High-resolution individual geolocation data passively collected from mobilephones is increasingly sold in private markets and shared with researchers.This data poses significant security,... | Continue reading
The action of the field theory is a generating functional for the equationsof physics. It is introduced axiomatically by the kernel of the evolutionequation. Mathematical consistency requires... | Continue reading
This paper presents the first use of graph neural networks (GNNs) forhigher-order proof search and demonstrates that GNNs can improve uponstate-of-the-art results in this domain. Interactive,... | Continue reading
A major question in philosophy of science involves the unreasonableeffectiveness of mathematics in physics. Why should mathematics, created ordiscovered, with nothing empirical in mind be so... | Continue reading
Convolution is a central operation in Convolutional Neural Networks (CNNs),which applies a kernel or mask to overlapping regions shifted across the image.In this work we show that the underlying... | Continue reading
To generalize to novel visual scenes with new viewpoints and new objectposes, a visual system needs representations of the shapes of the parts of anobject that are invariant to changes in... | Continue reading
Analogies such as man is to king as woman is to X are often used toillustrate the amazing power of word embeddings. Concurrently, they have alsoexposed how strongly human biases are encoded in... | Continue reading
Exploration in reinforcement learning (RL) suffers from the curse ofdimensionality when the state-action space is large. A common practice is toparameterize the high-dimensional value and policy... | Continue reading
We have seen much recent progress in rigid object manipulation, butinteraction with deformable objects has notably lagged behind. Due to the largeconfiguration space of deformable objects,... | Continue reading
In this paper we discuss a leaderless protocol of low communicationalcomplexity which allows a set of nodes to come to a consensus on a value of abit. In addition, we assume that part of the... | Continue reading
Bitcoin is a top-ranked cryptocurrency that has experienced huge growth andsurvived numerous attacks. The protocols making up Bitcoin must thereforeaccommodate the growth of the network and... | Continue reading
Existing methods for AI-generated artworks still struggle with generatinghigh-quality stylized content, where high-level semantics are preserved, orseparating fine-grained styles from various... | Continue reading
We consider the problem of generating plausible and diverse video sequences,when we are only given a start and an end frame. This task is also known asinbetweening, and it belongs to the broader... | Continue reading
SpecFuzz is the first tool that enables dynamic testing for speculativeexecution vulnerabilities (e.g., Spectre). The key is the concept ofspeculation exposure: The program is instrumented to... | Continue reading
Many applications heavily use bitwise operations on large bitvectors as partof their computation. In existing systems, performing such bulk bitwiseoperations requires the processor to transfer a... | Continue reading
The de Bruijn torus (or grid) problem looks to find an $n$-by-$m$ binarymatrix in which every possible $j$-by-$k$ submatrix appears exactly once. Theexistence and construction of these binary... | Continue reading
Space filling curves (SFCs) are widely used in the design of indexes forspatial and temporal data. Clustering is a key metric for an SFC, that measureshow well the curve preserves locality in... | Continue reading
How much can we infer about a person's looks from the way they speak? In thispaper, we study the task of reconstructing a facial image of a person from ashort audio recording of that person... | Continue reading
Browser fingerprinting is a relatively new method of uniquely identifyingbrowsers that can be used to track web users. In some ways it is moreprivacy-threatening than tracking via cookies, as... | Continue reading
How much can we infer about a person's looks from the way they speak? In thispaper, we study the task of reconstructing a facial image of a person from ashort audio recording of that person... | Continue reading
Deep latent variable models have seen recent success in many data domains.Lossless compression is an application of these models which, despite havingthe potential to be highly useful, has yet... | Continue reading
Dark matter direct detection experiments have poor sensitivity to a galacticpopulation of dark matter with mass below the GeV scale. However, such darkmatter can be produced copiously in... | Continue reading
The phase of matter waves depends on proper time and is therefore susceptibleto special-relativistic (kinematic) and gravitational time dilation (redshift).Hence, it is conceivable that atom... | Continue reading
A succinct summary is given of the problem of reconciling observation ofblack hole-like objects with quantum mechanics. If quantum black holes behavelike subsystems, and also decay, their... | Continue reading
We significantly reduce the cost of factoring integers and computing discretelogarithms over finite fields on a quantum computer by combining techniquesfrom Griffiths-Niu 1996, Zalka 2006,... | Continue reading
We address the problem of automatic decompilation, converting a program inlow-level representation back to a higher-level human-readable programminglanguage. The problem of decompilation is... | Continue reading
Unsupervised exploration and representation learning become increasinglyimportant when learning in diverse and sparse environments. Theinformation-theoretic principle of empowerment formalizes... | Continue reading
In this paper, we perform a comprehensive study of 2,470 patched Androidvulnerabilities that we collect from different data sources such as Androidsecurity bulletins, CVEDetails, Qualcomm Code... | Continue reading
The last decade has seen a shift in the computer systems industry whereheterogeneous computing has become prevalent. Nowadays, Graphics ProcessingUnits (GPUs) are in a variety of systems from... | Continue reading
Deep neural networks have obtained astounding successes for important patternrecognition tasks, but they suffer from high computational complexity and thelack of interpretability. The recent... | Continue reading
Several recent works have shown how highly realistic human head images can beobtained by training convolutional neural networks to generate them. In orderto create a personalized talking head... | Continue reading
Out-of-order execution and speculative execution are among the biggestcontributors to performance and efficiency of modern processors. However, theyare inconsiderate, leaking secret data during... | Continue reading
We show that subtle acoustic noises emanating from within computer screenscan be used to detect the content displayed on the screens. This sound can bepicked up by ordinary microphones built... | Continue reading
Neural network based end-to-end text to speech (TTS) has significantlyimproved the quality of synthesized speech. Prominent methods (e.g., Tacotron2) usually first generate mel-spectrogram from... | Continue reading
We present a signal representation framework called the sparse manifoldtransform that combines key ideas from sparse coding, manifold learning, andslow feature analysis. It turns non-linear... | Continue reading
Robust Markov Decision Processes (RMDPs) intend to ensure robustness withrespect to changing or adversarial system behavior. In this framework,transitions are modeled as arbitrary elements of a... | Continue reading
We present a PaperRobot who performs as an automatic research assistant by(1) conducting deep understanding of a large collection of human-written papersin a target domain and constructing... | Continue reading
The sequence-to-sequence (seq2seq) model for neural machine translation hassignificantly improved the accuracy of language translation. There have beennew efforts to use this seq2seq model for... | Continue reading
The integration of Artificial Intelligence (AI) into weapon systems is one ofthe most consequential tactical and strategic decisions in the history ofwarfare. Current AI development is a... | Continue reading
Compressed sensing (CS) provides an elegant framework for recovering sparsesignals from compressed measurements. For example, CS can exploit the structureof natural images and recover an image... | Continue reading
Comparative graph and network analysis play an important role in both systemsbiology and pattern recognition, but existing surveys on the topic havehistorically ignored or underserved one or the... | Continue reading
Decompressing a file made by the gzip program at an arbitrary location is inprinciple impossible, due to the nature of the DEFLATE compression algorithm.Consequently, no existing program can... | Continue reading
Advanced attack campaigns span across multiple stages and stay stealthy forlong time periods. There is a growing trend of attackers using off-the-shelftools and pre-installed system applications... | Continue reading
Person re-identification (re-id) remains challenging due to significantintra-class variations across different cameras. Recently, there has been agrowing interest in using generative models to... | Continue reading
Image feature extraction and matching is a fundamental but computationintensive task in machine vision. This paper proposes a novel FPGA-basedembedded system to accelerate feature extraction and... | Continue reading
The proliferation of networked devices, systems, and applications that wedepend on every day makes managing networks more important than ever. Theincreasing security, availability, and... | Continue reading
At a given moment, the state of the hypothetical quantum computer with Nqubits is characterized by 2^N quantum amplitudes, which are complex continuousvariables restricted by the normalization... | Continue reading
There have been multiple recent proposals on using deep neural networks forcode search using natural language. Common across these proposals is the ideaof $\mathit{embedding}$ code and natural... | Continue reading