Log data is pivotal in activities like anomaly detection and failure
dia...
Ensuring the reliability of cloud systems is critical for both cloud ven...
With an exponential increase in submissions to top-tier Computer Science...
Industrial recommender systems face the challenge of operating in
non-st...
System logs play a critical role in maintaining the reliability of softw...
Hierarchical text classification (HTC) is a challenging subtask of
multi...
Recently, Graph Neural Networks (GNNs) achieve remarkable success in
Rec...
We release a new codebase version of the BEVDet, dubbed branch dev2.0. W...
Adding perturbations via utilizing auxiliary gradient information or
dis...
Developing models that can automatically generate detailed code explanat...
Code generation models can benefit data scientists' productivity by
auto...
The "Right to be Forgotten" rule in machine learning (ML) practice enabl...
Recommender systems are expected to be assistants that help human users ...
Retrieving evidences from tabular and textual resources is essential for...
In this paper, we present BEVerse, a unified framework for 3D perception...
Gait benchmarks empower the research community to train and evaluate
hig...
Face benchmarks empower the research community to train and evaluate
hig...
Autonomous driving requires accurate and detailed Bird's Eye View (BEV)
...
Single frame data contains finite information which limits the performan...
Signed networks are ubiquitous in many real-world applications (e.g., so...
Autonomous driving perceives the surrounding environment for decision ma...
Recently, face recognition in the wild has achieved remarkable success a...
Node injection attack on Graph Neural Networks (GNNs) is an emerging and...
Signed networks are such social networks having both positive and negati...
According to WHO statistics, there are more than 204,617,027 confirmed
C...
The practical application requests both accuracy and efficiency on
multi...
Producing the embedding of a sentence in an unsupervised way is valuable...
In this paper, we contribute a new million-scale face benchmark containi...
Network embedding is aimed at mapping nodes in a network into low-dimens...
At present, the main research direction of multi-object tracking framewo...
Both appearance cue and constraint cue are important in human pose
estim...
Graph neural networks (GNNs) achieve remarkable success in graph-based
s...
We propose the new problem of learning to recover reasoning chains from
...
Recently, the leading performance of human pose estimation is dominated ...
Human pose estimation are of importance for visual understanding tasks s...
A typical social research topic is to figure out the influential people'...
Semantic compositionality (SC) refers to the phenomenon that the meaning...
Graph or network data is ubiquitous in the real world, including social
...
Word similarity computation is a widely recognized task in the field of
...
Existing methods in video action recognition mostly do not distinguish h...
Obtained by moving object detection, the foreground mask result is unsha...
Real-time motion detection in non-stationary scenes is a difficult task ...
Real-time moving object detection in unconstrained scenes is a difficult...