Deep learning is the mainstream technique for many machine learning tasks,including image recognition, machine translation, speech recognition, and soon. It has outperformed conventional methods... | Continue reading
In the last two decades, the field of neutrino physics has made enormousprogress in measuring the strength and frequency of neutrino and antineutrinooscillations. Along the way, there have been... | Continue reading
Deep neural networks have proven to be particularly effective in visual andaudio recognition tasks. Existing models tend to be computationally expensiveand memory intensive, however, and so... | Continue reading
One of the key points in music recommendation is authoring engaging playlistsaccording to sentiment and emotions. While previous works were mostly based onaudio for music discovery and playlists... | Continue reading
The proliferation of fake news on social media has opened up new directionsof research for timely identification and containment of fake news, andmitigation of its widespread impact on public... | Continue reading
Computer graphics, 3D computer vision and robotics communities have producedmultiple approaches to representing 3D geometry for rendering andreconstruction. These provide trade-offs across... | Continue reading
We present consistent optimization for single stage object detection.Previous works of single stage object detectors usually rely on the regular,dense sampled anchors to generate hypothesis for... | Continue reading
In recent years, deep learning has been a revolution in the field of machinelearning, for computer vision in particular. In this approach, a deep(multilayer) artificial neural network (ANN) is... | Continue reading
UMAP (Uniform Manifold Approximation and Projection) is a novel manifoldlearning technique for dimension reduction. UMAP is constructed from atheoretical framework based in Riemannian geometry... | Continue reading
The first six months of 2018 have seen cryptocurrency thefts of $761 million,and the technology is also the latest and greatest tool for money laundering.This increase in crime has caused both... | Continue reading
A significant amount of both client and server-side cryptography isimplemented in JavaScript. Despite widespread concerns about its security, noother language has been able to match the... | Continue reading
Deep Convolutional Neural Networks (CNNs) are a special type of NeuralNetworks, which have shown state-of-the-art results on various competitivebenchmarks. The powerful learning ability of deep... | Continue reading
Separation kernels provide temporal/spatial separation and controlledinformation flow to their hosted applications. They are introduced to decouplethe analysis of applications in partitions from... | Continue reading
Edges, boundaries and contours are important subjects of study in bothcomputer graphics and computer vision. On one hand, they are the 2D elementsthat convey 3D shapes, on the other hand, they... | Continue reading
Recurrent neural networks (RNNs) are powerful architectures to modelsequential data, due to their capability to learn short and long-termdependencies between the basic elements of a sequence.... | Continue reading
APRS technology is still exists and still developing among amateur radio.However, in Indonesia there are still not many people who use and utilize APRS.The high price of APRS modem and... | Continue reading
We comment on a recent paper that connects certain forms of machine learningto Set Theory. We point out that part of the set-theoretic machinery is related to a resultof Kuratowski about... | Continue reading
Online trolling has raised serious concerns about manipulating public opinionand exacerbating political divides among social media users. In this work, weanalyse the role and behaviour of... | Continue reading
Machine learning (ML) models may be deemed confidential due to theirsensitive training data, commercial value, or use in security applications.Increasingly often, confidential ML models are... | Continue reading
Blockchain in supply chain management is expected to boom over the next fiveyears. It is estimated that the global blockchain supply chain market wouldgrow at a compound annual growth rate of... | Continue reading
Machine learning techniques have deeply rooted in our everyday life. However,since it is knowledge- and labor-intensive to pursue good learning performance,human experts are heavily involved in... | Continue reading
Dynamic Programming Languages are quite popular because they increase theprogrammer's productivity. However, the absence of types in the source codemakes the program written in these languages... | Continue reading
Einstein gravitation is known to give rise to the formation of singularitiesat high densities unless the dominant energy condition is made invalid by theoccurrence of new physics: we show that... | Continue reading
This paper surveys the machine learning literature and presents machinelearning as optimization models. Such models can benefit from the advancementof numerical optimization techniques which... | Continue reading
Ocean worlds are prevalent in the solar system. Focusing on Enceladus, Titan,Europa, and Ganymede, I use rotating convection theory and numericalsimulations to predict ocean currents and the... | Continue reading
Microarchitectural side channels expose unprotected software to informationleakage attacks where a software adversary is able to track runtime behavior ofa benign process and steal secrets such... | Continue reading
We introduce Bug-Injector, a system that automatically creates benchmarks forcustomized evaluation of static analysis tools. We share a benchmark generatedusing Bug-Injector and illustrate its... | Continue reading
Illicit crypto-mining leverages resources stolen from victims to minecryptocurrencies on behalf of criminals. While recent works have analyzed oneside of this threat, i.e.: web-browser... | Continue reading
The analysis of natural disaster-related multimedia content got greatattention in recent years. Being one of the most important sources ofinformation, social media have been crawled over the... | Continue reading
In this work we show that Tor is vulnerable to app deanonymization attacks onAndroid devices through network traffic analysis. For this purpose, we describea general methodology for performing... | Continue reading
Recommender systems are software tools used to generate and providesuggestions for items and other entities to the users by exploiting variousstrategies. Hybrid recommender systems combine two... | Continue reading
Anomaly detection is an important problem that has been well-studied withindiverse research areas and application domains. The aim of this survey istwo-fold, firstly we present a structured and... | Continue reading
A Wikipedia book (known as Wikibook) is a collection of Wikipedia articles ona particular theme that is organized as a book. We propose Wikibook-Bot, amachine-learning based technique for... | Continue reading
Building open domain conversational systems that allow users to have engagingconversations on topics of their choice is a challenging task. Alexa Prize waslaunched in 2016 to tackle the problem... | Continue reading
The ZX-calculus is a graphical calculus for reasoning about quantum systemsand processes. It is known to be universal for pure state qubit quantummechanics, meaning any pure state, unitary... | Continue reading
The centerpiece objective of the NASA New Horizons first Kuiper ExtendedMission (KEM-1) was the close flyby of the Kuiper Belt Object KBO) 2014 MU69,nicknamed Ultima Thule. On 1 Jan 2019 this... | Continue reading
In this paper we presented a novel constructive approach for training deepneural networks using geometric approaches. We show that a topological coveringcan be used to define a class of... | Continue reading
The field of partial differential equations (PDEs) is vast in size anddiversity. The basic reason for this is that essentially all fundamental lawsof physics are formulated in terms of PDEs. In... | Continue reading
Fake news detection is a critical yet challenging problem in Natural LanguageProcessing (NLP). The rapid rise of social networking platforms has not onlyyielded a vast increase in information... | Continue reading
The explosive growth in fake news and its erosion to democracy, justice, andpublic trust has increased the demand for fake news analysis, detection andintervention. This survey comprehensively... | Continue reading
We address the problem of unsupervised disentanglement of latentrepresentations learnt via deep generative models. In contrast to currentapproaches that operate on the evidence lower bound... | Continue reading
Artificial Neural Networks are connectionist systems that perform a giventask by learning on examples without having prior knowledge about the task.This is done by finding an optimal point... | Continue reading
Android is the predominant mobile operating system for the past few years.The prevalence of devices that can be powered by Android magnetized not merelyapplication developers but also malware... | Continue reading
This is a recollection of the UC Berkeley Postgres project, which was led byMike Stonebraker from the mid-1980's to the mid-1990's. The article wassolicited for Stonebraker's Turing Award book,... | Continue reading
Deep learning solutions are being increasingly used in mobile applications.Although there are many open-source software tools for the development of deeplearning solutions, there are no... | Continue reading
Cryptography with quantum states exhibits a number of surprising andcounterintuitive features. In a 2002 work, Barnum et al. argued informally thatthese strange features should imply that... | Continue reading
A key concern in modern distributed systems is to avoid the cost ofcoordination while maintaining consistent semantics. Until recently, there wasno answer to the question of when coordination is... | Continue reading