While Graph Neural Networks (GNNs) have made significant strides in dive...
Bridging the huge disparity between neural and symbolic representation c...
Contextualized or discourse aware commonsense inference is the task of
g...
In recent years, deep-learning-based approaches have been introduced to
...
Persistence diagrams (PDs), often characterized as sets of death and bir...
In this work, we study different approaches to self-supervised pretraini...
In the context of competitive multiplayer games, collusion happens when ...
Bayesian inference allows machine learning models to express uncertainty...
Dimensionality reduction algorithms are standard tools in a researcher's...
Although deep neural networks have achieved great performance on
classif...
Unsupervised Zero-Shot Voice Conversion (VC) aims to modify the speaker
...
Distributed learning paradigms such as federated learning often involve
...
A knowledge graph (KG) is a data structure which represents entities and...
Retrofitting is a technique used to move word vectors closer together or...
We describe Substitutional Neural Image Compression (SNIC), a general
ap...
End-to-end Automatic Speech Recognition (ASR) models are commonly traine...
We revisit the challenging problem of resolving prepositional-phrase (PP...
Over the past decades, progress in deployable autonomous flight systems ...
Reinforcement learning has shown much success in games such as chess,
ba...
Designing effective defense against adversarial attacks is a crucial top...
Recent study of adversarial attacks has revealed the vulnerability of mo...
Despite achieving remarkable success in various domains, recent studies ...
Many common sequential data sources, such as source code and natural
lan...
Deep neural networks (DNNs) are known vulnerable to adversarial attacks....
Motivated by the problem of automated repair of software vulnerabilities...
Thousands of security vulnerabilities are discovered in production softw...