing Keyphrase Generation by BART Finetuning with Splitting and Shuffling Abstract: Keyphrase generation is a task of identifying a set of phrases that best repre-sent the main topics or themes of a given text. Keyphrases are dividend int pre-sent and absent keyphrases. Recent approaches utilizing sequence-...
[ 17595 ]
Train
33,603
30
Title: ClusterLLM: Large Language Models as a Guide for Text Clustering Abstract: We introduce ClusterLLM, a novel text clustering framework that leverages feedback from an instruction-tuned large language model, such as ChatGPT. Compared with traditional unsupervised methods that builds upon"small"embedders, ClusterLL...
[ 39392, 39642, 28923, 33172 ]
Train
33,604
38
Title: Discovering the Traces of Disinformation on Instagram in the Internet Archive Abstract: Disinformation, which is fabricated, misleading content spread with the intent to deceive others, is accumulating substantial engagements and reaching a vast audience on Instagram. However, the temporary nature of the platfor...
[ 26968 ]
Train
33,605
4
Title: Fuzzy Feature Selection with Key-based Cryptographic Transformations Abstract: In the field of cryptography, the selection of relevant features plays a crucial role in enhancing the security and efficiency of cryptographic algorithms. This paper presents a novel approach of applying fuzzy feature selection to ke...
[ 24681, 35869, 38193 ]
Validation
33,606
30
Title: The potential of LLMs for coding with low-resource and domain-specific programming languages Abstract: This paper presents a study on the feasibility of using large language models (LLM) for coding with low-resource and domain-specific programming languages that typically lack the amount of data required for eff...
[ 39466, 13510, 15047 ]
Test
33,607
4
Title: Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy Abstract: IoT Servers that receive and process packets from IoT devices should meet the QoS needs of incoming packets, and support Attack Detection software that analyzes the incoming traffic to identify and discard pac...
[ 37203 ]
Train
33,608
30
Title: Grimm in Wonderland: Prompt Engineering with Midjourney to Illustrate Fairytales Abstract: The quality of text-to-image generation is continuously improving, yet the boundaries of its applicability are still unclear. In particular, refinement of the text input with the objective of achieving better results - com...
[ 42169, 32108 ]
Train
33,609
34
Title: Memory-Query Tradeoffs for Randomized Convex Optimization Abstract: We show that any randomized first-order algorithm which minimizes a $d$-dimensional, $1$-Lipschitz convex function over the unit ball must either use $\Omega(d^{2-\delta})$ bits of memory or make $\Omega(d^{1+\delta/6-o(1)})$ queries, for any co...
[ 6976, 19328, 32670 ]
Train
33,610
16
Title: Guiding Image Captioning Models Toward More Specific Captions Abstract: Image captioning is conventionally formulated as the task of generating captions for images that match the distribution of reference image-caption pairs. However, reference captions in standard captioning datasets are short and may not uniqu...
[ 29087, 2619, 30388, 26423 ]
Train
33,611
2
Title: A Logical Way to Negotiate Services Abstract: Service providers commonly provide only a fixed catalog of services to their clients. Both clients and service providers can benefit from service negotiation, in which a client makes a query for a specific service, and the provider counters with an offer. The query c...
[]
Validation
33,612
24
Title: Heterogeneous Decentralized Machine Unlearning with Seed Model Distillation Abstract: As some recent information security legislation endowed users with unconditional rights to be forgotten by any trained machine learning model, personalized IoT service providers have to put unlearning functionality into their c...
[ 39054 ]
Validation
33,613
22
Title: Deep R Programming Abstract: Deep R Programming is a comprehensive and in-depth introductory course on one of the most popular languages for data science. It equips ambitious students, professionals, and researchers with the knowledge and skills to become independent users of this potent environment so that they...
[]
Train
33,614
24
Title: Uncertainty-aware Grounded Action Transformation towards Sim-to-Real Transfer for Traffic Signal Control Abstract: Traffic signal control (TSC) is a complex and important task that affects the daily lives of millions of people. Reinforcement Learning (RL) has shown promising results in optimizing traffic signal ...
[ 3939 ]
Train
33,615
3
Title: Artificial intelligence adoption in the physical sciences, natural sciences, life sciences, social sciences and the arts and humanities: A bibliometric analysis of research publications from 1960-2021 Abstract: nan
[]
Validation
33,616
26
Title: Fight Fire with Fire: Hacktivists' Take on Social Media Misinformation Abstract: In this study, we interviewed 22 prominent hacktivists to learn their take on the increased proliferation of misinformation on social media. We found that none of them welcomes the nefarious appropriation of trolling and memes for t...
[ 29758 ]
Train
33,617
16
Title: Domain Adaptable Self-supervised Representation Learning on Remote Sensing Satellite Imagery Abstract: This work presents a novel domain adaption paradigm for studying contrastive self-supervised representation learning and knowledge transfer using remote sensing satellite data. Major state-of-the-art remote sen...
[]
Validation
33,618
24
Title: Generating Dispatching Rules for the Interrupting Swap-Allowed Blocking Job Shop Problem Using Graph Neural Network and Reinforcement Learning Abstract: The interrupting swap-allowed blocking job shop problem (ISBJSSP) is a complex scheduling problem that is able to model many manufacturing planning and logistic...
[]
Train
33,619
16
Title: Instance Segmentation Based Graph Extraction for Handwritten Circuit Diagram Images Abstract: Handwritten circuit diagrams from educational scenarios or historic sources usually exist on analogue media. For deriving their functional principles or flaws automatically, they need to be digitized, extracting their e...
[]
Train
33,620
4
Title: Cryptographic Primitives based on Compact Knapsack Problem Abstract: In the present paper, we extend previous results of an id scheme based on compact knapsack problem defined by one equation. We present a sound three-move id scheme based on compact knapsack problem defined by an integer matrix. We study this pr...
[]
Train
33,621
16
Title: MovieFactory: Automatic Movie Creation from Text using Large Generative Models for Language and Images Abstract: In this paper, we present MovieFactory, a powerful framework to generate cinematic-picture (3072$\times$1280), film-style (multi-scene), and multi-modality (sounding) movies on the demand of natural l...
[ 25216, 36265, 23563, 7597, 27184, 17526, 34074, 33758 ]
Train
33,622
30
Title: Curriculum Script Distillation for Multilingual Visual Question Answering Abstract: Pre-trained models with dual and cross encoders have shown remarkable success in pro-pelling the landscape of several tasks in vision and language in Visual Question Answering (VQA). However, since they are limited by the require...
[]
Test
33,623
24
Title: Interpreting learning in biological neural networks as zero-order optimization method Abstract: Recently, significant progress has been made regarding the statistical understanding of artificial neural networks (ANNs). ANNs are motivated by the functioning of the brain, but differ in several crucial aspects. In ...
[]
Train
33,624
24
Title: Spatial Attention Kinetic Networks with E(n)-Equivariance Abstract: Neural networks that are equivariant to rotations, translations, reflections, and permutations on n-dimensional geometric space have shown promise in physical modeling for tasks such as accurately but inexpensively modeling complex potential ene...
[ 10264, 30375 ]
Train
33,625
30
Title: Dialogue-Contextualized Re-ranking for Medical History-Taking Abstract: AI-driven medical history-taking is an important component in symptom checking, automated patient intake, triage, and other AI virtual care applications. As history-taking is extremely varied, machine learning models require a significant am...
[]
Test
33,626
30
Title: Retentive Network: A Successor to Transformer for Large Language Models Abstract: In this work, we propose Retentive Network (RetNet) as a foundation architecture for large language models, simultaneously achieving training parallelism, low-cost inference, and good performance. We theoretically derive the connec...
[ 26208, 43201, 30243, 23236, 43468, 42574, 8084, 18777, 27454, 45695 ]
Train
33,627
6
Title: Can a virtual conductor create its own interpretation of a music orchestra? Abstract: Having a computer do the work for you has become more and more common over time. But in the entertainment area, where a human is a creator, we want to avoid having too much influence on technology. On the other hand, inspiratio...
[]
Validation
33,628
23
Title: Towards an Understanding of Developers' Perceptions of Transparency in Software Development: A Preliminary Study Abstract: Software applications play an increasingly critical role in various aspects of our lives, from communication and entertainment to business and healthcare. As these applications become more p...
[]
Test
33,629
24
Title: Evaluating Representations with Readout Model Switching Abstract: Although much of the success of Deep Learning builds on learning good representations, a rigorous method to evaluate their quality is lacking. In this paper, we treat the evaluation of representations as a model selection problem and propose to us...
[]
Train
33,630
30
Title: Meta-Learning Siamese Network for Few-Shot Text Classification Abstract: Few-shot learning has been used to tackle the problem of label scarcity in text classification, of which meta-learning based methods have shown to be effective, such as the prototypical networks (PROTO). Despite the success of PROTO, there ...
[ 14854, 30239 ]
Test
33,631
8
Title: Practical Channel Splicing using OFDM Waveforms for Joint Communication and Sensing in the IoT Abstract: Channel splicing is a rather new and very promising concept. It allows to realize a wideband channel sounder by combining multiple narrow-band measurements. Among others, channel splicing is a sparse sensing ...
[]
Train
33,632
24
Title: s-ID: Causal Effect Identification in a Sub-Population Abstract: Causal inference in a sub-population involves identifying the causal effect of an intervention on a specific subgroup within a larger population. However, ignoring the subtleties introduced by sub-populations can either lead to erroneous inference ...
[ 8565 ]
Validation
33,633
27
Title: SACHA: Soft Actor-Critic With Heuristic-Based Attention for Partially Observable Multi-Agent Path Finding Abstract: Multi-Agent Path Finding (MAPF) is a crucial component for many large-scale robotic systems, where agents must plan their collision-free paths to their given goal positions. Recently, multi-agent r...
[]
Train
33,634
16
Title: Beyond Generic: Enhancing Image Captioning with Real-World Knowledge using Vision-Language Pre-Training Model Abstract: Current captioning approaches tend to generate correct but"generic"descriptions that lack real-world knowledge, e.g., named entities and contextual information. Considering that Vision-Language...
[]
Train
33,635
24
Title: Pruning vs Quantization: Which is Better? Abstract: Neural network pruning and quantization techniques are almost as old as neural networks themselves. However, to date only ad-hoc comparisons between the two have been published. In this paper, we set out to answer the question on which is better: neural network...
[ 12851 ]
Validation
33,636
24
Title: Tetra-AML: Automatic Machine Learning via Tensor Networks Abstract: Neural networks have revolutionized many aspects of society but in the era of huge models with billions of parameters, optimizing and deploying them for commercial applications can require significant computational and financial resources. To ad...
[ 19979 ]
Train
33,637
16
Title: Efficient 3D Object Reconstruction using Visual Transformers Abstract: Reconstructing a 3D object from a 2D image is a well-researched vision problem, with many kinds of deep learning techniques having been tried. Most commonly, 3D convolutional approaches are used, though previous work has shown state-of-the-ar...
[]
Test
33,638
16
Title: DiffFit: Unlocking Transferability of Large Diffusion Models via Simple Parameter-Efficient Fine-Tuning Abstract: Diffusion models have proven to be highly effective in generating high-quality images. However, adapting large pre-trained diffusion models to new domains remains an open challenge, which is critical...
[ 21152, 13700, 11815, 14730, 29389, 37070, 30991, 38066, 15541, 44537, 34074 ]
Train
33,639
24
Title: SMOClust: Synthetic Minority Oversampling based on Stream Clustering for Evolving Data Streams Abstract: Many real-world data stream applications not only suffer from concept drift but also class imbalance. Yet, very few existing studies investigated this joint challenge. Data difficulty factors, which have been...
[]
Train
33,640
16
Title: NAPA-VQ: Neighborhood Aware Prototype Augmentation with Vector Quantization for Continual Learning Abstract: Catastrophic forgetting; the loss of old knowledge upon acquiring new knowledge, is a pitfall faced by deep neural networks in real-world applications. Many prevailing solutions to this problem rely on st...
[]
Train
33,641
24
Title: Offline Meta Reinforcement Learning with In-Distribution Online Adaptation Abstract: Recent offline meta-reinforcement learning (meta-RL) methods typically utilize task-dependent behavior policies (e.g., training RL agents on each individual task) to collect a multi-task dataset. However, these methods always re...
[]
Train
33,642
28
Title: MDD-Enabled Two-Tier Terahertz Fronthaul in Indoor Industrial Cell-Free Massive MIMO Abstract: To make indoor industrial cell-free massive multiple-input multiple-output (CF-mMIMO) networks free from wired fronthaul, this paper studies a multicarrier-division duplex (MDD)-enabled two-tier terahertz (THz) frontha...
[]
Train
33,643
16
Title: ANMS: Asynchronous Non-Maximum Suppression in Event Stream Abstract: The non-maximum suppression (NMS) is widely used in frame-based tasks as an essential post-processing algorithm. However, event-based NMS either has high computational complexity or leads to frequent discontinuities. As a result, the performanc...
[]
Train
33,644
16
Title: Unifying Two-Stream Encoders with Transformers for Cross-Modal Retrieval Abstract: Most existing cross-modal retrieval methods employ two-stream encoders with different architectures for images and texts, \textit{e.g.}, CNN for images and RNN/Transformer for texts. Such discrepancy in architectures may induce di...
[]
Train
33,645
10
Title: Learning to Communicate using Contrastive Learning Abstract: Communication is a powerful tool for coordination in multi-agent RL. But inducing an effective, common language is a difficult challenge, particularly in the decentralized setting. In this work, we introduce an alternative perspective where communicati...
[]
Train
33,646
24
Title: From Tempered to Benign Overfitting in ReLU Neural Networks Abstract: Overparameterized neural networks (NNs) are observed to generalize well even when trained to perfectly fit noisy data. This phenomenon motivated a large body of work on"benign overfitting", where interpolating predictors achieve near-optimal p...
[ 11563, 37260, 16694 ]
Train
33,647
24
Title: Torch-Choice: A PyTorch Package for Large-Scale Choice Modelling with Python Abstract: The $\texttt{torch-choice}$ is an open-source library for flexible, fast choice modeling with Python and PyTorch. $\texttt{torch-choice}$ provides a $\texttt{ChoiceDataset}$ data structure to manage databases flexibly and memo...
[]
Train
33,648
27
Title: Pneumatic bellows actuated parallel platform control with adjustable stiffness using a hybrid feed-forward and variable gain I-controller Abstract: Redundant cascade manipulators actuated by pneumatic bellows actuators are passively compliant, rugged and dexterous which are qualities making them exceptionally we...
[]
Train
33,649
23
Title: A Reference Framework for Variability Management of Software Product Lines Abstract: Variability management (VM) in software product line engineering (SPLE) is introduced as an abstraction that enables the reuse and customization of assets. VM is a complex task involving the identification, representation, and i...
[]
Train
33,650
6
Title: Effect of emotions and personalisation on cancer website reuse intentions Abstract: : The effect of emotions and personalisation on continuance use intentions in online health services is underexplored. Accordingly, we propose a research model for examining the impact of emotion- and personalisation-based factor...
[]
Train
33,651
6
Title: Chart2Vec: A Universal Embedding of Context-Aware Visualizations Abstract: The advances in AI-enabled techniques have accelerated the creation and automation of visualizations in the past decade. However, presenting visualizations in a descriptive and generative format is still challenging. Moreover, current vis...
[]
Train
33,652
24
Title: Randomized Greedy Algorithms and Composable Coreset for k-Center Clustering with Outliers Abstract: In this paper, we study the problem of {\em $k$-center clustering with outliers}. The problem has many important applications in real world, but the presence of outliers can significantly increase the computationa...
[ 27564 ]
Test
33,653
27
Title: CoverNav: Cover Following Navigation Planning in Unstructured Outdoor Environment with Deep Reinforcement Learning Abstract: Autonomous navigation in offroad environments has been extensively studied in the robotics field. However, navigation in covert situations where an autonomous vehicle needs to remain hidde...
[]
Validation
33,654
30
Title: LED: A Dataset for Life Event Extraction from Dialogs Abstract: Lifelogging has gained more attention due to its wide applications, such as personalized recommendations or memory assistance. The issues of collecting and extracting personal life events have emerged. People often share their life experiences with ...
[]
Train
33,655
31
Title: Multi-modal Extreme Classification Abstract: This paper develops the MUFIN technique for extreme classification (XC) tasks with millions of labels where data-points and labels are endowed with visual and textual de-scriptors. Applications of MUFIN to product-to-product recommendation and bid query prediction ove...
[ 2434, 15444, 37444 ]
Validation
33,656
7
Title: A sequential global programming approach for two-scale optimization of homogenized multiphysics problems with application to Biot porous media Abstract: nan
[]
Train
33,657
10
Title: Measuring and Modeling Physical Intrinsic Motivation Abstract: Humans are interactive agents driven to seek out situations with interesting physical dynamics. Here we formalize the functional form of physical intrinsic motivation. We first collect ratings of how interesting humans find a variety of physics scena...
[]
Train
33,658
30
Title: Phonetic and Prosody-aware Self-supervised Learning Approach for Non-native Fluency Scoring Abstract: Speech fluency/disfluency can be evaluated by analyzing a range of phonetic and prosodic features. Deep neural networks are commonly trained to map fluency-related features into the human scores. However, the ef...
[]
Validation
33,659
30
Title: Sāmayik: A Benchmark and Dataset for English-Sanskrit Translation Abstract: Sanskrit is a low-resource language with a rich heritage. Digitized Sanskrit corpora reflective of the contemporary usage of Sanskrit, specifically that too in prose, is heavily under-represented at present. Presently, no such English-Sa...
[]
Train
33,660
27
Title: Embedded Object Detection and Mapping in Soft Materials Using Optical Tactile Sensing Abstract: In this paper, we present a methodology that uses an optical tactile sensor for efficient tactile exploration of embedded objects within soft materials. The methodology consists of an exploration phase, where a probab...
[ 2580, 28542 ]
Test
33,661
6
Title: SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security Abstract: Sensitive information is intrinsically tied to interactions in healthcare, and its protection is of paramount importance for achieving high-quality patient outcomes. Research in healthcare privacy and security is predomina...
[]
Train
33,662
30
Title: A Novel Dataset Towards Extracting Virus-Host Interactions Abstract: We describe a novel dataset for the automated recognition of named taxonomic and other entities relevant to the association of viruses with their hosts. We further describe some initial results using pre-trained models on the named-entity recog...
[]
Train
33,663
24
Title: Omega-Regular Reward Machines Abstract: Reinforcement learning (RL) is a powerful approach for training agents to perform tasks, but designing an appropriate reward mechanism is critical to its success. However, in many cases, the complexity of the learning objectives goes beyond the capabilities of the Markovia...
[]
Train
33,664
4
Title: A Large-Scale Study of Phishing PDF Documents Abstract: Phishing PDFs are malicious PDF documents that do not embed malware but trick victims into visiting malicious web pages leading to password theft or drive-by downloads. While recent reports indicate a surge of phishing PDFs, prior works have largely neglect...
[]
Test
33,665
22
Title: Transport via Partial Galois Connections and Equivalences Abstract: Multiple types can represent the same concept. For example, lists and trees can both represent sets. Unfortunately, this easily leads to incomplete libraries: some set-operations may only be available on lists, others only on trees. Similarly, s...
[]
Train
33,666
16
Title: Learning Self-Prior for Mesh Inpainting Using Self-Supervised Graph Convolutional Networks Abstract: This study presents a self-prior-based mesh inpainting framework that requires only an incomplete mesh as input, without the need for any training datasets. Additionally, our method maintains the polygonal mesh f...
[]
Train
33,667
24
Title: Domain Generalization by Functional Regression Abstract: The problem of domain generalization is to learn, given data from different source distributions, a model that can be expected to generalize well on new target distributions which are only seen through unlabeled samples. In this paper, we study domain gene...
[]
Validation
33,668
23
Title: An Estimation of Distribution Algorithm based on interactions between requirements to solve the bi-objective Next Release Problem Abstract: nan
[]
Train
33,669
9
Title: Power of Decision Trees with Monotone Queries Abstract: nan
[]
Train
33,670
34
Title: The Power of Uniform Sampling for k-Median Abstract: We study the power of uniform sampling for $k$-Median in various metric spaces. We relate the query complexity for approximating $k$-Median, to a key parameter of the dataset, called the balancedness $\beta \in (0, 1]$ (with $1$ being perfectly balanced). We s...
[ 624, 11213 ]
Test
33,671
30
Title: Emotion fusion for mental illness detection from social media: A survey Abstract: nan
[ 1269, 33470, 34207 ]
Test
33,672
16
Title: Investigating Pulse-Echo Sound Speed Estimation in Breast Ultrasound with Deep Learning Abstract: Ultrasound is an adjunct tool to mammography that can quickly and safely aid physicians with diagnosing breast abnormalities. Clinical ultrasound often assumes a constant sound speed to form B-mode images for diagno...
[]
Test
33,673
24
Title: Robotic Manipulation Datasets for Offline Compositional Reinforcement Learning Abstract: Offline reinforcement learning (RL) is a promising direction that allows RL agents to pre-train on large datasets, avoiding the recurrence of expensive data collection. To advance the field, it is crucial to generate large-s...
[ 32719 ]
Train
33,674
31
Title: Ranking with Popularity Bias: User Welfare under Self-Amplification Dynamics Abstract: While popularity bias is recognized to play a role in recommmender (and other ranking-based) systems, detailed analyses of its impact on user welfare have largely been lacking. We propose a general mechanism by which item popu...
[ 20612, 14412 ]
Train
33,675
27
Title: Deployment of Reliable Visual Inertial Odometry Approaches for Unmanned Aerial Vehicles in Real-world Environment Abstract: Integration of Visual Inertial Odometry (VIO) methods into a modular control system designed for deployment of Unmanned Aerial Vehicles (UAVs) and teams of cooperating UAVs in real-world co...
[ 33376, 38809, 45306, 27877 ]
Validation
33,676
30
Title: Zero-shot Audio Topic Reranking using Large Language Models Abstract: The Multimodal Video Search by Examples (MVSE) project investigates using video clips as the query term for information retrieval, rather than the more traditional text query. This enables far richer search modalities such as images, speaker, ...
[ 40192, 39297, 33220, 39, 23629, 1909, 43641 ]
Train
33,677
16
Title: Visual Anomaly Detection via Dual-Attention Transformer and Discriminative Flow Abstract: In this paper, we introduce the novel state-of-the-art Dual-attention Transformer and Discriminative Flow (DADF) framework for visual anomaly detection. Based on only normal knowledge, visual anomaly detection has wide appl...
[ 39954, 17581 ]
Train