Nowadays, IoT devices integrate a wealth of third-party components (TPCs...
Backdoor attacks have emerged as an urgent threat to Deep Neural Network...
Dense retrieval is widely used for entity linking to retrieve entities f...
Relational databases play an important role in this Big Data era. Howeve...
The pull-based development is widely adopted in modern open-source softw...
Comments play an important role in updating Stack Overflow (SO) posts. T...
Software and systems traceability is essential for downstream tasks such...
Voice Personal Assistants (VPA) have become a common household appliance...
Data collection through the Internet of Things (IoT) devices, or smart
d...
With the significant development of the Internet of Things and low-cost ...
Machine learning (ML)-based methods have recently become attractive for
...
Currently, the development of IoT firmware heavily depends on third-part...
Privacy policies provide individuals with information about their rights...
Weakly-supervised text classification aims to train a classifier using o...
Facilitated by messaging protocols (MP), many home devices are connected...
To make the earlier medical intervention of infants' cerebral palsy (CP)...
Contrastive representation learning has gained much attention due to its...
We present a robust visual-inertial SLAM system that combines the benefi...
In this paper, we deal with the problem of monocular depth estimation fo...
Prior studies in privacy policies frame the question answering (QA) task...
Self-admitted technical debt (SATD) refers to technical debt that is
int...
Most video understanding methods are learned on high-quality videos. How...
Prescribing optimal operation based on the condition of the system and,
...
Algorithmic decisions made by machine learning models in high-stakes dom...
Since GDPR came into force in May 2018, companies have worked on their d...
The explosive increase of multimodal data makes a great demand in many
c...
Bicubic downscaling is a prevalent technique used to reduce the video st...
Efficiently modeling spatial-temporal information in videos is crucial f...
User engagement is crucial to the long-term success of a mobile app. Sev...
Camera scene detection is among the most popular computer vision problem...
We introduce CryptGPU, a system for privacy-preserving machine learning ...
With the rapid growth of online services, the number of online accounts
...
With the widespread deployment of large-scale prediction systems in
high...
We study the problem of incorporating prior knowledge into a deep
Transf...
Due to its distributed methodology alongside its privacy-preserving feat...
Robots assist in many areas that are considered unsafe for humans to ope...
Many households include children who use voice personal assistants (VPA)...
Data heterogeneity has been identified as one of the key features in
fed...
Understanding privacy policies is crucial for users as it empowers them ...
Lithium-Ion (Li-I) batteries have recently become pervasive and are used...
Reinforcement learning (RL) is promising for complicated stochastic nonl...
Privacy policy documents are long and verbose. A question answering (QA)...
Text-based person re-identification(Re-id) is an important task in video...
REpresentational State Transfer (REST) is considered as one standard sof...
Previous video modeling methods leverage the cubic 3D convolution filter...
In this paper, we introduce a new reinforcement learning (RL) based neur...
Machine learning systems that rely on training data collected from untru...
The dynamic, real-time, and accurate inference of model parameters from
...
The max-stable process is an asymptotically justified model for spatial
...
Robotic automation has the potential to assist human surgeons in perform...