Show newer

Croesus: Multi-Stage Processing and Transactions for Video-Analytics in Edge-Cloud Systems. (arXiv:2201.00063v1 [eess.SY]) arxiv.org/abs/2201.00063

Stealth Data Injection Attacks with Sparsity Constraints. (arXiv:2201.00065v1 [eess.SY]) arxiv.org/abs/2201.00065

Performance Comparison of Deep Learning Architectures for Artifact Removal in Gastrointestinal Endoscopic Imaging. (arXiv:2201.00084v1 [eess.IV]) arxiv.org/abs/2201.00084

Adversarial Attack via Dual-Stage Network Erosion. (arXiv:2201.00097v1 [cs.CV]) arxiv.org/abs/2201.00097

Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images. (arXiv:2201.00100v1 [eess.IV]) arxiv.org/abs/2201.00100

Role of Data Augmentation Strategies in Knowledge Distillation for Wearable Sensor Data. (arXiv:2201.00111v1 [cs.LG]) arxiv.org/abs/2201.00111

Video Reconstruction from a Single Motion Blurred Image using Learned Dynamic Phase Coding. (arXiv:2112.14768v1 [eess.IV]) arxiv.org/abs/2112.14768

Graph Neural Networks for Communication Networks: Context, Use Cases and Opportunities. (arXiv:2112.14792v1 [cs.NI]) arxiv.org/abs/2112.14792

Constrained Wrapped Least Squares: A Tool for High Accuracy GNSS Attitude Determination. (arXiv:2112.14813v1 [eess.SP]) arxiv.org/abs/2112.14813

Facial Input Decompositions for Robust Peak and Reachable Set Estimation under Polyhedral Uncertainty. (arXiv:2112.14838v1 [math.OC]) arxiv.org/abs/2112.14838

An overview of the quantitative causality analysis and causal graph reconstruction based on a rigorous formalism of information flow. (arXiv:2112.14839v1 [eess.SY]) arxiv.org/abs/2112.14839

Explainable Signature-based Machine Learning Approach for Identification of Faults in Grid-Connected Photovoltaic Systems. (arXiv:2112.14842v1 [cs.LG]) arxiv.org/abs/2112.14842

Learned Autoscaling for Cloud Microservices with Multi-Armed Bandits. (arXiv:2112.14845v1 [cs.DC]) arxiv.org/abs/2112.14845

Parallel Network Flow Allocation in Repeated Routing Games via LQR Optimal Control. (arXiv:2112.14888v1 [math.OC]) arxiv.org/abs/2112.14888

On-Policy Robust Adaptive Discrete-Time Regulator for Passive Unidirectional System using Stochastic Hill-climbing Algorithm and Associated Search Element. (arXiv:2112.14901v1 [eess.SY]) arxiv.org/abs/2112.14901

Risk-Bounded Control with Kalman Filtering and Stochastic Barrier Functions. (arXiv:2112.14912v1 [eess.SY]) arxiv.org/abs/2112.14912

Astronomical Image Colorization and upscaling with Generative Adversarial Networks. (arXiv:2112.13865v1 [eess.IV]) arxiv.org/abs/2112.13865

MedShift: identifying shift data for medical dataset curation. (arXiv:2112.13885v1 [eess.IV]) arxiv.org/abs/2112.13885

Non-Reference Quality Monitoring of Digital Images using Gradient Statistics and Feedforward Neural Networks. (arXiv:2112.13893v1 [eess.IV]) arxiv.org/abs/2112.13893

Safe Reinforcement Learning with Chance-constrained Model Predictive Control. (arXiv:2112.13941v1 [cs.LG]) arxiv.org/abs/2112.13941

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.