Voucher abuse detection is an important anomaly detection problem in
E-c...
Quantifying patterns in visual or tactile textures provides important
in...
Surface texture influences wear and tribological properties of manufactu...
Surface roughness and texture are critical to the functional performance...
Due to the vulnerability of deep neural networks (DNNs) to adversarial
e...
Domain shift happens in cross-domain scenarios commonly because of the w...
Mining dense subgraphs where vertices connect closely with each other is...
With the rising demand of smart mobility, ride-hailing service is gettin...
Random projections reduce the dimension of a set of vectors while preser...
DRAM Main memory is a performance bottleneck for many applications due t...
Primary angle closure glaucoma (PACG) is the leading cause of irreversib...
Blockchain is one of the most heavily invested technologies in recent ye...
Though generative adversarial networks (GANs) areprominent models to gen...
Real-world clinical time series data sets exhibit a high prevalence of
m...
This paper describes a new algorithm for computing a low-Tucker-rank
app...
A common concern with Bayesian methodology in scientific contexts is tha...
This work builds the connection between the regularity theory of optimal...
Variational Auto-Encoders enforce their learned intermediate latent-spac...