Large language models (LLMs) have demonstrated exceptional performance a...
In 2013, Marcus, Spielman, and Srivastava resolved the famous Kadison-Si...
Matrix sensing has many real-world applications in science and engineeri...
In last decades, legal case search has received more and more attention....
This work studies training one-hidden-layer overparameterized ReLU netwo...
Over the last decade, deep neural networks have transformed our society,...
We study the problem of interpolating a noisy Fourier-sparse signal in t...
Given a convex function fℝ^d→ℝ, the problem of
sampling from a distribut...
We initiate the study of quantum algorithms for optimizing approximately...
In the Distance Oracle problem, the goal is to preprocess n vectors x_1,...
We revisit the classical problem of band-limited signal reconstruction –...
Fast mixing of random walks on hypergraphs has led to myriad breakthroug...
The Fast Gaussian Transform (FGT) enables subquadratic-time multiplicati...
We consider the problem of training a multi-layer over-parametrized neur...
Deep neural networks have achieved impressive performance in many areas....
In this work, we initiate the study of the Minimum Circuit Size Problem
...
In this work we examine the security of InstaHide, a recently proposed s...
Inspired by InstaHide challenge [Huang, Song, Li and Arora'20], [Chen, S...
Chernoff bound is a fundamental tool in theoretical computer science. It...
Quantum copy-protection is an innovative idea that uses the no-cloning
p...
The closest pair problem is a fundamental problem of computational geome...
User interaction behavior is a valuable source of implicit relevance
fee...