Kernel Minimum Divergence Portfolios. (arXiv:2110.09516v1 [stat.ML]) http://arxiv.org/abs/2110.09516
Protection of the patient data against intentional attacks using a hybrid robust watermarking code. (arXiv:2110.09519v1 [cs.CR]) http://arxiv.org/abs/2110.09519
Image Protection against Forgery and Pixel Tampering based on a Triple Hybrid Security Approach. (arXiv:2110.09520v1 [cs.CR]) http://arxiv.org/abs/2110.09520
Understanding GNN Computational Graph: A Coordinated Computation, IO, and Memory Perspective. (arXiv:2110.09524v1 [cs.LG]) http://arxiv.org/abs/2110.09524
Eigenbehaviour as an Indicator of Cognitive Abilities. (arXiv:2110.09525v1 [cs.LG]) http://arxiv.org/abs/2110.09525
Infinite Servers Queue Systems Busy Period Time Length Distribution and Parameters Study through Computational Simulation. (arXiv:2110.09526v1 [cs.PF]) http://arxiv.org/abs/2110.09526
Wideband and Entropy-Aware Deep Soft Bit Quantization. (arXiv:2110.09541v1 [eess.SP]) http://arxiv.org/abs/2110.09541
Path Regularization: A Convexity and Sparsity Inducing Regularization for Parallel ReLU Networks. (arXiv:2110.09548v1 [cs.LG]) http://arxiv.org/abs/2110.09548
TransFusion: Cross-view Fusion with Transformer for 3D Human Pose Estimation. (arXiv:2110.09554v1 [cs.CV]) http://arxiv.org/abs/2110.09554
On-the-fly Code Activation for Attack Surface Reduction. (arXiv:2110.09557v1 [cs.CR]) http://arxiv.org/abs/2110.09557
A Rate-Distortion Framework for Explaining Black-box Model Decisions. (arXiv:2110.08252v1 [cs.LG]) http://arxiv.org/abs/2110.08252
A Field Guide to Scientific XAI: Transparent and Interpretable Deep Learning for Bioinformatics Research. (arXiv:2110.08253v1 [cs.LG]) http://arxiv.org/abs/2110.08253
Inconsistent Few-Shot Relation Classification via Cross-Attentional Prototype Networks with Contrastive Learning. (arXiv:2110.08254v1 [cs.LG]) http://arxiv.org/abs/2110.08254
Yformer: U-Net Inspired Transformer Architecture for Far Horizon Time Series Forecasting. (arXiv:2110.08255v1 [cs.LG]) http://arxiv.org/abs/2110.08255
Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness. (arXiv:2110.08256v1 [cs.LG]) http://arxiv.org/abs/2110.08256
C-AllOut: Catching & Calling Outliers by Type. (arXiv:2110.08257v1 [cs.LG]) http://arxiv.org/abs/2110.08257
Learning When and What to Ask: a Hierarchical Reinforcement Learning Framework. (arXiv:2110.08258v1 [cs.LG]) http://arxiv.org/abs/2110.08258
Training Neural Networks for Solving 1-D Optimal Piecewise Linear Approximation. (arXiv:2110.08259v1 [cs.LG]) http://arxiv.org/abs/2110.08259
Effective Certification of Monotone Deep Equilibrium Models. (arXiv:2110.08260v1 [cs.LG]) http://arxiv.org/abs/2110.08260
FlexMatch: Boosting Semi-Supervised Learning with Curriculum Pseudo Labeling. (arXiv:2110.08263v1 [cs.LG]) http://arxiv.org/abs/2110.08263
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview