id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1805.11780 | Detecting Data Leakage from Databases on Android Apps with Concept Drift | Mobile databases are the statutory backbones of many applications on smartphones, and they store a lot of sensitive information. However, vulnerabilities in the operating system or the app logic can lead to sensitive data leakage by giving the adversaries unauthorized access to the app's database. In this paper, we stu... | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | 99,010 |
2301.06681 | Cross-domain Self-supervised Framework for Photoacoustic Computed
Tomography Image Reconstruction | Accurate image reconstruction is crucial for photoacoustic (PA) computed tomography (PACT). Recently, deep learning has been used to reconstruct the PA image with a supervised scheme, which requires high-quality images as ground truth labels. In practice, there are inevitable trade-offs between cost and performance sin... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 340,711 |
2010.00048 | Creative Captioning: An AI Grand Challenge Based on the Dixit Board Game | We propose a new class of "grand challenge" AI problems that we call creative captioning---generating clever, interesting, or abstract captions for images, as well as understanding such captions. Creative captioning draws on core AI research areas of vision, natural language processing, narrative reasoning, and social ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 198,163 |
1909.10801 | WATTNet: Learning to Trade FX via Hierarchical Spatio-Temporal
Representation of Highly Multivariate Time Series | Finance is a particularly challenging application area for deep learning models due to low noise-to-signal ratio, non-stationarity, and partial observability. Non-deliverable-forwards (NDF), a derivatives contract used in foreign exchange (FX) trading, presents additional difficulty in the form of long-term planning re... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 146,634 |
cs/0505018 | Temporal and Spatial Data Mining with Second-Order Hidden Models | In the frame of designing a knowledge discovery system, we have developed stochastic models based on high-order hidden Markov models. These models are capable to map sequences of data into a Markov chain in which the transitions between the states depend on the \texttt{n} previous states according to the order of the m... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 538,706 |
1812.03412 | Learning Multiplication-free Linear Transformations | In this paper, we propose several dictionary learning algorithms for sparse representations that also impose specific structures on the learned dictionaries such that they are numerically efficient to use: reduced number of addition/multiplications and even avoiding multiplications altogether. We base our work on facto... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 116,007 |
1702.08798 | Unsupervised Triplet Hashing for Fast Image Retrieval | Hashing has played a pivotal role in large-scale image retrieval. With the development of Convolutional Neural Network (CNN), hashing learning has shown great promise. But existing methods are mostly tuned for classification, which are not optimized for retrieval tasks, especially for instance-level retrieval. In this ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 69,069 |
2309.05444 | Pushing Mixture of Experts to the Limit: Extremely Parameter Efficient
MoE for Instruction Tuning | The Mixture of Experts (MoE) is a widely known neural architecture where an ensemble of specialized sub-models optimizes overall performance with a constant computational cost. However, conventional MoEs pose challenges at scale due to the need to store all experts in memory. In this paper, we push MoE to the limit. We... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 391,084 |
2012.13391 | I like fish, especially dolphins: Addressing Contradictions in Dialogue
Modeling | To quantify how well natural language understanding models can capture consistency in a general conversation, we introduce the DialoguE COntradiction DEtection task (DECODE) and a new conversational dataset containing both human-human and human-bot contradictory dialogues. We then compare a structured utterance-based a... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 213,211 |
2011.04457 | Binary Matrix Factorisation via Column Generation | Identifying discrete patterns in binary data is an important dimensionality reduction tool in machine learning and data mining. In this paper, we consider the problem of low-rank binary matrix factorisation (BMF) under Boolean arithmetic. Due to the hardness of this problem, most previous attempts rely on heuristic tec... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 205,594 |
2310.05589 | DRIN: Dynamic Relation Interactive Network for Multimodal Entity Linking | Multimodal Entity Linking (MEL) is a task that aims to link ambiguous mentions within multimodal contexts to referential entities in a multimodal knowledge base. Recent methods for MEL adopt a common framework: they first interact and fuse the text and image to obtain representations of the mention and entity respectiv... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 398,213 |
2406.15541 | Cyclic Scheduler Design for Minimizing Age of Information in Massive
Scale Networks Susceptible to Packet Errors | In multi-source status update systems, sources need to be scheduled appropriately to maintain timely communication between each of the sources and the monitor. A cyclic schedule is an age-agnostic schedule in which the sources are served according to a fixed finite transmission pattern, which upon completion, repeats i... | false | false | false | false | false | false | false | false | false | true | true | false | false | false | false | false | false | true | 466,773 |
cmp-lg/9407027 | Parsing as Tree Traversal | This paper presents a unified approach to parsing, in which top-down, bottom-up and left-corner parsers are related to preorder, postorder and inorder tree traversals. It is shown that the simplest bottom-up and left-corner parsers are left recursive and must be converted using an extended Greibach normal form. With fu... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 536,146 |
2502.08209 | Equivariant Masked Position Prediction for Efficient Molecular
Representation | Graph neural networks (GNNs) have shown considerable promise in computational chemistry. However, the limited availability of molecular data raises concerns regarding GNNs' ability to effectively capture the fundamental principles of physics and chemistry, which constrains their generalization capabilities. To address ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 532,935 |
2102.11584 | Enhancing Model Robustness By Incorporating Adversarial Knowledge Into
Semantic Representation | Despite that deep neural networks (DNNs) have achieved enormous success in many domains like natural language processing (NLP), they have also been proven to be vulnerable to maliciously generated adversarial examples. Such inherent vulnerability has threatened various real-world deployed DNNs-based applications. To st... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 221,474 |
2308.06100 | Diffusion-based Visual Counterfactual Explanations -- Towards Systematic
Quantitative Evaluation | Latest methods for visual counterfactual explanations (VCE) harness the power of deep generative models to synthesize new examples of high-dimensional images of impressive quality. However, it is currently difficult to compare the performance of these VCE methods as the evaluation procedures largely vary and often boil... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 385,032 |
1802.04365 | Learning a Neural-network-based Representation for Open Set Recognition | Open set recognition problems exist in many domains. For example in security, new malware classes emerge regularly; therefore malware classification systems need to identify instances from unknown classes in addition to discriminating between known classes. In this paper we present a neural network based representation... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 90,202 |
2103.07392 | Temporal Logic for Social Networks | This paper introduces a logic with a class of social network models that is based on standard Linear Temporal Logic (LTL), leveraging the power of existing model checkers for the analysis of social networks. We provide a short literature overview, and then define our logic and its axiomatization, present some simple mo... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 224,582 |
2311.14006 | High-resolution Population Maps Derived from Sentinel-1 and Sentinel-2 | Detailed population maps play an important role in diverse fields ranging from humanitarian action to urban planning. Generating such maps in a timely and scalable manner presents a challenge, especially in data-scarce regions. To address it we have developed POPCORN, a population mapping method whose only inputs are f... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 409,960 |
2501.14183 | VarDrop: Enhancing Training Efficiency by Reducing Variate Redundancy in
Periodic Time Series Forecasting | Variate tokenization, which independently embeds each variate as separate tokens, has achieved remarkable improvements in multivariate time series forecasting. However, employing self-attention with variate tokens incurs a quadratic computational cost with respect to the number of variates, thus limiting its training e... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 527,012 |
2004.00930 | Neuronal Sequence Models for Bayesian Online Inference | Sequential neuronal activity underlies a wide range of processes in the brain. Neuroscientific evidence for neuronal sequences has been reported in domains as diverse as perception, motor control, speech, spatial navigation and memory. Consequently, different dynamical principles have been proposed as possible sequence... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 170,776 |
2402.05054 | LGM: Large Multi-View Gaussian Model for High-Resolution 3D Content
Creation | 3D content creation has achieved significant progress in terms of both quality and speed. Although current feed-forward models can produce 3D objects in seconds, their resolution is constrained by the intensive computation required during training. In this paper, we introduce Large Multi-View Gaussian Model (LGM), a no... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 427,705 |
2209.08665 | Allocation Schemes in Analytic Evaluation: Applicant-Centric Holistic or
Attribute-Centric Segmented? | Many applications such as hiring and university admissions involve evaluation and selection of applicants. These tasks are fundamentally difficult, and require combining evidence from multiple different aspects (what we term "attributes"). In these applications, the number of applicants is often large, and a common pra... | true | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 318,214 |
2409.20302 | OM4OV: Leveraging Ontology Matching for Ontology Versioning | Due to the dynamic nature of the semantic web, ontology version control is required to capture time-varying information, most importantly for widely-used ontologies. Despite the long-standing recognition of ontology versioning (OV) as a crucial component for efficient ontology management, the growing size of ontologies... | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | false | false | false | 493,078 |
2011.05543 | An ensemble-based approach by fine-tuning the deep transfer learning
models to classify pneumonia from chest X-ray images | Pneumonia is caused by viruses, bacteria, or fungi that infect the lungs, which, if not diagnosed, can be fatal and lead to respiratory failure. More than 250,000 individuals in the United States, mainly adults, are diagnosed with pneumonia each year, and 50,000 die from the disease. Chest Radiography (X-ray) is widely... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 205,954 |
2411.16475 | NonSysId: A nonlinear system identification package with improved model
term selection for NARMAX models | System identification involves constructing mathematical models of dynamic systems using input-output data, enabling analysis and prediction of system behaviour in both time and frequency domains. This approach can model the entire system or capture specific dynamics within it. For meaningful analysis, it is essential ... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 511,038 |
2010.01650 | Supporting large-scale image recognition with out-of-domain samples | This article presents an efficient end-to-end method to perform instance-level recognition employed to the task of labeling and ranking landmark images. In a first step, we embed images in a high dimensional feature space using convolutional neural networks trained with an additive angular margin loss and classify imag... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 198,722 |
2203.08075 | Things not Written in Text: Exploring Spatial Commonsense from Visual
Signals | Spatial commonsense, the knowledge about spatial position and relationship between objects (like the relative size of a lion and a girl, and the position of a boy relative to a bicycle when cycling), is an important part of commonsense knowledge. Although pretrained language models (PLMs) succeed in many NLP tasks, the... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 285,670 |
2411.16816 | SplatAD: Real-Time Lidar and Camera Rendering with 3D Gaussian Splatting
for Autonomous Driving | Ensuring the safety of autonomous robots, such as self-driving vehicles, requires extensive testing across diverse driving scenarios. Simulation is a key ingredient for conducting such testing in a cost-effective and scalable way. Neural rendering methods have gained popularity, as they can build simulation environment... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 511,203 |
2407.21016 | Add-SD: Rational Generation without Manual Reference | Diffusion models have exhibited remarkable prowess in visual generalization. Building on this success, we introduce an instruction-based object addition pipeline, named Add-SD, which automatically inserts objects into realistic scenes with rational sizes and positions. Different from layout-conditioned methods, Add-SD ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 477,356 |
2406.01309 | REvolve: Reward Evolution with Large Language Models using Human
Feedback | Designing effective reward functions is crucial to training reinforcement learning (RL) algorithms. However, this design is non-trivial, even for domain experts, due to the subjective nature of certain tasks that are hard to quantify explicitly. In recent works, large language models (LLMs) have been used for reward ge... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 460,260 |
2002.06532 | Active Bayesian Assessment for Black-Box Classifiers | Recent advances in machine learning have led to increased deployment of black-box classifiers across a wide variety of applications. In many such situations there is a critical need to both reliably assess the performance of these pre-trained models and to perform this assessment in a label-efficient manner (given that... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 164,222 |
2203.07897 | Magnetic Field Prediction Using Generative Adversarial Networks | Plenty of scientific and real-world applications are built on magnetic fields and their characteristics. To retrieve the valuable magnetic field information in high resolution, extensive field measurements are required, which are either time-consuming to conduct or even not feasible due to physical constraints. To alle... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,599 |
2203.00597 | Path sampling of recurrent neural networks by incorporating known
physics | Recurrent neural networks have seen widespread use in modeling dynamical systems in varied domains such as weather prediction, text prediction and several others. Often one wishes to supplement the experimentally observed dynamics with prior knowledge or intuition about the system. While the recurrent nature of these n... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 283,060 |
2210.13129 | Facial Soft Biometrics for Recognition in the Wild: Recent Works,
Annotation, and COTS Evaluation | The role of soft biometrics to enhance person recognition systems in unconstrained scenarios has not been extensively studied. Here, we explore the utility of the following modalities: gender, ethnicity, age, glasses, beard, and moustache. We consider two assumptions: 1) manual estimation of soft biometrics and 2) auto... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 326,056 |
2309.00357 | Discrete Versus Continuous Algorithms in Dynamics of Affective Decision
Making | The dynamics of affective decision making is considered for an intelligent network composed of agents with different types of memory: long-term and short-term memory. The consideration is based on probabilistic affective decision theory, which takes into account the rational utility of alternatives as well as the emoti... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 389,282 |
2111.11720 | Gait Identification under Surveillance Environment based on Human
Skeleton | As an emerging biological identification technology, vision-based gait identification is an important research content in biometrics. Most existing gait identification methods extract features from gait videos and identify a probe sample by a query in the gallery. However, video data contains redundant information and ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 267,753 |
2312.08932 | Influence of Prompting Strategies on Segment Anything Model (SAM) for
Short-axis Cardiac MRI segmentation | The Segment Anything Model (SAM) has recently emerged as a significant breakthrough in foundation models, demonstrating remarkable zero-shot performance in object segmentation tasks. While SAM is designed for generalization, it exhibits limitations in handling specific medical imaging tasks that require fine-structure ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 415,523 |
1607.06525 | CGMOS: Certainty Guided Minority OverSampling | Handling imbalanced datasets is a challenging problem that if not treated correctly results in reduced classification performance. Imbalanced datasets are commonly handled using minority oversampling, whereas the SMOTE algorithm is a successful oversampling algorithm with numerous extensions. SMOTE extensions do not ha... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 58,902 |
1404.2571 | RANCOR: Non-Linear Image Registration with Total Variation
Regularization | Optimization techniques have been widely used in deformable registration, allowing for the incorporation of similarity metrics with regularization mechanisms. These regularization mechanisms are designed to mitigate the effects of trivial solutions to ill-posed registration problems and to otherwise ensure the resultin... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 32,221 |
2411.07075 | Transformer verbatim in-context retrieval across time and scale | To predict upcoming text, language models must in some cases retrieve in-context information verbatim. In this report, we investigated how the ability of language models to retrieve arbitrary in-context nouns developed during training (across time) and as language models trained on the same dataset increase in size (ac... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 507,381 |
2408.05819 | On the Convergence of a Federated Expectation-Maximization Algorithm | Data heterogeneity has been a long-standing bottleneck in studying the convergence rates of Federated Learning algorithms. In order to better understand the issue of data heterogeneity, we study the convergence rate of the Expectation-Maximization (EM) algorithm for the Federated Mixture of $K$ Linear Regressions model... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 479,955 |
2102.12733 | Distributed Online Learning with Multiple Kernels | We consider the problem of learning a nonlinear function over a network of learners in a fully decentralized fashion. Online learning is additionally assumed, where every learner receives continuous streaming data locally. This learning model is called a fully distributed online learning (or a fully decentralized onlin... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 221,832 |
2412.02807 | Learning Koopman-based Stability Certificates for Unknown Nonlinear
Systems | Koopman operator theory has gained significant attention in recent years for identifying discrete-time nonlinear systems by embedding them into an infinite-dimensional linear vector space. However, providing stability guarantees while learning the continuous-time dynamics, especially under conditions of relatively low ... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 513,686 |
2211.13185 | BaRe-ESA: A Riemannian Framework for Unregistered Human Body Shapes | We present Basis Restricted Elastic Shape Analysis (BaRe-ESA), a novel Riemannian framework for human body scan representation, interpolation and extrapolation. BaRe-ESA operates directly on unregistered meshes, i.e., without the need to establish prior point to point correspondences or to assume a consistent mesh stru... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 332,377 |
2407.03379 | missForestPredict -- Missing data imputation for prediction settings | Prediction models are used to predict an outcome based on input variables. Missing data in input variables often occurs at model development and at prediction time. The missForestPredict R package proposes an adaptation of the missForest imputation algorithm that is fast, user-friendly and tailored for prediction setti... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 470,136 |
1407.8337 | A New Model of Array Grammar for generating Connected Patterns on an
Image Neighborhood | Study of patterns on images is recognized as an important step in characterization and classification of image. The ability to efficiently analyze and describe image patterns is thus of fundamental importance. The study of syntactic methods of describing pictures has been of interest for researchers. Array Grammars can... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 35,026 |
0711.0574 | Singular Curves in the Joint Space and Cusp Points of 3-RPR parallel
manipulators | This paper investigates the singular curves in the joint space of a family of planar parallel manipulators. It focuses on special points, referred to as cusp points, which may appear on these curves. Cusp points play an important role in the kinematic behavior of parallel manipulators since they make possible a nonsing... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 867 |
2403.06487 | Multilingual Turn-taking Prediction Using Voice Activity Projection | This paper investigates the application of voice activity projection (VAP), a predictive turn-taking model for spoken dialogue, on multilingual data, encompassing English, Mandarin, and Japanese. The VAP model continuously predicts the upcoming voice activities of participants in dyadic dialogue, leveraging a cross-att... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 436,477 |
2308.15364 | Heterogeneous Multi-Task Gaussian Cox Processes | This paper presents a novel extension of multi-task Gaussian Cox processes for modeling multiple heterogeneous correlated tasks jointly, e.g., classification and regression, via multi-output Gaussian processes (MOGP). A MOGP prior over the parameters of the dedicated likelihoods for classification, regression and point... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 388,658 |
2406.12123 | ChatEMG: Synthetic Data Generation to Control a Robotic Hand Orthosis
for Stroke | Intent inferral on a hand orthosis for stroke patients is challenging due to the difficulty of data collection. Additionally, EMG signals exhibit significant variations across different conditions, sessions, and subjects, making it hard for classifiers to generalize. Traditional approaches require a large labeled datas... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 465,233 |
2211.01592 | Try to Avoid Attacks: A Federated Data Sanitization Defense for
Healthcare IoMT Systems | Healthcare IoMT systems are becoming intelligent, miniaturized, and more integrated into daily life. As for the distributed devices in the IoMT, federated learning has become a topical area with cloud-based training procedures when meeting data security. However, the distribution of IoMT has the risk of protection from... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | true | 328,284 |
1406.3949 | A Fusion of Labeled-Grid Shape Descriptors with Weighted Ranking
Algorithm for Shapes Recognition | Retrieving similar images from a large dataset based on the image content has been a very active research area and is a very challenging task. Studies have shown that retrieving similar images based on their shape is a very effective method. For this purpose a large number of methods exist in literature. The combinatio... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 33,893 |
1710.03326 | Inspiration, Captivation, and Misdirection: Emergent Properties in
Networks of Online Navigation | The World Wide Web (WWW) has fundamentally changed the ways billions of people are able to access information. Thus, understanding how people seek information online is an important issue of study. Wikipedia is a hugely important part of information provision on the web, with hundreds of millions of users browsing and ... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 82,308 |
2003.11959 | Pedestrian Models for Autonomous Driving Part II: High-Level Models of
Human Behavior | Autonomous vehicles (AVs) must share space with pedestrians, both in carriageway cases such as cars at pedestrian crossings and off-carriageway cases such as delivery vehicles navigating through crowds on pedestrianized high-streets. Unlike static obstacles, pedestrians are active agents with complex, interactive motio... | true | false | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | true | 169,770 |
2207.04108 | ReFinED: An Efficient Zero-shot-capable Approach to End-to-End Entity
Linking | We introduce ReFinED, an efficient end-to-end entity linking model which uses fine-grained entity types and entity descriptions to perform linking. The model performs mention detection, fine-grained entity typing, and entity disambiguation for all mentions within a document in a single forward pass, making it more than... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 307,075 |
2311.00527 | A Leakage-based Method for Mitigation of Faulty Reconfigurable
Intelligent Surfaces | Reconfigurable Intelligent Surfaces (RISs) are expected to be massively deployed in future beyond-5th generation wireless networks, thanks to their ability to programmatically alter the propagation environment, inherent low-cost and low-maintenance nature. Indeed, they are envisioned to be implemented on the facades of... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 404,686 |
2408.14689 | Federated User Preference Modeling for Privacy-Preserving Cross-Domain
Recommendation | Cross-domain recommendation (CDR) aims to address the data-sparsity problem by transferring knowledge across domains. Existing CDR methods generally assume that the user-item interaction data is shareable between domains, which leads to privacy leakage. Recently, some privacy-preserving CDR (PPCDR) models have been pro... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 483,631 |
1508.05116 | Resolving Weak Sources within a Dense Array using a Network Approach | A non-parametric technique to identify weak sources within dense sensor arrays is developed using a network approach. No knowledge about the propagation medium is needed except that signal strengths decay to insignificant levels within a scale that is shorter than the aperture. We then reinterpret the spatial covarianc... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 46,201 |
2006.05646 | Scalable Backdoor Detection in Neural Networks | Recently, it has been shown that deep learning models are vulnerable to Trojan attacks, where an attacker can install a backdoor during training time to make the resultant model misidentify samples contaminated with a small trigger patch. Current backdoor detection methods fail to achieve good detection performance and... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 181,151 |
2210.14434 | A formal process of hierarchical functional requirements development for
Set-Based Design | The design of complex systems is typically uncertain and ambiguous at early stages. Set-Based Design is a promising approach to complex systems design as it supports alternative exploration and gradual uncertainty reduction. When designing a complex system, functional requirements decomposition is a common and effectiv... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 326,545 |
1604.06182 | The THUMOS Challenge on Action Recognition for Videos "in the Wild" | Automatically recognizing and localizing wide ranges of human actions has crucial importance for video understanding. Towards this goal, the THUMOS challenge was introduced in 2013 to serve as a benchmark for action recognition. Until then, video action recognition, including THUMOS challenge, had focused primarily on ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 54,908 |
2103.00683 | Decision Making in Monopoly using a Hybrid Deep Reinforcement Learning
Approach | Learning to adapt and make real-time informed decisions in a dynamic and complex environment is a challenging problem. Monopoly is a popular strategic board game that requires players to make multiple decisions during the game. Decision-making in Monopoly involves many real-world elements such as strategizing, luck, an... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 222,360 |
2210.12035 | BlanketGen - A synthetic blanket occlusion augmentation pipeline for
MoCap datasets | Human motion analysis has seen drastic improvements recently, however, due to the lack of representative datasets, for clinical in-bed scenarios it is still lagging behind. To address this issue, we implemented BlanketGen, a pipeline that augments videos with synthetic blanket occlusions. With this pipeline, we generat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 325,556 |
2309.13599 | From Cluster Assumption to Graph Convolution: Graph-based
Semi-Supervised Learning Revisited | Graph-based semi-supervised learning (GSSL) has long been a hot research topic. Traditional methods are generally shallow learners, based on the cluster assumption. Recently, graph convolutional networks (GCNs) have become the predominant techniques for their promising performance. In this paper, we theoretically discu... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 394,276 |
2203.14961 | A Deep Learning Approach for Thermal Plume Prediction of Groundwater
Heat Pumps | Climate control of buildings makes up a significant portion of global energy consumption, with groundwater heat pumps providing a suitable alternative. To prevent possibly negative interactions between heat pumps throughout a city, city planners have to optimize their layouts in the future. We develop a novel data-driv... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 288,194 |
2402.01765 | LLMs Simulate Big Five Personality Traits: Further Evidence | An empirical investigation into the simulation of the Big Five personality traits by large language models (LLMs), namely Llama2, GPT4, and Mixtral, is presented. We analyze the personality traits simulated by these models and their stability. This contributes to the broader understanding of the capabilities of LLMs to... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 426,205 |
2102.06610 | Enhancing into the codec: Noise Robust Speech Coding with
Vector-Quantized Autoencoders | Audio codecs based on discretized neural autoencoders have recently been developed and shown to provide significantly higher compression levels for comparable quality speech output. However, these models are tightly coupled with speech content, and produce unintended outputs in noisy conditions. Based on VQ-VAE autoenc... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 219,816 |
2102.05374 | Enhancing Reading Strategies by Exploring A Theme-based Approach to
Literature Surveys | Searching large digital repositories can be extremely frustrating, as common list-based formats encourage users to adopt a convenience-sampling approach that favours chance discovery and random search, over meaningful exploration. We have designed a methodology that allows users to visually and thematically explore cor... | true | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | 219,417 |
2305.15265 | Winner-Take-All Column Row Sampling for Memory Efficient Adaptation of
Language Model | With the rapid growth in model size, fine-tuning the large pre-trained language model has become increasingly difficult due to its extensive memory usage. Previous works usually focus on reducing the number of trainable parameters in the network. While the model parameters do contribute to memory usage, the primary mem... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 367,537 |
2311.14494 | MVControl: Adding Conditional Control to Multi-view Diffusion for
Controllable Text-to-3D Generation | We introduce MVControl, a novel neural network architecture that enhances existing pre-trained multi-view 2D diffusion models by incorporating additional input conditions, e.g. edge maps. Our approach enables the generation of controllable multi-view images and view-consistent 3D content. To achieve controllable multi-... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 410,129 |
2403.07134 | COMQ: A Backpropagation-Free Algorithm for Post-Training Quantization | Post-training quantization (PTQ) has emerged as a practical approach to compress large neural networks, making them highly efficient for deployment. However, effectively reducing these models to their low-bit counterparts without compromising the original accuracy remains a key challenge. In this paper, we propose an i... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 436,750 |
2301.05873 | Opponent-aware Role-based Learning in Team Competitive Markov Games | Team competition in multi-agent Markov games is an increasingly important setting for multi-agent reinforcement learning, due to its general applicability in modeling many real-life situations. Multi-agent actor-critic methods are the most suitable class of techniques for learning optimal policies in the team competiti... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 340,481 |
2308.16687 | DictaBERT: A State-of-the-Art BERT Suite for Modern Hebrew | We present DictaBERT, a new state-of-the-art pre-trained BERT model for modern Hebrew, outperforming existing models on most benchmarks. Additionally, we release three fine-tuned versions of the model, designed to perform three specific foundational tasks in the analysis of Hebrew texts: prefix segmentation, morphologi... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 389,079 |
2008.09497 | Single-Image Depth Prediction Makes Feature Matching Easier | Good local features improve the robustness of many 3D re-localization and multi-view reconstruction pipelines. The problem is that viewing angle and distance severely impact the recognizability of a local feature. Attempts to improve appearance invariance by choosing better local feature points or by leveraging outside... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 192,732 |
2110.05775 | Quantifying Cognitive Factors in Lexical Decline | We adopt an evolutionary view on language change in which cognitive factors (in addition to social ones) affect the fitness of words and their success in the linguistic ecosystem. Specifically, we propose a variety of psycholinguistic factors -- semantic, distributional, and phonological -- that we hypothesize are pred... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 260,399 |
2302.14728 | Semantically Consistent Person Image Generation | We propose a data-driven approach for context-aware person image generation. Specifically, we attempt to generate a person image such that the synthesized instance can blend into a complex scene. In our method, the position, scale, and appearance of the generated person are semantically conditioned on the existing pers... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 348,414 |
2301.13545 | Holistic Graph-based Motion Prediction | Motion prediction for automated vehicles in complex environments is a difficult task that is to be mastered when automated vehicles are to be used in arbitrary situations. Many factors influence the future motion of traffic participants starting with traffic rules and reaching from the interaction between each other to... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 342,953 |
2105.03162 | Adv-Makeup: A New Imperceptible and Transferable Attack on Face
Recognition | Deep neural networks, particularly face recognition models, have been shown to be vulnerable to both digital and physical adversarial examples. However, existing adversarial examples against face recognition systems either lack transferability to black-box models, or fail to be implemented in practice. In this paper, w... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 234,061 |
2409.02648 | Creating a Microstructure Latent Space with Rich Material Information
for Multiphase Alloy Design | The intricate microstructure serves as the cornerstone for the composition/processing-structure-property (CPSP) connection in multiphase alloys. Traditional alloy design methods often overlook microstructural details, which diminishes the reliability and effectiveness of the outcomes. This study introduces an improved ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 485,781 |
2008.08989 | Towards Inferring Queries from Simple and Partial Provenance Examples | The field of query-by-example aims at inferring queries from output examples given by non-expert users, by finding the underlying logic that binds the examples. However, for a very small set of examples, it is difficult to correctly infer such logic. To bridge this gap, previous work suggested attaching explanations to... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 192,577 |
1605.06940 | Elastic Solver: Balancing Solution Time and Energy Consumption | Combinatorial decision problems arise in many different domains such as scheduling, routing, packing, bioinformatics, and many more. Despite recent advances in developing scalable solvers, there are still many problems which are often very hard to solve. Typically the most advanced solvers include elements which are st... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 56,217 |
2209.10585 | Grape Cold Hardiness Prediction via Multi-Task Learning | Cold temperatures during fall and spring have the potential to cause frost damage to grapevines and other fruit plants, which can significantly decrease harvest yields. To help prevent these losses, farmers deploy expensive frost mitigation measures such as sprinklers, heaters, and wind machines when they judge that da... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 318,906 |
2004.08814 | Graph-Structured Referring Expression Reasoning in The Wild | Grounding referring expressions aims to locate in an image an object referred to by a natural language expression. The linguistic structure of a referring expression provides a layout of reasoning over the visual contents, and it is often crucial to align and jointly understand the image and the referring expression. I... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 173,180 |
2001.08662 | The INTERSPEECH 2020 Deep Noise Suppression Challenge: Datasets,
Subjective Speech Quality and Testing Framework | The INTERSPEECH 2020 Deep Noise Suppression Challenge is intended to promote collaborative research in real-time single-channel Speech Enhancement aimed to maximize the subjective (perceptual) quality of the enhanced speech. A typical approach to evaluate the noise suppression methods is to use objective metrics on the... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 161,349 |
2202.09275 | Rethinking Pareto Frontier for Performance Evaluation of Deep Neural
Networks | Performance optimization of deep learning models is conducted either manually or through automatic architecture search, or a combination of both. On the other hand, their performance strongly depends on the target hardware and how successfully the models were trained. We propose to use a multi-dimensional Pareto fronti... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 281,139 |
2310.04461 | AI-based automated active learning for discovery of hidden dynamic
processes: A use case in light microscopy | In the biomedical environment, experiments assessing dynamic processes are primarily performed by a human acquisition supervisor. Contemporary implementations of such experiments frequently aim to acquire a maximum number of relevant events from sometimes several hundred parallel, non-synchronous processes. Since in so... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 397,668 |
2009.01119 | Self-driving car safety quantification via component-level analysis | In this paper, we present a rigorous modular statistical approach for arguing safety or its insufficiency of an autonomous vehicle through a concrete illustrative example. The methodology relies on making appropriate quantitative studies of the performance of constituent components. We explain the importance of suffici... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 194,226 |
2404.16552 | Efficient Solution of Point-Line Absolute Pose | We revisit certain problems of pose estimation based on 3D--2D correspondences between features which may be points or lines. Specifically, we address the two previously-studied minimal problems of estimating camera extrinsics from $p \in \{ 1, 2 \}$ point--point correspondences and $l=3-p$ line--line correspondences. ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 449,538 |
1406.1134 | Local Decorrelation For Improved Detection | Even with the advent of more sophisticated, data-hungry methods, boosted decision trees remain extraordinarily successful for fast rigid object detection, achieving top accuracy on numerous datasets. While effective, most boosted detectors use decision trees with orthogonal (single feature) splits, and the topology of ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 33,603 |
2007.15209 | Depressive, Drug Abusive, or Informative: Knowledge-aware Study of News
Exposure during COVID-19 Outbreak | The COVID-19 pandemic is having a serious adverse impact on the lives of people across the world. COVID-19 has exacerbated community-wide depression, and has led to increased drug abuse brought about by isolation of individuals as a result of lockdown. Further, apart from providing informative content to the public, th... | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 189,606 |
2303.05768 | Learning Global-Local Correspondence with Semantic Bottleneck for
Logical Anomaly Detection | This paper presents a novel framework, named Global-Local Correspondence Framework (GLCF), for visual anomaly detection with logical constraints. Visual anomaly detection has become an active research area in various real-world applications, such as industrial anomaly detection and medical disease diagnosis. However, m... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 350,595 |
2402.16486 | Intelligent Known and Novel Aircraft Recognition -- A Shift from
Classification to Similarity Learning for Combat Identification | Precise aircraft recognition in low-resolution remote sensing imagery is a challenging yet crucial task in aviation, especially combat identification. This research addresses this problem with a novel, scalable, and AI-driven solution. The primary hurdle in combat identification in remote sensing imagery is the accurat... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 432,592 |
1904.05712 | Reconstructing Network Inputs with Additive Perturbation Signatures | In this work, we present preliminary results demonstrating the ability to recover a significant amount of information about secret model inputs given only very limited access to model outputs and the ability evaluate the model on additive perturbations to the input. | false | false | false | false | false | false | false | false | false | false | false | true | true | false | false | false | false | false | 127,389 |
2004.11205 | Optimized Quantum Compilation for Near-Term Algorithms with OpenPulse | Quantum computers are traditionally operated by programmers at the granularity of a gate-based instruction set. However, the actual device-level control of a quantum computer is performed via analog pulses. We introduce a compiler that exploits direct control at this microarchitectural level to achieve significant impr... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 173,848 |
0905.4656 | Quantization Errors of fGn and fBm Signals | In this Letter, we show that under the assumption of high resolution, the quantization errors of fGn and fBm signals with uniform quantizer can be treated as uncorrelated white noises. | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 3,789 |
1704.04155 | Timely Updates over an Erasure Channel | Using an age of information (AoI) metric, we examine the transmission of coded updates through a binary erasure channel to a monitor/receiver. We start by deriving the average status update age of an infinite incremental redundancy (IIR) system in which the transmission of a k-symbol update continuesuntil k symbols are... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 71,759 |
1902.00936 | New Constellation Design and Bit Mapping for Dual Mode OFDM-IM | Dual mode orthogonal frequency division multiplexing with index modulation (DM-OFDM-IM) is recently proposed, which modulates all subcarriers to eliminate the limits of spectrum efficiency in OFDM with index modulation (OFDM-IM). In DM-OFDM-IM, the subcarriers within each subblock are divided into two groups, which are... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 120,548 |
2404.17367 | An Optimised Brushless DC Motor Control Scheme for Robotics Applications | This work aims to develop an integrated control strategy for Brushless Direct Current Motors for a wide range of applications in robotics systems. The controller is suited for both high torque - low speed and high-speed control of the motors. Hardware validation is done by developing a custom BLDC drive system, and the... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 449,835 |
1303.2048 | Finding Zeros: Greedy Detection of Holes | In this paper, motivated by the setting of white-space detection [1], we present theoretical and empirical results for detection of the zero-support E of x \in Cp (xi = 0 for i \in E) with reduced-dimension linear measurements. We propose two low- complexity algorithms based on one-step thresholding [2] for this purpos... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 22,785 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.