Deep neural networks have been widely used in various downstream tasks,
...
Hyperspectral images (HSI) captured from earth observing satellites and
...
Deep neural networks (DNNs) have a wide range of applications in the fie...
LiDAR and Radar are two complementary sensing approaches in that LiDAR
s...
We present a novel learning method to predict the cloth deformation for
...
The inability to guarantee robustness is one of the major obstacles to t...
Recently, it has become popular to deploy sensors such as LiDARs on the
...
As an effective method to deliver external materials into biological cel...
Large-scale Transformer models bring significant improvements for variou...
Stochastic differential equations play an important role in various
appl...
This paper studies the sensitivity analysis of mass-action systems again...
Automated region of interest detection in histopathological image analys...
Adversarial Examples Detection (AED) is a crucial defense technique agai...
The firing dynamics of biological neurons in mathematical models is ofte...
Free monads (and their variants) have become a popular general-purpose t...
The demand for data analytics has been consistently increasing in the pa...
The shared space design is applied in urban streets to support barrier-f...
We have witnessed a boosted demand for graph analytics at Twitter in rec...
With the advent of the Big Data era, it is usually computationally expen...
The convex minimization of
f(𝐱)+g(𝐱)+h(𝐀𝐱) over ℝ^n with
differentiable ...
We present a novel mesh-based learning approach (N-Cloth) for plausible ...
Despite the efficiency and scalability of machine learning systems, rece...
Decentralized optimization and communication compression have exhibited ...
Communication cost is one major bottleneck for the scalability for
distr...
As cameras are increasingly deployed in new application domains such as
...
There is still a long way to go before artificial mini robots are really...
In this paper, we propose a new framework to detect adversarial examples...
Lazy evaluation is a powerful tool for functional programmers. It enable...
This paper studies computational methods for quasi-stationary distributi...
The time evolution of the probability distribution of a stochastic
diffe...
In this work, we propose an interactive system to design diverse high-qu...
Communication compression has been extensively adopted to speed up
large...
Naloxone, an opioid antagonist, has been widely used to save lives from
...
This paper presents a new fractional-order normalized Bouc-Wen (BW) (FON...
We analyze ecological systems that are influenced by random environmenta...
A probabilistic approach of computing geometric rate of convergence of
s...
A probabilistic approach for estimating sample qualities for stochastic
...
If a code base is so big and complicated that complete mechanical
verifi...
Large-scale machine learning models are often trained by parallel stocha...
As a general-purpose generative model architecture, VAE has been widely ...
Decentralized algorithms solve multi-agent problems over a connected net...
We present the first formal verification of a networked server implement...
Recent studies have demonstrated the vulnerability of deep convolutional...
Over the past decade, many Super Resolution techniques have been develop...
We present a new algorithm to train a robust neural network against
adve...
In this paper, a novel deep-learning based framework is proposed to infe...
Good tools can bring mechanical verification to programs written in
main...
Reusable model design becomes desirable with the rapid expansion of mach...
Recognizing the identities of people in everyday photos is still a very
...
Large-scale datasets have driven the rapid development of deep neural
ne...