This paper proposes a learning model of online ad auctions that allows f...
The Click-Through Rate (CTR) prediction task is critical in industrial
r...
Video summarization aims to distill the most important information from ...
This paper describes the submission of the RoyalFlush neural machine
tra...
In this work, we empirically confirm that non-autoregressive translation...
K-Nearest Neighbor Neural Machine Translation (kNN-MT) successfully
inco...
This paper reviews the Challenge on Super-Resolution of Compressed Image...
Feature embeddings are one of the most essential steps when training dee...
It is challenging to precisely configure the phase shifts of the reflect...
Enhanced sampling methods are indispensable in computational physics and...
A covert attack method often used by APT organizations is the DNS tunnel...
The booming of electric vehicles demands efficient battery disassembly f...
The booming of electric vehicles demands efficient battery disassembly f...
We improved an existing end-to-end polyp detection model with better ave...
We propose r-ssGPFA, an unsupervised online anomaly detection model for ...
Reconfigurable intelligent surface (RIS) has emerged as a promising
tech...
Radiotherapy is a treatment where radiation is used to eliminate cancer
...
We propose an approach of graph convolutional networks for robust infant...
In this paper, the optimization of deploying unmanned aerial vehicles (U...
In this paper, the problem of unmanned aerial vehicle (UAV) deployment a...
With the prevalence of big-data-driven applications, such as face recogn...
We participate in the WMT 2020 shared news translation task on Chinese t...
Anomaly detectors are often designed to catch statistical anomalies.
End...
In this paper, we focus on the problem of applying the transformer struc...
Graph convolutional networks (GCNs) are a powerful deep learning approac...
In this paper, we employ Cooperative Rate-Splitting (CRS) technique to
e...
Deep learning based recommender systems (DLRSs) often have embedding lay...
In this paper, using additive characters of finite field, we find a code...
Device-to-Device (D2D) communications incorporated with content caching ...
In this paper, we propose an end-to-end deep neural network for solving ...
In this paper, we present two new constructions of complex codebooks wit...
This paper investigates the physical layer security issue of a
device-to...
This paper analyzes the ergodic capacity of a user-centric virtual cell ...
Effective overload control for large-scale online service system is cruc...
This letter investigates an uplink power control problem for unmanned ae...
In this paper, we aim to minimize the average file transmission delay vi...
This paper considers a downlink ultra-dense heterogeneous cloud radio ac...
This paper investigates the robust transmission design (RTD) of a multi-...
This letter investigates joint power control and user clustering for dow...
In this paper, we consider the sum α-fair utility maximization problem
f...
This paper studies energy efficient resource allocation for a
machine-to...