Dominant Person Search methods aim to localize and recognize query perso...
Point cloud analysis (such as 3D segmentation and detection) is a challe...
As malicious actors employ increasingly advanced and widespread bots to
...
Conversational emotion recognition (CER) is an important research topic ...
Model substructure learning aims to find an invariant network substructu...
Online movie review platforms are providing crowdsourced feedback for th...
Despite the success of multimodal learning in cross-modal retrieval task...
Mini-app is an emerging form of mobile application that combines web
tec...
Few-shot learning (FSL), which aims to classify unseen classes with few
...
Generalized Category Discovery (GCD) aims to recognize both known and no...
Modeling the ideological perspectives of political actors is an essentia...
Novel category discovery aims at adapting models trained on known catego...
Current Graph Neural Networks (GNNs) suffer from the over-smoothing prob...
Twitter bot detection is an important and meaningful task. Existing
text...
Graph anomaly detection on attributed networks has become a prevalent
re...
Knowledge Graph Embeddings (KGE) aim to map entities and relations to lo...
Twitter bot detection has become an increasingly important task to comba...
Due to the superior performance of Graph Neural Networks (GNNs) in vario...
Recently, video recognition is emerging with the help of multi-modal
lea...
Recently, weakly supervised person search is proposed to discard
human-a...
Recent studies have shown that GNNs are vulnerable to adversarial attack...
The recently developed matrix based Renyi's entropy enables measurement ...
Graph convolutional networks (GCNs) have been widely adopted for graph
r...
Political stance detection has become an important task due to the
incre...
Identifying political perspective in news media has become an important ...
A predicate head is a verbal expression that plays a role as the structu...
Software reuse, especially partial reuse, poses legal and security threa...
Entity alignment (EA) aims to discover the equivalent entities in differ...
Recognizing named entities (NEs) is commonly conducted as a classificati...
Textbook Question Answering (TQA) is a task that one should answer a
dia...
Software vulnerabilities are now reported at an unprecedented speed due ...
Linear discriminant analysis (LDA) is a popular technique to learn the m...
Tax evasion is a serious economic problem for many countries, as it can
...
Knowledge transfer from a source domain to a different but semantically
...
Recent studies have shown that graph convolution networks (GCNs) are
vul...
To take full advantage of fast-growing unlabeled networked data, this pa...
The richness in the content of various information networks such as soci...
While the security of the cloud remains a concern, a common practice is ...
With the rapid growth of knowledge, it shows a steady trend of knowledge...
Cognitive and metacognitive strategy had demonstrated a significant role...
The heterogeneity-gap between different modalities brings a significant
...