Safety controllers is widely used to achieve safe reinforcement learning...
The swift advancement in the scale and capabilities of Large Language Mo...
Logs play a crucial role in system monitoring and debugging by recording...
Although deep learning have revolutionized abdominal multi-organ
segment...
Open Information Extraction (OIE) task aims at extracting structured fac...
The Segment Anything Model (SAM) represents a state-of-the-art research
...
Large Language Models (LLMs) have significantly impacted numerous domain...
Creating realistic 3D facial animation is crucial for various applicatio...
WebAssembly (Wasm) is an emerging binary format that draws great attenti...
Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
Smart contracts play a vital role in the Ethereum ecosystem. Due to the
...
Prior studies generally focus on software vulnerability detection and ha...
Self-supervised pre-trained models such as Wav2vec2, Hubert, and WavLM h...
Multilingual self-supervised speech representation models have greatly
e...
Large language models (LLMs) have significantly advanced the field of na...
Data augmentation (DA) is a crucial technique for enhancing the sample
e...
Due to the rapid development of computing hardware resources and the dra...
NFT rug pull is one of the most prominent type of scam that the develope...
Binary rewriting is a widely adopted technique in software analysis.
Web...
Although existing techniques have proposed automated approaches to allev...
Large-scale models pre-trained on large-scale datasets have profoundly
a...
We extract cyclic information in turnover and find it can explain the
mo...
Deep neural networks are proven to be vulnerable to backdoor attacks.
De...
We present a simple yet effective method for skeleton-free motion
retarg...
The privacy of personal information has received significant attention i...
WebAssembly (abbreviated WASM) has emerged as a promising language of th...
A general framework of unsupervised learning for combinatorial optimizat...
The study of stability and sensitivity of statistical methods or algorit...
A causal vector autoregressive (CVAR) model is introduced for weakly
sta...
The smallest singular value and condition number play important roles in...
Tumor lesion segmentation is one of the most important tasks in medical ...
Labeled audio data is insufficient to build satisfying speech recognitio...
What are the events involved in a pandemic outbreak? What steps should b...
In this paper, we seek to improve the faithfulness of TempRel extraction...
Natural language often describes events in different granularities, such...
We introduce two models of consensus following a majority rule on
time-e...
Renal structure segmentation from computed tomography angiography (CTA) ...
Gaze estimation, which is a method to determine where a person is lookin...
EOSIO, as one of the most representative blockchain 3.0 platforms, invol...
Serverless computing is an emerging cloud computing paradigm that frees
...
Using machine learning to solve combinatorial optimization (CO) problems...
Vetting security impacts introduced by third-party libraries in iOS apps...
This paper describes the THUEE team's speech recognition system for the ...
Researchers have proposed kinds of malware detection methods to solve th...
Contemporary deep-learning object detection methods for autonomous drivi...
The data-centric machine learning aims to find effective ways to build
a...
Action recognition has been a heated topic in computer vision for its wi...
This paper studies the problem of matching two complete graphs with edge...
To advance the paradigm of autonomous operation for nuclear power plants...
People talk with diversified styles. For one piece of speech, different
...