Geometric Understanding of Deep Learning

Deep learning is the mainstream technique for many machine learning tasks,including image recognition, machine translation, speech recognition, and soon. It has outperformed conventional methods... | Continue reading


@arxiv.org | 5 years ago

Neutrino Mistakes: Wrong Tracks and Hints, Hopes and Failures

In the last two decades, the field of neutrino physics has made enormousprogress in measuring the strength and frequency of neutrino and antineutrinooscillations. Along the way, there have been... | Continue reading


@arxiv.org | 5 years ago

DNN Approximation for Custom Hardware: Where We've Been, Where We're Going

Deep neural networks have proven to be particularly effective in visual andaudio recognition tasks. Existing models tend to be computationally expensiveand memory intensive, however, and so... | Continue reading


@arxiv.org | 5 years ago

Exploiting Synchronized Lyrics and Vocal Features for Music Emotion Detection

One of the key points in music recommendation is authoring engaging playlistsaccording to sentiment and emotions. While previous works were mostly based onaudio for music discovery and playlists... | Continue reading


@arxiv.org | 5 years ago

Combating Fake News: A Survey on Identification and Mitigation Techniques (2019)

The proliferation of fake news on social media has opened up new directionsof research for timely identification and containment of fake news, andmitigation of its widespread impact on public... | Continue reading


@arxiv.org | 5 years ago

DeepSDF: Learning Continuous Signed Distance Functions for Shape Representation

Computer graphics, 3D computer vision and robotics communities have producedmultiple approaches to representing 3D geometry for rendering andreconstruction. These provide trade-offs across... | Continue reading


@arxiv.org | 5 years ago

[1901.06563] Consistent Optimization for Single-Shot Object Detection

We present consistent optimization for single stage object detection.Previous works of single stage object detectors usually rely on the regular,dense sampled anchors to generate hypothesis for... | Continue reading


@arxiv.org | 5 years ago

Deep Learning in Spiking Neural Networks (2018-2019)

In recent years, deep learning has been a revolution in the field of machinelearning, for computer vision in particular. In this approach, a deep(multilayer) artificial neural network (ANN) is... | Continue reading


@arxiv.org | 5 years ago

UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction

UMAP (Uniform Manifold Approximation and Projection) is a novel manifoldlearning technique for dimension reduction. UMAP is constructed from atheoretical framework based in Riemannian geometry... | Continue reading


@arxiv.org | 5 years ago

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins

The first six months of 2018 have seen cryptocurrency thefts of $761 million,and the technology is also the latest and greatest tool for money laundering.This increase in crime has caused both... | Continue reading


@arxiv.org | 5 years ago

CT-Wasm: Type-Driven Secure Cryptography for the Web Ecosystem

A significant amount of both client and server-side cryptography isimplemented in JavaScript. Despite widespread concerns about its security, noother language has been able to match the... | Continue reading


@arxiv.org | 5 years ago

A Focal Any-Angle Path-Finding Algorithm Based on A* on Visibility Graphs [pdf]

Continue reading


@arxiv.org | 5 years ago

A Survey of Recent Architectures of Deep Convolutional Neural Networks (2019)

Deep Convolutional Neural Networks (CNNs) are a special type of NeuralNetworks, which have shown state-of-the-art results on various competitivebenchmarks. The powerful learning ability of deep... | Continue reading


@arxiv.org | 5 years ago

High-Assurance Separation Kernels: A Survey on Formal Methods

Separation kernels provide temporal/spatial separation and controlledinformation flow to their hosted applications. They are introduced to decouplethe analysis of applications in partitions from... | Continue reading


@arxiv.org | 5 years ago

Photo-Sketching: Inferring Contour Drawings from Images

Edges, boundaries and contours are important subjects of study in bothcomputer graphics and computer vision. On one hand, they are the 2D elementsthat convey 3D shapes, on the other hand, they... | Continue reading


@arxiv.org | 5 years ago

[1806.04418] Quaternion Recurrent Neural Networks

Recurrent neural networks (RNNs) are powerful architectures to modelsequential data, due to their capability to learn short and long-termdependencies between the basic elements of a sequence.... | Continue reading


@arxiv.org | 5 years ago

Design of APRS Modem Using IC TCM3105 and ATMega2560 Microcontroller

APRS technology is still exists and still developing among amateur radio.However, in Indonesia there are still not many people who use and utilize APRS.The high price of APRS modem and... | Continue reading


@arxiv.org | 5 years ago

Machine learning and the Continuum Hypothesis

We comment on a recent paper that connects certain forms of machine learningto Set Theory. We point out that part of the set-theoretic machinery is related to a resultof Kuratowski about... | Continue reading


@arxiv.org | 5 years ago

Tracking the Digital Traces of Russian Trolls

Online trolling has raised serious concerns about manipulating public opinionand exacerbating political divides among social media users. In this work, weanalyse the role and behaviour of... | Continue reading


@arxiv.org | 5 years ago

Stealing Machine Learning Models via Prediction APIs (2016) [pdf]

Machine learning (ML) models may be deemed confidential due to theirsensitive training data, commercial value, or use in security applications.Increasingly often, confidential ML models are... | Continue reading


@arxiv.org | 5 years ago

Blockchain in Global Supply Chains and Cross Border Trade: A Critical Synthesis

Blockchain in supply chain management is expected to boom over the next fiveyears. It is estimated that the global blockchain supply chain market wouldgrow at a compound annual growth rate of... | Continue reading


@arxiv.org | 5 years ago

A Survey on Automated Machine Learning (2018-2019)

Machine learning techniques have deeply rooted in our everyday life. However,since it is knowledge- and labor-intensive to pursue good learning performance,human experts are heavily involved in... | Continue reading


@arxiv.org | 5 years ago

Predicting Variable Types in Dynamically Typed Programming Languages

Dynamic Programming Languages are quite popular because they increase theprogrammer's productivity. However, the absence of types in the source codemakes the program written in these languages... | Continue reading


@arxiv.org | 5 years ago

Black Hole singularity avoidance by the Higgs scalar field

Einstein gravitation is known to give rise to the formation of singularitiesat high densities unless the dominant energy condition is made invalid by theoccurrence of new physics: we show that... | Continue reading


@arxiv.org | 5 years ago

Optimization Models for Machine Learning: A Survey (2019)

This paper surveys the machine learning literature and presents machinelearning as optimization models. Such models can benefit from the advancementof numerical optimization techniques which... | Continue reading


@arxiv.org | 5 years ago

Ocean dynamics of outer solar system satellites

Ocean worlds are prevalent in the solar system. Focusing on Enceladus, Titan,Europa, and Ganymede, I use rotating convection theory and numericalsimulations to predict ocean currents and the... | Continue reading


@arxiv.org | 5 years ago

MicroWalk: A Framework for Finding Side Channels in Binaries

Microarchitectural side channels expose unprotected software to informationleakage attacks where a software adversary is able to track runtime behavior ofa benign process and steal secrets such... | Continue reading


@arxiv.org | 5 years ago

Automated Customized Bug-Benchmark Generation

We introduce Bug-Injector, a system that automatically creates benchmarks forcustomized evaluation of static analysis tools. We share a benchmark generatedusing Bug-Injector and illustrate its... | Continue reading


@arxiv.org | 5 years ago

A First Look at Crypto-Mining Malware Ecosystem a Decade of Unrestricted Wealth

Illicit crypto-mining leverages resources stolen from victims to minecryptocurrencies on behalf of criminals. While recent works have analyzed oneside of this threat, i.e.: web-browser... | Continue reading


@arxiv.org | 5 years ago

Natural Disasters Detection in Social Media and Satellite Imagery: A Survey

The analysis of natural disaster-related multimedia content got greatattention in recent years. Being one of the most important sources ofinformation, social media have been crawled over the... | Continue reading


@arxiv.org | 5 years ago

Peel the Onion: Recognition of Android Apps Behind the Tor Network

In this work we show that Tor is vulnerable to app deanonymization attacks onAndroid devices through network traffic analysis. For this purpose, we describea general methodology for performing... | Continue reading


@arxiv.org | 5 years ago

Hybrid Recommender Systems: A Systematic Literature Review (2019)

Recommender systems are software tools used to generate and providesuggestions for items and other entities to the users by exploiting variousstrategies. Hybrid recommender systems combine two... | Continue reading


@arxiv.org | 5 years ago

Deep Learning for Anomaly Detection: A Survey (2019)

Anomaly detection is an important problem that has been well-studied withindiverse research areas and application domains. The aim of this survey istwo-fold, firstly we present a structured and... | Continue reading


@arxiv.org | 5 years ago

Wikibook-Bot – Automatic Generation of a Wikipedia Book

A Wikipedia book (known as Wikibook) is a collection of Wikipedia articles ona particular theme that is organized as a book. We propose Wikibook-Bot, amachine-learning based technique for... | Continue reading


@arxiv.org | 5 years ago

Advancing Open Domain Dialog Systems Through the Alexa Prize

Building open domain conversational systems that allow users to have engagingconversations on topics of their choice is a challenging task. Alexa Prize waslaunched in 2016 to tackle the problem... | Continue reading


@arxiv.org | 5 years ago

The ZX-calculus is complete for stabilizer quantum mechanics

The ZX-calculus is a graphical calculus for reasoning about quantum systemsand processes. It is known to be universal for pure state qubit quantummechanics, meaning any pure state, unitary... | Continue reading


@arxiv.org | 5 years ago

Initial results from reconnaissance flyby of Kuiper Belt planetesimal: 2014 MU69

The centerpiece objective of the NASA New Horizons first Kuiper ExtendedMission (KEM-1) was the close flyby of the Kuiper Belt Object KBO) 2014 MU69,nicknamed Ultima Thule. On 1 Jan 2019 this... | Continue reading


@arxiv.org | 5 years ago

One-Shot Training of Neural Networks Using Hypercube-Based Topological Coverings

In this paper we presented a novel constructive approach for training deepneural networks using geometric approaches. We show that a topological coveringcan be used to define a class of... | Continue reading


@arxiv.org | 5 years ago

An Introduction to Partial Differential Equations

The field of partial differential equations (PDEs) is vast in size anddiversity. The basic reason for this is that essentially all fundamental lawsof physics are formulated in terms of PDEs. In... | Continue reading


@arxiv.org | 5 years ago

NLP for Fake News Detection (2018)

Fake news detection is a critical yet challenging problem in Natural LanguageProcessing (NLP). The rapid rise of social networking platforms has not onlyyielded a vast increase in information... | Continue reading


@arxiv.org | 5 years ago

Fake News: A Survey of Research, Detection Methods, and Opportunities (2018)

The explosive growth in fake news and its erosion to democracy, justice, andpublic trust has increased the demand for fake news analysis, detection andintervention. This survey comprehensively... | Continue reading


@arxiv.org | 5 years ago

Hyperprior Induced Unsupervised Disentanglement of Latent Representations

We address the problem of unsupervised disentanglement of latentrepresentations learnt via deep generative models. In contrast to currentapproaches that operate on the evidence lower bound... | Continue reading


@arxiv.org | 5 years ago

Guide to Bayesian Convolutional Neural Network with Variational Inference (2019)

Artificial Neural Networks are connectionist systems that perform a giventask by learning on examples without having prior knowledge about the task.This is done by finding an optimal point... | Continue reading


@arxiv.org | 5 years ago

Deep Learning in Android Malware Detection (2018)

Android is the predominant mobile operating system for the past few years.The prevalence of devices that can be powered by Android magnetized not merelyapplication developers but also malware... | Continue reading


@arxiv.org | 5 years ago

Looking Back at Postgres

This is a recollection of the UC Berkeley Postgres project, which was led byMike Stonebraker from the mid-1980's to the mid-1990's. The article wassolicited for Stonebraker's Turing Award book,... | Continue reading


@arxiv.org | 5 years ago

Deployment of Deep Learning Models on Smartphones as Apps (2019)

Deep learning solutions are being increasingly used in mobile applications.Although there are many open-source software tools for the development of deeplearning solutions, there are no... | Continue reading


@arxiv.org | 5 years ago

Can you sign a quantum state?

Cryptography with quantum states exhibits a number of surprising andcounterintuitive features. In a 2002 work, Barnum et al. argued informally thatthese strange features should imply that... | Continue reading


@arxiv.org | 5 years ago

Keeping CALM: When Distributed Consistency Is Easy [pdf]

A key concern in modern distributed systems is to avoid the cost ofcoordination while maintaining consistent semantics. Until recently, there wasno answer to the question of when coordination is... | Continue reading


@arxiv.org | 5 years ago