Boundary Optimizing Network (BON)
Stable Marriage with Multi-Modal Preferences
Sequential Preference-Based Optimization
Lifelong Learning for Sentiment Classification
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
Convexification of Neural Graph
Denotation Extraction for Interactive Learning in Dialogue Systems
An efficient K -means clustering algorithm for massive data
On variance estimation for Bayesian variable selection
• Classical Discrete Time Crystals
• Exploiting random lead times for significant inventory cost savings
• Towards General Distributed Resource Selection
• Quiddity sequences for $\mathrm{SL}_3$-frieze patterns
• Evorus: A Crowd-powered Conversational Assistant Built to Automate Itself Over Time
• Violable Contracts and Governance for Blockchain Applications
• A Unified Enumeration of 1-dimension Garden Algebras and Valise Adinkras
• Graph-Based Radio Resource Management for Vehicular Networks
• Generative Sensing: Transforming Unreliable Sensor Data for Reliable Recognition
• Towards Multi-Object Detection and Tracking in Urban Scenario under Uncertainties
• Term Relevance Feedback for Contextual Named Entity Retrieval
• Joint Resource Allocation and Antenna Selection In the Uplink of OFDMA Networks
• Traveling salesman problem across dense cities
• Minimum spanning trees across dense cities
• Mass-structure of weighted real trees
• Novel Impossibility Results for Group-Testing
• Modeling urbanization patterns with generative adversarial networks
• Duality of Channel Encoding and Decoding – Part II: Rate-1 Non-binary Convolutional Codes
• End-to-end detection-segmentation network with ROI convolution
• Near Maximum Likelihood Decoding with Deep Learning
• Brain MRI Super Resolution Using 3D Deep Densely Connected Neural Networks
• Data Augmentation for Brain-Computer Interfaces: Analysis on Event-Related Potentials Data
• Gradient Method in Hilbert-Besov Spaces for the Optimal Control of Parabolic Free Boundary Problems
• Modeling sepsis progression using hidden Markov models
• Enhancing Performance of Random Caching in Large-Scale Wireless Networks with Multiple Receive Antennas
• Improved Capacity Upper Bounds for the Discrete-Time Poisson Channel
• Fusion of ANN and SVM Classifiers for Network Attack Detection
• Semiconservative random walks in weak sense
• Equilibrium problems on Riemannian manifolds with applications
• SketchyGAN: Towards Diverse and Realistic Sketch to Image Synthesis
• Compressing Deep Neural Networks: A New Hashing Pipeline Using Kac’s Random Walk Matrices
• TextBoxes++: A Single-Shot Oriented Scene Text Detector
• GIFT: Guided and Interpretable Factorization for Tensors – An Application to Large-Scale Multi-platform Cancer Analysis
• Role of short-range order in manipulating light absorption in disordered media
• Practical Quantum Appointment Scheduling
• Restricted sum formula for finite and symmetric multiple zeta values
• Adversarial Spheres
• Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
• Minimum Throughput Maximization in UAV-Aided Wireless Powered Communication Networks
• UAV-Aided Wireless Communication Designs With Propulsion Energy Limitations
• Dynamic Pricing and Energy Management Strategy for EV Charging Stations under Uncertainties
• Spectral Radius of $\{0, 1\}$-Tensor with Prescribed Number of Ones
• Better and Simpler Error Analysis of the Sinkhorn-Knopp Algorithm for Matrix Scaling
• Balanced Truncation Model Reduction of a Nonlinear Cable-Mass PDE System with Interior Damping
• Tight Bounds on the Round Complexity of the Distributed Maximum Coverage Problem
• Dendritic-Inspired Processing Enables Bio-Plausible STDP in Compound Binary Synapses
• Aviation Time Minimization of UAV for Data Collection over Wireless Sensor Networks
• Recoverability for Holevo’s just-as-good fidelity
• DeepTraffic: Driving Fast through Dense Traffic with Deep Reinforcement Learning
• Unifying particle-based and continuum models of hillslope evolution with a probabilistic scaling technique
• Adaptive Boolean Monotonicity Testing in Total Influence Time
• Test Error Estimation after Model Selection Using Validation Error
• k-connectivity of Random Graphs and Random Geometric Graphs in Node Fault Model
• Novel Methods for Enhancing the Performance of Genetic Algorithms
• Beam domain secure transmission for massive MIMO communications
• Biomedical Question Answering via Weighted Neural Network Passage Retrieval
• Data assimilation and parameter estimation for a multiscale stochastic system with alpha-stable Levy noise
• Partial regularity for solutions to subelliptic eikonal equations
• Distributed Deep Reinforcement Learning: Learn how to play Atari games in 21 minutes
• Chemical order in Ge-Ga-Sb-Se glasses
• Scalable high-resolution forecasting of sparse spatiotemporal events with kernel methods: a winning solution to the NIJ ‘Real-Time Crime Forecasting Challenge’
• Channel Estimation with Systematic Polar Codes
• Linear Codes for Broadcasting with Noisy Side Information
• Uniform decomposition of probability measures: quantization, classification, rate of convergence
• Multi-Terminal Codes Using Constrained-Random-Number Generators
• Generalized Fano-Type Inequality for Countably Infinite Systems with List-Decoding
• Analysis of Massive MIMO and Base Station Cooperation in an Indoor Scenario
• Symbol-by-Symbol Maximum Likelihood Detection for Cooperative Molecular Communication
• CANDY: Conditional Adversarial Networks based Fully End-to-End System for Single Image Haze Removal
• What did Ryser Conjecture?
• Spatial Lattice Modulation for MIMO Systems
• 99\% Revenue via Enhanced Competition
• A Stitch in Time Saves Nine — SPARQL querying of Property Graphs using Gremlin Traversals
• The DMT classification of real and quaternionic lattice codes
• Data Augmentation by Pairing Samples for Images Classification
• An Improved Analysis of Least Squares Superposition Codes with Bernoulli Dictionary
• Deep Gaussian Processes with Decoupled Inducing Inputs
• Penultimate modeling of spatial extremes: statistical inference for max-infinitely divisible processes
• Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
• A method for Bayesian regression modelling of composition data
• Bayesian Fitting of Dirichlet Type I and II Distributions
• Quasi-shuffle algebras and renormalisation of rough differential equations
• Asynchronous distributed algorithm for seeking generalized Nash equilibria
• The set of vertices with positive curvature in a planar graph with nonnegative curvature
• Global fluctuations for 1D log-gas dynamics. (2) Covariance kernel and support
• Search on Secondary Attributes in Geo-Distributed Systems
• Power spectral density of a single Brownian trajectory: What one can and cannot learn from it
• Ascents in Non-Negative Lattice Paths
• Exact asymptotics for a multi-timescale model
• Inverse images of stable Lévy processes
• Development of a spectral source inverse model by using generalized polynomial chaos
• Nonconvex Lagrangian-Based Optimization: Monitoring Schemes and Global Convergence
• Energy and Air Quality Management in a Subway Station using Stochastic Dynamic Optimization
• Pattern selection in a ring of Kuramoto oscillators
• Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention
• EBIC: an artificial intelligence-based parallel biclustering algorithm for pattern discovery
• Placement Delivery Array Design for Combination Networks with Edge Caching
• Meta-Tracker: Fast and Robust Online Adaptation for Visual Object Trackers
• Sales forecasting and risk management under uncertainty in the media industry
• Deconvolving RNA Base Pairing Signals
• Probabilistic Prognostic Estimates of Survival in Metastatic Cancer Patients (PPES-Met) Utilizing Free-Text Clinical Narratives
• Characterizing Granular Networks Using Topological Metrics
• Secure Communication over 1-2-1 Networks
• Verticalization of bacterial biofilms
• Multi-threaded Sparse Matrix-Matrix Multiplication for Many-Core and GPU Architectures
• Capacity Results for Finite-Field X-Channels with Delayed CSIT
• A one-phase interior point method for nonconvex optimization
• Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints
• Quadrature Compound: An approximating family of distributions