In this work, we seek to predict camera poses across scenes with a multi...
To avoid potential risks posed by vulnerabilities in third-party librari...
3D Multi-object tracking (MOT) empowers mobile robots to accomplish
well...
To address security vulnerabilities arising from third-party libraries,
...
With the widespread deployment of deep neural networks (DNNs), ensuring ...
Deep learning compilers help address difficulties of deploying deep lear...
Code generation models based on the pre-training and fine-tuning paradig...
Code completion has become a common practice for programmers during thei...
Local feature matching between images remains a challenging task, especi...
Graph database engines stand out in the era of big data for their effici...
Neural networks (NNs) are known to be vulnerable against adversarial
per...
For large-scale distributed systems, it's crucial to efficiently diagnos...
Microservice architecture advocates a number of technologies and practic...
With the prosperity of mobile apps, quality assurance of mobile apps bec...
Great advancement in deep neural networks (DNNs) has led to state-of-the...
Recent studies have shown that graph neural networks are vulnerable agai...
Deep learning (DL) becomes increasingly pervasive, being used in a wide ...
Deep learning models on graphs have achieved remarkable performance in
v...
As machine learning systems become pervasive, safeguarding their securit...
Despite being popularly used in many application domains such as image
r...
Neural Machine Translation (NMT) has been widely adopted recently due to...
Neural Machine Translation (NMT) has been widely adopted over recent yea...
Cyber-physical software continually interacts with its physical environm...
Community Question Answering (CQA) websites have become valuable reposit...