Data is a critical asset in AI, as high-quality datasets can significant...
Similar subtrajectory search is a finer-grained operator that can better...
Diffusion models have emerged as the de-facto technique for image genera...
Offline reinforcement learning (RL) offers an appealing approach to
real...
This paper addresses the blind recovery of the parity check matrix of an...
Rain-by-snow weather removal is a specialized task in weather-degraded i...
Graph data is used in a wide range of applications, while analyzing grap...
Data collection is indispensable for spatial crowdsourcing services, suc...
Programmable Logic Controllers (PLCs) are the core control devices in
In...
One of the key challenges in deploying RL to real-world applications is ...
Federated learning is a distributed learning that allows each client to ...
Nowadays, ridesharing becomes a popular commuting mode. Dynamically arri...
Weighted Majority Voting (WMV) is a well-known optimal decision rule for...
Offline imitation learning (IL) is a powerful method to solve decision-m...
Federated learning (FL) is a collaborative learning paradigm where
parti...
This paper proposes a knowledge-and-data-driven graph neural network-bas...
Listing all k-cliques is a fundamental problem in graph mining, with
app...
Programmable Logic Controllers (PLCs) are responsible for automating pro...
With the development of traffic prediction technology, spatiotemporal
pr...
Fuzzing is one of the prevailing methods for vulnerability detection.
Ho...
Deep learning (DL) models, especially those large-scale and high-perform...
For protecting users' private data, local differential privacy (LDP) has...
In this paper, we study the privacy-preserving task assignment in spatia...
Existing person re-identification (re-id) methods are stuck when deploye...
With the continuous improvement of the performance of object detectors v...
With the rapid development of smart mobile devices, the car-hailing plat...
Distributed deep learning workloads include throughput-intensive trainin...
Recently, there has been a significant growth of interest in applying
so...
Neural backdoors represent one primary threat to the security of deep
le...
Wind power as clean energy has been widely promoted. However, during the...
Mobile-edge computing (MEC) offloads computational tasks from wireless
d...
A flurry of fuzzing tools (fuzzers) have been proposed in the literature...
Envisioned as a promising component of the future wireless Internet-of-T...
We present FastReID, as a widely used object re-identification (re-id)
s...
By allowing users to obscure their transactions via including "mixins" (...
Recent years have seen rapid deployment of mobile computing and Internet...
We advocate that simulation based on offline profiling is a promising
ap...
The advent of Industry 4.0 with massive connectivity places significant
...
The growing momentum of instrumenting the Internet of Things (IoT) with
...
Bandwidth estimation and congestion control for real-time communications...
The Internet of Things (IoT) will be a main data generation infrastructu...
With the proliferation of training data, distributed machine learning (D...
Multi-parameter cognition in a cognitive radio network (CRN) provides a ...
The web bots have been blamed for consuming large amount of Internet tra...
This paper presents a system called NetKernel that decouples the network...
This paper presents a review of the 2018 WIDER Challenge on Face and
Ped...
Spectrum sensing in a large-scale heterogeneous network is very challeng...
We report the first active acoustic side-channel attack. Speakers are us...
The ever-growing interest witnessed in the acquisition and development o...
With the rapid development of crowdsourcing platforms that aggregate the...