Show newer

Automatic-differentiated Physics-Informed Echo State Network (API-ESN). (arXiv:2101.00002v1 [cs.LG]) arxiv.org/abs/2101.00002

Yet another argument in favour of NP=CoNP. (arXiv:2101.00003v1 [cs.CC]) arxiv.org/abs/2101.00003

Deep Unsupervised Identification of Selected SNPs between Adapted Populations on Pool-seq Data. (arXiv:2101.00004v1 [q-bio.GN]) arxiv.org/abs/2101.00004

A near-optimal policy for single-server scheduling with estimated job sizes. (arXiv:2101.00007v1 [cs.OH]) arxiv.org/abs/2101.00007

Explainability Matters: Backdoor Attacks on Medical Imaging. (arXiv:2101.00008v1 [cs.CR]) arxiv.org/abs/2101.00008

Adversarial Estimation of Riesz Representers. (arXiv:2101.00009v1 [econ.EM]) arxiv.org/abs/2101.00009

Encoding sinusoidal functions in hybrid automata formalism. (arXiv:2101.00012v1 [cs.FL]) arxiv.org/abs/2101.00012

Consensus with Bounded Space and Minimal Communication. (arXiv:2101.00025v1 [cs.DC]) arxiv.org/abs/2101.00025

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach. (arXiv:2012.14425v1 [cs.CR]) arxiv.org/abs/2012.14425

Deep Learning Towards Edge Computing: Neural Networks Straight from Compressed Data. (arXiv:2012.14426v1 [cs.CV]) arxiv.org/abs/2012.14426

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. (arXiv:2012.14427v1 [cs.CR]) arxiv.org/abs/2012.14427

Effective Email Spam Detection System using Extreme Gradient Boosting. (arXiv:2012.14430v1 [cs.CR]) arxiv.org/abs/2012.14430

LOCUS: A Multi-Sensor Lidar-Centric Solution for High-Precision Odometry and 3D Mapping in Real-Time. (arXiv:2012.14447v1 [cs.RO]) arxiv.org/abs/2012.14447

Straggler-Resilient Federated Learning: Leveraging the Interplay Between Statistical Accuracy and System Heterogeneity. (arXiv:2012.14453v1 [cs.LG]) arxiv.org/abs/2012.14453

A Stock Options Metaphor for Content Delivery Networks. (arXiv:2012.14454v1 [cs.NI]) arxiv.org/abs/2012.14454

Color Channel Perturbation Attacks for Fooling Convolutional Neural Networks and A Defense Against Such Attacks. (arXiv:2012.14456v1 [cs.CV]) arxiv.org/abs/2012.14456

An efficient method for approximating resonance curves of weakly-damped nonlinear mechanical systems. (arXiv:2012.14458v1 [cs.CE]) arxiv.org/abs/2012.14458

Enhancing Handwritten Text Recognition with N-gram sequence decomposition and Multitask Learning. (arXiv:2012.14459v1 [cs.CV]) arxiv.org/abs/2012.14459

Error estimates for the Scaled Boundary Finite Element Method. (arXiv:2012.13418v1 [math.NA]) arxiv.org/abs/2012.13418

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.