Show newer

PAIRS: Control Flow Protection using Phantom Addressed Instructions. (arXiv:1911.02038v1 [cs.CR]) arxiv.org/abs/1911.02038

Angle Covers: Algorithms and Complexity. (arXiv:1911.02040v1 [cs.CG]) arxiv.org/abs/1911.02040

Why X rather than Y? Explaining Neural Model' Predictions by Generating Intervention Counterfactual Samples. (arXiv:1911.02042v1 [cs.LG]) arxiv.org/abs/1911.02042

Data Poisoning Attacks to Local Differential Privacy Protocols. (arXiv:1911.02046v1 [cs.CR]) arxiv.org/abs/1911.02046

On Solving the 2-Dimensional Greedy Shooter Problem for UAVs. (arXiv:1911.01419v1 [cs.RO]) arxiv.org/abs/1911.01419

GuessCompx: An empirical complexity estimation in R. (arXiv:1911.01420v1 [cs.DS]) arxiv.org/abs/1911.01420

A Deep Learning approach for Hindi Named Entity Recognition. (arXiv:1911.01421v1 [cs.CL]) arxiv.org/abs/1911.01421

Improved BiGAN training with marginal likelihood equalization. (arXiv:1911.01425v1 [stat.ML]) arxiv.org/abs/1911.01425

The frontier of simulation-based inference. (arXiv:1911.01429v1 [stat.ML]) arxiv.org/abs/1911.01429

Predictive Engagement: An Efficient Metric For Automatic Evaluation of Open-Domain Dialogue Systems. (arXiv:1911.01456v1 [cs.CL]) arxiv.org/abs/1911.01456

Dual-domain Cascade of U-nets for Multi-channel Magnetic Resonance Image Reconstruction. (arXiv:1911.01458v1 [eess.IV]) arxiv.org/abs/1911.01458

A Failure of Aspect Sentiment Classifiers and an Adaptive Re-weighting Solution. (arXiv:1911.01460v1 [cs.CL]) arxiv.org/abs/1911.01460

Time/Accuracy Tradeoffs for Learning a ReLU with respect to Gaussian Marginals. (arXiv:1911.01462v1 [cs.LG]) arxiv.org/abs/1911.01462

On some computational aspects of Hermite wavelets on a class of SBVPs arising in exothermic reactions. (arXiv:1911.00495v1 [math.NA]) arxiv.org/abs/1911.00495

A Narration-based Reward Shaping Approach using Grounded Natural Language Commands. (arXiv:1911.00497v1 [cs.AI]) arxiv.org/abs/1911.00497

GDPR Anti-Patterns: How Design and Operation of Modern Cloud-scale Systems Conflict with GDPR. (arXiv:1911.00498v1 [cs.CY]) arxiv.org/abs/1911.00498

Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks. (arXiv:1911.00500v1 [cs.NI]) arxiv.org/abs/1911.00500

Review: Ordinary Differential Equations For Deep Learning. (arXiv:1911.00502v1 [cs.LG]) arxiv.org/abs/1911.00502

Six constructions of asymptotically optimal codebooks via the character sums. (arXiv:1911.00506v1 [cs.IT]) arxiv.org/abs/1911.00506

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.