Sketch-based terrain generation seeks to create realistic landscapes for...
Recommending items to potentially interested users has been an important...
Most existing 3D instance segmentation methods are derived from 3D seman...
Recently, physiological signal-based biometric systems have received wid...
The evolution of quantum computers poses a serious threat to contemporar...
Machine learning promotes the continuous development of signal processin...
Recently, graph convolutional networks (GCNs) have been developed to exp...
Unobservable physiological signals enhance biometric authentication syst...
Automatic Speech Recognition services (ASRs) inherit deep neural network...
Biometric authentication prospered during the 2010s. Vulnerability to
sp...
Science Data Systems (SDS) handle science data from acquisition through
...
Electrocardiogram (ECG) acquisition requires an automated system and ana...
Stealing attack against controlled information, along with the increasin...
Semantic parsing maps natural language (NL) utterances into logical form...
Virtual worlds have become highly popular in recent years with reports o...
Smart contracts are software programs featuring both traditional applica...
Voice interfaces and assistants implemented by various services have bec...
Voice interfaces and assistants implemented by various services have bec...
In recent years, deep learning has presented a great advance in hyperspe...
Network traffic analytics technology is a cornerstone for cyber security...