In recent years, Transformer-based auto-attention mechanisms have been
s...
This paper presents an introduction to the state-of-the-art in anomaly a...
CNNs are often assumed to be capable of using contextual information abo...
Epistemic voting interprets votes as noisy signals about a ground truth....
In causality, estimating the effect of a treatment without confounding
i...
Epistemic social choice aims at unveiling a hidden ground truth given vo...
This technical report is devoted to the continuous estimation of an
epsi...
Functional connectivity is a key approach to investigate oscillatory
act...
The inference of minimum spanning arborescences within a set of objects ...
Ordinary supervised learning is useful when we have paired training data...
We propose a novel graph clustering method guided by additional informat...
Feature generation is an open topic of investigation in graph machine
le...
Spatial relations between objects in an image have proved useful for
str...
This paper investigates the theory of robustness against adversarial att...
This short technical report describes the approach submitted to the Clin...
This short note highlights some links between two lines of research with...
Since the discovery of adversarial examples in machine learning, researc...
This paper investigates the theory of robustness against adversarial att...
Uplift modeling is aimed at estimating the incremental impact of an acti...
In this paper, we present the first differentially private clustering me...
Item cold-start is a classical issue in recommender systems that affects...
This short memo aims at explaining our approach for the challenge IEEE-I...
In this paper, we formulate the Canonical Correlation Analysis (CCA) pro...