Industrial Time-Sensitive Networking (TSN) provides deterministic mechan...
Dynamic searchable symmetric encryption (DSSE) enables a server to
effic...
Numerous studies have underscored the significant privacy risks associat...
Diffusion models have showcased their remarkable capability to synthesiz...
Feature selection (FS) plays an important role in machine learning, whic...
This paper investigates the differences in data organization between
con...
Fault localization (FL) analyzes the execution information of a test sui...
Graphic sketch representations are effective for representing sketches.
...
Performing neural network inference on encrypted data without decryption...
The resilience of a voting system has been a central topic in computatio...
When changing code, developers sometimes neglect updating the related
co...
Prompt-based learning paradigm bridges the gap between pre-training and
...
The Internet is the most complex machine humankind has ever built, and h...
Semantic face editing has achieved substantial progress in recent years....
As robots play an increasingly important role in the industrial, the
exp...
In Machine Learning, the emergence of the right to be forgotten gave
bir...
Current face recognition tasks are usually carried out on high-quality f...
Machine learning (ML) methods are ubiquitous in wireless communication
s...
Rain streaks bring serious blurring and visual quality degradation, whic...
Most adversarial attack methods on text classification are designed to c...
Many modern IoT applications rely on the Constrained Application Protoco...
API recommendation in real-time is challenging for dynamic languages lik...
This paper presents EDSC, a novel smart contract platform design based o...
Most adversarial attack methods that are designed to deceive a text
clas...
Automated machine learning (AutoML) is essentially automating the proces...
Deep Neural Networks (DNNs) are being used in various daily tasks such a...
The bribery problem in election has received considerable attention in t...
Code documentations are essential for software quality assurance, but du...
We present a self-learning approach that combines deep reinforcement lea...
In this paper, we propose a new variant of Linear Discriminant Analysis ...
Three-dimensional late gadolinium enhanced (LGE) cardiac MR (CMR) of lef...
Recent advances in the blockchain research have been made in two importa...
Bitcoin brings a new type of digital currency that does not rely on a ce...
The goal of video watermarking is to embed a message within a video file...
Searchable symmetric encryption (SSE) for multi-owner model draws much
a...
With the rapid development of cloud computing, searchable encryption for...
Modeling the probability distribution of rows in tabular data and genera...
Most automation in machine learning focuses on model selection and hyper...
Proposed in 1991, Least Mean Square Error Reconstruction for self-organi...
Image steganography is a procedure for hiding messages inside pictures. ...
We propose a planning-based method to teach an agent to manage portfolio...
Generative adversarial networks (GANs) implicitly learn the probability
...
Neural style transfer has been demonstrated to be powerful in creating
a...
Public blockchains provide a decentralized method for storing transactio...
Bribery in election (or computational social choice in general) is an
im...
A physical unclonable function (PUF) generates hardware intrinsic volati...
The physical unclonable function (PUF), alike fingerprint of human being...
We consider the 4-block n-fold integer programming (IP), in which the
co...
In this paper, we propose a new variant of Linear Discriminant Analysis ...
Sketch is an important media for human to communicate ideas, which refle...