Due to the unstructuredness and the lack of schemas of graphs, such as
k...
We study the election control problem with multi-votes, where each voter...
Blockchain systems suffer from high storage costs as every node needs to...
Out-of-distribution (OOD) detection is an indispensable aspect of secure...
This discussion was conducted at a recent panel at the 28th Internationa...
Privacy and security concerns in real-world applications have led to the...
This report presents a comprehensive view of our vision on the developme...
Time series shapelets are discriminative subsequences that have been rec...
Given a directed graph G and integers k and l, a D-core is the maximal
s...
In ordinary distillation, student networks are trained with soft labels ...
Proof-of-Work (PoW) is the most widely adopted incentive model in curren...
The coronavirus disease 2019 (COVID-19) pandemic has caused an unprecede...
Mobile app markets are emerging with the popularity of smartphones. Howe...
Interactive graph search leverages human intelligence to categorize targ...
Graphs have been widely used to represent complex data in many applicati...
Data summarization that presents a small subset of a dataset to users ha...
Social decisions made by individuals are easily influenced by informatio...
Modern Blockchains support the execution of user programs, called smart
...
Community search that finds query-dependent communities has been studied...
The problem of structural diversity search is to nd the top-k vertices w...
Authenticated data storage on an untrusted platform is an important comp...
This work presents ContractChecker, a Blockchain-based security protocol...
Blockchains have recently been under the spotlight due to the boom of
cr...
In many online social networks (e.g., Facebook, Google+, Twitter, and
In...
Active Learning (AL) requires learners to retrain the classifier with th...
Modern DRAM architectures allow a number of low-power states on individu...