Multimodal contrastive learning aims to train a general-purpose feature
...
Federated learning (FL) is a nascent distributed learning paradigm
to tr...
Self-supervised learning usually uses a large amount of unlabeled data t...
Adversarial examples (AEs) for DNNs have been shown to be transferable: ...
Optimal margin Distribution Machine (ODM) is a newly proposed statistica...
Deep neural networks are proven to be vulnerable to backdoor attacks.
De...
Existing temporal community search suffers from two defects: (i) they ig...
Point cloud completion, as the upstream procedure of 3D recognition and
...
The attention mechanism requires huge computational efforts to process
u...
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) mod...
Due to its powerful feature learning capability and high efficiency, dee...
Federated learning (FL) enables multiple clients to collaboratively trai...
The emerging Graph Convolutional Network (GCN) has now been widely used ...
While deep face recognition (FR) systems have shown amazing performance ...
Recently, many pre-trained language models for source code have been pro...
Binary-source code matching plays an important role in many security and...
Nowadays many cities around the world have introduced electric buses to
...
The underlying assumption of recent federated learning (FL) paradigms is...
User interest exploration is an important and challenging topic in
recom...
Automatically detecting software vulnerabilities in source code is an
im...
Due to its open-source nature, Android operating system has been the mai...
Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from...
High Bandwidth Memory (HBM) provides massive aggregated memory bandwidth...
For many data mining and machine learning tasks, the quality of a simila...
We present NaturalCC, an efficient and extensible toolkit to bridge the ...
Plenty of research efforts have been devoted to FPGA-based acceleration,...
Non-Volatile Main Memories (NVMMs) have recently emerged as promising
te...
Automatically detecting software vulnerabilities is an important problem...
Fine-grained software vulnerability detection is an important and challe...
Graph is a well known data structure to represent the associated
relatio...
Currently, Burst buffer has been proposed to manage the SSD buffering of...
The detection of software vulnerabilities (or vulnerabilities for short)...
MapReduce is a popular programming model and an associated implementatio...
The automatic detection of software vulnerabilities is an important rese...
The Cloud computing paradigm has revolutionized the computer science hor...