ED Explorer consists of an interactive web application, an API, and an NLP toolkit, which can help both domain experts and non-experts to better understand the ED task.
Second, we introduce the concept of valuable localization region that can aid to selectively distill the classification and localization knowledge for a certain region.
In this work, we propose a Multi-label Time-series GAN (MTGAN) to generate EHR data and simultaneously improve the quality of uncommon disease generation.
In this work, we propose a DRL-based caching scheme that improves the cache hit rate and reduces energy consumption of the IoT networks, in the meanwhile, taking data freshness and limited lifetime of IoT data into account.
Unsupervised pre-training has been proven as an effective approach to boost various downstream tasks given limited labeled data.
A key feature of the multi-label setting is that images often have multiple labels, which typically refer to different regions of the image.
Question Answering (QA) in clinical notes has gained a lot of attention in the past few years.
Deep learning based image classification models are shown vulnerable to adversarial attacks by injecting deliberately crafted noises to clean images.
Pre-training a recognition model with contrastive learning on a large dataset of unlabeled data has shown great potential to boost the performance of a downstream task, e. g., image classification.
Despite their outstanding accuracy, semi-supervised segmentation methods based on deep neural networks can still yield predictions that are considered anatomically impossible by clinicians, for instance, containing holes or disconnected regions.
As important data carriers, the drastically increasing number of multimedia videos often brings many duplicate and near-duplicate videos in the top results of search.
Autonomous Vehicles (AVs) are required to operate safely and efficiently in dynamic environments.
While the use of class names has already been explored in previous work, our approach differs in two key aspects.
In this paper, we proposed Optimal Aggregation algorithm for better aggregation, which finds out the optimal subset of local updates of participating nodes in each global round, by identifying and excluding the adverse local updates via checking the relationship between the local gradient and the global gradient.
The Discriminative Optimization (DO) algorithm has been proved much successful in 3D point cloud registration.
Entity alignment (EA) is the task to discover entities referring to the same real-world object from different knowledge graphs (KGs), which is the most crucial step in integrating multi-source KGs.
no code implementations • 24 Feb 2021 • Yibo Wang, Siqi Jiang, Jingkuan Xiao, Xiaofan Cai, Di Zhang, Ping Wang, Guodong Ma, Yaqing Han, Jiabei Huang, Kenji Watanabe, Takashi Taniguchi, Alexander S. Mayorov, Geliang Yu
Van der Waals (vdW) assembly of two-dimensional materials has been long recognized as a powerful tool to create unique systems with properties that cannot be found in natural compounds.
Mesoscale and Nanoscale Physics Materials Science
Previous KD methods for object detection mostly focus on imitating deep features within the imitation regions instead of mimicking classification logit due to its inefficiency in distilling localization information and trivial improvement.
Accounting for the constraints on these systems, we develop a comprehensive framework for constructing accurate and high-resolution depth maps using mmWave systems.
With different mode selection protocols, we characterize the success probability and ergodic capacity of a dual-hop relaying system with the hybrid relay in the field of randomly located ambient transmitters.
Information Theory Networking and Internet Architecture Information Theory
The aim of few-shot learning (FSL) is to learn how to recognize image categories from a small number of training examples.
With extensive experiments performed in Pytorch and PySyft, we show that FL training with FedAdp can reduce the number of communication rounds by up to 54. 1% on MNIST dataset and up to 45. 4% on FashionMNIST dataset, as compared to FedAvg algorithm.
As the search space of registration is usually non-convex, the optimization algorithm, which aims to search the best transformation parameters, is a challenging step.
Moreover, to encourage predictions from different networks to be both consistent and confident, we enhance this generalized JSD loss with an uncertainty regularizer based on entropy.
An intriguing question is: Can the quantum nature (quantumness) of sensors and targets be exploited to enable schemes that are not possible for classical probes or classical targets?
In addition, we also propose an Attention-driven Keywords Ranking (AKR) method, which can automatically discover aspect keywords and aspect-level opinion keywords from the review corpus based on the attention weights.
However, recent deep learning-based topic models, specifically aspect-based autoencoder, suffer from several problems, such as extracting noisy aspects and poorly mapping aspects discovered by models to the aspects of interest.
Joint extraction refers to extracting triples, composed of entities and relations, simultaneously from the text with a single model.
Ranked #1 on Relation Extraction on DuIE
94, 047201 (2005)] on the critical behaviors of the noisy Ising model, which shows that the universality class of the quantum criticality is modified by the decoherence, we find that the standard quantum limit is recovered by the single-particle decoherence, which is equivalent to local quantum measurement conducted by the environment and destroys the many-body entanglement in the ground state at the quantum critical point.
Representation learning methods for heterogeneous networks produce a low-dimensional vector embedding for each node that is typically fixed for all tasks involving the node.
The electromagnetic form factors of octet baryons are investigated with the nonlocal chiral effective theory.
High Energy Physics - Phenomenology
In this paper, we propose Complete-IoU (CIoU) loss and Cluster-NMS for enhancing geometric factors in both bounding box regression and Non-Maximum Suppression (NMS), leading to notable gains of average precision (AP) and average recall (AR), without the sacrifice of inference efficiency.
In this paper, we propose a corpus-level explanation approach, which aims to capture causal relationships between keywords and model predictions via learning the importance of keywords for predicted labels across a training corpus based on attention weights.
For service bundles, the subscription fee and data sizes of the grouped IoT services are optimized to maximize the total profit of cooperative service providers.
In this paper, we propose an auction based market model for incentivizing data owners to participate in federated learning.
Computer Science and Game Theory
By incorporating DIoU and CIoU losses into state-of-the-art object detection algorithms, e. g., YOLO v3, SSD and Faster RCNN, we achieve notable performance gains in terms of not only IoU metric but also GIoU metric.
However, the traffic micro-simulation accuracy of car following models in a platoon level, especially during traffic oscillations, still needs to be enhanced.
For machines to achieve this capability, we propose a knowledge-enabled language representation model (K-BERT) with knowledge graphs (KGs), in which triples are injected into the sentences as domain knowledge.
In this paper, we propose a convolutional neural network with mapping layers (MCNN) for hyperspectral image (HSI) classification.
In this paper, we tackle these challenges by developing a deep learning based TRanslate-Edit Model for Question-to-SQL (TREQS) generation, which adapts the widely used sequence-to-sequence model to directly generate the SQL query for a given question, and further performs the required edits using an attentive-copying mechanism and task-specific look-up tables.
Neural abstractive text summarization (NATS) has received a lot of attention in the past few years from both industry and academia.
By this method, how vehicles travel through maintenance work zones, and how different vehicle behaviours distribute in maintenance work zones can be displayed intuitively on maps, which is a novel traffic characteristic and can shed light to maintenance work zone related researches such as safety assessment and design method.
However, the learning process of the existing federated learning platforms rely on the direct communication between the model owner, e. g., central cloud or edge server, and the mobile devices for transferring the model update.
Cryptography and Security Computer Science and Game Theory
Reinforcement learning has been efficiently used to enable the network entities to obtain the optimal policy including, e. g., decisions or actions, given their states when the state and action spaces are small.
Here, we present novel algorithms using stacked generalization frameworks to estimate the warfarin dose, within which different types of machine learning algorithms function together through a meta-machine learning model to maximize the prediction accuracy.
To cope with such incomplete knowledge of the environment, we develop a low-complexity online reinforcement learning algorithm that allows the secondary transmitter to "learn" from its decisions and then attain the optimal policy.
A considerable number of works have studied different aspects of drone package delivery service by a supplier, one of which is delivery planning.
In this paper, we introduce a novel regularization method called Adversarial Noise Layer (ANL) and its efficient version called Class Adversarial Noise Layer (CANL), which are able to significantly improve CNN's generalization ability by adding carefully crafted noise into the intermediate layer activations.
This survey is motivated by the lack of a comprehensive literature review on the development of decentralized consensus mechanisms in blockchain networks.
Cryptography and Security
Vehicle Routing Problem with Private fleet and common Carrier (VRPPC) has been proposed to help a supplier manage package delivery services from a single depot to multiple customers.
In this paper, we propose a decentralized framework of proactive caching in a hierarchical wireless network based on blockchains.
Networking and Internet Architecture
With the rapid growth of mobile applications and cloud computing, mobile cloud computing has attracted great interest from both academia and industry.
However, a mechanism needs to be designed for edge resource allocation to maximize the revenue for the Edge Computing Service Provider and to ensure incentive compatibility and individual rationality is still open.
Computer Science and Game Theory
We hope that this paper will provide a more thorough understanding of the recent advances in survival analysis and offer some guidelines on applying these approaches to solve new problems that arise in applications with censored data.
A cyclic iteration process is then proposed to extract the background from the discriminative frame set.