While awareness has been recently raised on Ethereum mempool security, t...
The extraction of lakes from remote sensing images is a complex challeng...
The integration of different modalities, such as audio and visual
inform...
This paper summarizes the cinematic demixing (CDX) track of the Sound
De...
Optical satellite images are a critical data source; however, cloud cove...
Lake extraction from remote sensing imagery is challenging due to the co...
Camouflaged object detection (COD) is the challenging task of identifyin...
Source-free domain adaptation (SFDA) aims to adapt a well-trained source...
This paper reports on the NTIRE 2023 Quality Assessment of Video Enhance...
As part of the data-driven paradigm and open science movement, the data ...
Under the data-driven research paradigm, research software has come to p...
Unpaired Medical Image Enhancement (UMIE) aims to transform a low-qualit...
In recent years, ubiquitous semantic Metaverse has been studied to
revol...
Autonomous driving technology has five levels, from L0 to L5. Currently,...
This paper presents a large-scale analysis of two prevalent cryptocurren...
We propose Audio-Visual Lightweight ITerative model (AVLIT), an effectiv...
Retrieval-based language models (LMs) have demonstrated improved
interpr...
As language models increase in size by the day, methods for efficient
in...
Weakly-Supervised Concealed Object Segmentation (WSCOS) aims to segment
...
Diffusion probabilistic models have achieved enormous success in the fie...
Semi-Supervised Domain Adaptation (SSDA) is a recently emerging research...
Satellite imagery analysis plays a vital role in remote sensing, but the...
Conditional image-to-video (cI2V) generation aims to synthesize a new
pl...
Recent work shows the effectiveness of Machine Learning (ML) to reduce c...
In the surface defect detection, there are some suspicious regions that
...
Source-free object detection (SFOD) aims to transfer a detector pre-trai...
Intel SGX is known to be vulnerable to a class of practical attacks
expl...
Audio-visual approaches involving visual inputs have laid the foundation...
Neural Radiance Fields (NeRFs) encode the radiance in a scene parameteri...
The ongoing amalgamation of UAV and ML techniques is creating a signific...
Deep neural networks have shown excellent prospects in speech separation...
In scientific research, the method is an indispensable means to solve
sc...
In recent years, the Internet of Things (IoT) is studied in the context ...
This paper is concerned with the inverse problem of scattering of
time-h...
With the explosive growth of mobile data, the demand of high-speed railw...
In the last few years, there have been many new developments and signifi...
Most of the recent neural source separation systems rely on a masking-ba...
While the performance of offline neural speech separation systems has be...
Mobile communication standards were developed for enhancing transmission...
Federated learning allows distributed users to collaboratively train a m...
We study few-shot debugging of transformer based natural language
unders...
Although progress has been made for text-to-image synthesis, previous me...
As the importance of research data gradually grows in sciences, data sha...
Federated learning (FL) has been increasingly considered to preserve dat...
Nearest Neighbor Search (NNS) has recently drawn a rapid increase of int...
Recent advances in the design of neural network architectures, in partic...
Gradient inversion attack (or input recovery from gradient) is an emergi...
Ethereum relies on a peer-to-peer overlay network to propagate informati...
Pixel-wise crack detection is a challenging task because of poor continu...
Data auditing is a process to verify whether certain data have been remo...