Precise influence evaluation in complex networks. (arXiv:2310.12181v1 [cs.SI]) http://arxiv.org/abs/2310.12181
Block-Wise Mixed-Precision Quantization: Enabling High Efficiency for Practical ReRAM-based DNN Accelerators. (arXiv:2310.12182v1 [cs.AR]) http://arxiv.org/abs/2310.12182
GPT-4 as an interface between researchers and computational software: improving usability and reproducibility. (arXiv:2310.11458v1 [cond-mat.mtrl-sci]) http://arxiv.org/abs/2310.11458
BaitBuster-Bangla: A Comprehensive Dataset for Clickbait Detection in Bangla with Multi-Feature and Multi-Modal Analysis. (arXiv:2310.11465v1 [cs.LG]) http://arxiv.org/abs/2310.11465
Protein 3D Graph Structure Learning for Robust Structure-based Protein Property Prediction. (arXiv:2310.11466v1 [cs.LG]) http://arxiv.org/abs/2310.11466
Enhancing Binary Code Comment Quality Classification: Integrating Generative AI for Improved Accuracy. (arXiv:2310.11467v1 [cs.SE]) http://arxiv.org/abs/2310.11467
Classic machine learning methods. (arXiv:2310.11470v1 [cs.LG]) http://arxiv.org/abs/2310.11470
Tracking and Mapping in Medical Computer Vision: A Review. (arXiv:2310.11475v1 [cs.CV]) http://arxiv.org/abs/2310.11475
Program Translation via Code Distillation. (arXiv:2310.11476v1 [cs.SE]) http://arxiv.org/abs/2310.11476
Robust-MBFD: A Robust Deep Learning System for Motor Bearing Faults Detection Using Multiple Deep Learning Training Strategies and A Novel Double Loss Function. (arXiv:2310.11477v1 [cs.LG]) http://arxiv.org/abs/2310.11477
ASP: Automatic Selection of Proxy dataset for efficient AutoML. (arXiv:2310.11478v1 [cs.LG]) http://arxiv.org/abs/2310.11478
On the Temperature of Bayesian Graph Neural Networks for Conformal Prediction. (arXiv:2310.11479v1 [cs.LG]) http://arxiv.org/abs/2310.11479
BRC-20: Hope or Hype. (arXiv:2310.10652v1 [cs.CR]) http://arxiv.org/abs/2310.10652
Secure and Trustworthy NFC-based Sensor Readout for Battery Packs in Battery Management Systems. (arXiv:2310.10653v1 [cs.CR]) http://arxiv.org/abs/2310.10653
Identity Prove Limited Information Governance Policy against cyber security persistent threats. (arXiv:2310.10654v1 [cs.CR]) http://arxiv.org/abs/2310.10654
Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification. (arXiv:2310.10655v1 [cs.CR]) http://arxiv.org/abs/2310.10655
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints. (arXiv:2310.10656v1 [cs.CR]) http://arxiv.org/abs/2310.10656
Managing Networked IoT Assets Using Practical and Scalable Traffic Inference. (arXiv:2310.10657v1 [cs.CR]) http://arxiv.org/abs/2310.10657
Checking and Automating Confidentiality Theory in Isabelle/UTP. (arXiv:2310.10658v1 [cs.CR]) http://arxiv.org/abs/2310.10658
Backdoor Attack through Machine Unlearning. (arXiv:2310.10659v1 [cs.CR]) http://arxiv.org/abs/2310.10659
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview