Despite their competitive performance on knowledge-intensive tasks, larg...
This paper focuses on the recently popular task of point cloud completio...
Predicting the behavior of real-time traffic (e.g., VoIP) in mobility
sc...
The aim of sequential pattern mining (SPM) is to discover potentially us...
Humans often speak in a continuous manner which leads to coherent and
co...
As cache-based side-channel attacks become serious security problems, va...
This paper proposes an expressive singing voice synthesis system by
intr...
Disentanglement of a speaker's timbre and style is very important for st...
Active speaker detection plays a vital role in human-machine interaction...
A service robot serving safely and politely needs to track the surroundi...
Affective computing plays a key role in human-computer interactions,
ent...
Memory safety remains a critical and widely violated property in reality...
Deep learning model (primarily convolutional networks and LSTM) for time...
Data collected in criminal investigations may suffer from: (i)
incomplet...
Federated Learning (FL) has shown great potential as a privacy-preservin...
Despite prosody is related to the linguistic information up to the disco...
Cache randomization has recently been revived as a promising defense aga...
Recent advances in adversarial attacks have shown that machine learning
...
Simile recognition is to detect simile sentences and to extract simile
c...
Underwater images play a key role in ocean exploration, but often suffer...
Underwater images often have severe quality degradation and distortion d...
When deploying a Chinese neural text-to-speech (TTS) synthesis system, o...
For a given polar code construction, the existing literature on puncturi...
Similar to existing codes, puncturing and shortening are two general way...
We propose a new model based on the deconvolutional networks and SAX
dis...