Alert button

"Time": models, code, and papers
Alert button

Large-scale multi-objective influence maximisation with network downscaling

Apr 13, 2022
Elia Cunegatti, Giovanni Iacca, Doina Bucur

Figure 1 for Large-scale multi-objective influence maximisation with network downscaling
Figure 2 for Large-scale multi-objective influence maximisation with network downscaling
Figure 3 for Large-scale multi-objective influence maximisation with network downscaling
Figure 4 for Large-scale multi-objective influence maximisation with network downscaling
Viaarxiv icon

No More Pesky Hyperparameters: Offline Hyperparameter Tuning for RL

May 18, 2022
Han Wang, Archit Sakhadeo, Adam White, James Bell, Vincent Liu, Xutong Zhao, Puer Liu, Tadashi Kozuno, Alona Fyshe, Martha White

Figure 1 for No More Pesky Hyperparameters: Offline Hyperparameter Tuning for RL
Figure 2 for No More Pesky Hyperparameters: Offline Hyperparameter Tuning for RL
Figure 3 for No More Pesky Hyperparameters: Offline Hyperparameter Tuning for RL
Figure 4 for No More Pesky Hyperparameters: Offline Hyperparameter Tuning for RL
Viaarxiv icon

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction

May 11, 2022
Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo

Figure 1 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 2 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 3 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Figure 4 for A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction
Viaarxiv icon

SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment

Apr 16, 2022
Marjan Golmaryami, Rahim Taheri, Zahra Pooranian, Mohammad Shojafar, Pei Xiao

Figure 1 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 2 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 3 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Figure 4 for SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
Viaarxiv icon

Branch & Learn for Recursively and Iteratively Solvable Problems in Predict+Optimize

May 01, 2022
Xinyi Hu, Jasper C. H. Lee, Jimmy H. M. Lee, Allen Z. Zhong

Figure 1 for Branch & Learn for Recursively and Iteratively Solvable Problems in Predict+Optimize
Figure 2 for Branch & Learn for Recursively and Iteratively Solvable Problems in Predict+Optimize
Figure 3 for Branch & Learn for Recursively and Iteratively Solvable Problems in Predict+Optimize
Figure 4 for Branch & Learn for Recursively and Iteratively Solvable Problems in Predict+Optimize
Viaarxiv icon

PIE: a Parameter and Inference Efficient Solution for Large Scale Knowledge Graph Embedding Reasoning

Apr 29, 2022
Linlin Chao, Taifeng Wang, Wei Chu

Figure 1 for PIE: a Parameter and Inference Efficient Solution for Large Scale Knowledge Graph Embedding Reasoning
Figure 2 for PIE: a Parameter and Inference Efficient Solution for Large Scale Knowledge Graph Embedding Reasoning
Figure 3 for PIE: a Parameter and Inference Efficient Solution for Large Scale Knowledge Graph Embedding Reasoning
Figure 4 for PIE: a Parameter and Inference Efficient Solution for Large Scale Knowledge Graph Embedding Reasoning
Viaarxiv icon

An In-Pipe Inspection Robot With Sensorless Underactuated Magnets and Omnidirectional Tracks: Design and Implementation

May 20, 2022
Gaurav Saha, K. M. Santosh, Anugu Reddy, Ravi Kant, Arjun Kumar

Figure 1 for An In-Pipe Inspection Robot With Sensorless Underactuated Magnets and Omnidirectional Tracks: Design and Implementation
Figure 2 for An In-Pipe Inspection Robot With Sensorless Underactuated Magnets and Omnidirectional Tracks: Design and Implementation
Viaarxiv icon

The impact of memory on learning sequence-to-sequence tasks

May 29, 2022
Alireza Seif, Sarah A. M. Loos, Gennaro Tucci, Édgar Roldán, Sebastian Goldt

Figure 1 for The impact of memory on learning sequence-to-sequence tasks
Figure 2 for The impact of memory on learning sequence-to-sequence tasks
Figure 3 for The impact of memory on learning sequence-to-sequence tasks
Figure 4 for The impact of memory on learning sequence-to-sequence tasks
Viaarxiv icon

Energy-Efficient Hybrid Offloading for Backscatter-Assisted Wirelessly Powered MEC with Reconfigurable Intelligent Surfaces

Jun 01, 2022
S. Zargari, C. Tellambura, S. Herath

Figure 1 for Energy-Efficient Hybrid Offloading for Backscatter-Assisted Wirelessly Powered MEC with Reconfigurable Intelligent Surfaces
Figure 2 for Energy-Efficient Hybrid Offloading for Backscatter-Assisted Wirelessly Powered MEC with Reconfigurable Intelligent Surfaces
Figure 3 for Energy-Efficient Hybrid Offloading for Backscatter-Assisted Wirelessly Powered MEC with Reconfigurable Intelligent Surfaces
Figure 4 for Energy-Efficient Hybrid Offloading for Backscatter-Assisted Wirelessly Powered MEC with Reconfigurable Intelligent Surfaces
Viaarxiv icon

Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?

Jun 07, 2022
Huiyu Li, Nicholas Ayache, Hervé Delingette

Figure 1 for Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Figure 2 for Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Figure 3 for Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Figure 4 for Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Viaarxiv icon